![]() |
A zombie network is comprised of computers who are under control of a botnet. A person that created the botnet can remotely control the computers that are infected and spread malware and spam to others. By using zombies, a hacker can avoid detection since they are not using their personal computer to spread the infections.
The image above explains step-by-step, how a botnet attack works. The second image shows a very generic depiction of a zombie network. To find out more information about a botnet is, how it works, and how to prevent them you can watch the video below.
No comments:
Post a Comment