Learn something new every day
More Info... by email
A zombie computer, or “drone,” is a computer that has been secretly compromised by hacking tools which allow a third party to control the computer and its resources remotely. When the zombie computer connects to the Internet the remote hacker can clandestinely make contact with the computer to mine data from it or use it for any number of purposes. Communication between the hacker and the computer travels through back channels of the targeted system, keeping these processes hidden from the owner.
The hacking tools used to establish hidden control in a remote computer are referred to as a rootkit. A rootkit isn’t considered malware, as there are legitimate uses for rootkits in networking. However, rootkits can also be used to target random computers on the Internet. Once a computer picks up a rootkit, it becomes an “unwilling accomplice” of the hacker, blindly following instructions, leading to the name “zombie computer.”
A hacker has full access to data and resources on a zombie computer. The infiltrator can copy, infect, corrupt or even erase the entire hard drive. He or she can also install tools that will report everything typed into the zombie computer, including usernames, passwords and financial data like credit card numbers and bank accounts. This private information can be used to commit fraud, identity theft, or can be sold or traded to others.
In addition to the personal violation of privacy and inherent dangers that brings, the perpetrator can also use the zombie computer to engage in illegal online activities. A hacker that compromises many computers can combine them into a zombie network, called a “botnet.” The hacker can control the zombies by broadcasting single commands, negating the need to communicate with each target individually. The botnet becomes a kind of army to do the hacker’s bidding. Botnets are used to send spam, attack websites, perpetuate phishing scams, commit click-fraud, and grow larger botnets by infecting new computers that are vulnerable to attack.
Unfortunately, the risk of your system falling victim to a zombie computer attack might be greater than you imagine. In highly publicized reports from 2005, one dismantled botnet controlled by three young men in the Netherlands included 1.5 million zombie computers. In the United States teenagers termed “script kiddies” are competitively building botnets to gain peer recognition, and in 2000, a Canadian 15-year-old boy used zombie drones to bring down several large websites, causing $1.7 million US Dollars in damages.
To minimize the growing threat of becoming assimilated into a drone:
In many cases there is excellent freeware available to help you with these tasks. By taking these precautions you will greatly reduce the chances of being targeted by a botnet or zombie computer scanning for new drones.
A few years ago, we had a computer turned into a zombie and the blasted thing was spamming email all over the place. We're still not sure how the computer got infected, but wound up having to pretty well format the hard drive and start over.
Once a computer gets the zombie treatment, it's hard to fix.
One of our editors will review your suggestion and make changes if warranted. Note that depending on the number of suggestions we receive, this can take anywhere from a few hours to a few days. Thank you for helping to improve wiseGEEK!