by Felix Kinaro About 1 min reading time

Zombie computing devices used my hackers to commit illicit activities online. These range from compromised servers, personal computers and IoT devices exposed to the internet. Hackers use vulnerabilities in software to install malware that connects the devices to a Command & Control server which issues commands to be executed.

Once in control of an attacker, the connected devices can be used for a wide variety of nefarious activities, such as joining cryptocurrency mining pools to make profites for the attacker. They are also used to send spam emails, perform online fraud, or to spy on devices connected to the same network.

Another common abuse is performing distributed denial of service attacks. In 2016, the Mirai botnet malware was used to perform distributed denial of service attack which knocked some online services down for hours. Dyn DNS was one such service. DNS is used to resolve the human-readable domain names to IP addresses. The attackers sent more requests than Dyn could handle, which caused an outage as the DNS servers got overwhelmed by traffic.

Tips to keep devices safe

Subscribe to receive weekly articles

Your data is handled by Buttondown.