A bot is a computer program that automatically and independently performs certain tasks. If several bots network with each other, a botnet is created. Although technically neutral, botnets are most often set up between malware-infected computers and used by cybercriminals – without the knowledge of the computer owners.
Botnets use the resources of other people’s computers for criminal purposes
Botnets are used to send spam, DDoS attacks or phishing attacks, among other things
In principle, any computer can be connected to a botnet without the knowledge of its owner or user.
Thanks to broadband Internet and flat rates, the misuse of computers is hardly noticeable and possible around the clock.
It is believed that up to 25% of all computers worldwide are connected to botnets.
The German Federal Office for Information Security (BSI) reports that in the first half of 2016, up to 39,000 infections of German systems were reported to the BSI every day. The number of unreported infections is probably significantly higher.
Botnets to which well over 10,000 computers were connected are repeatedly dismantled.
You may encounter an attempt to inject a bot into your corporate network. For example, via an email with an infected attachment or an infected download. The suspicious email may also have been sent to your company via a botnet. If your company’s computers are already connected to a botnet, you won’t notice much of it in your day-to-day work. If you have any suspicions, report them to your administrator immediately.
Many measures to reduce cyber risks protect your company’s computers from becoming part of a botnet. These include, in particular:
Detailed information
Information from the German Federal Office for Information Security (BSI) on the subject of botnets.