Currently, zombies have invaded the web. For instance, in June 2004, a DOS attack that momentarily blacked out websites such as Google, Yahoo, and Microsoft was carried out on zombie PCs.
The outbreaks of worms such as MyDoom, Sobig, and Bagle have indicated the existence of more sophisticated techniques of spreading malware and these techniques involve the use of zombie machines.
A zombie is a computer that has been seized by a third party without the knowledge of the owner. Once a computer becomes a zombie, it forms a part of a network of zombie PCs or a botnet.
IT security experts say that a zombie machine is used to send malicious code and attack websites. It can relay spam, launch denial of service (DOS) attacks, send phisher scams, and spread viruses. The majority of spam is sent using zombie machines. Attackers can also use a zombie machine to download pornography and send nasty content to innocent computers. Of course, when a person’s computer becomes a zombie, their privacy is completely invaded, and personal and financial information could be stolen and used for malicious purposes.
There are already big armies of zombie machines in use. As at August 2014, around 150 million zombie PCs across the globe were in operation. The biggest challenge of this internet security threat is that the owners of infected computers can still use them being unaware of what is happening.
Knowing whether your computer is a zombie
Apparently, attackers can use any computer to reach their target. It’s not always easy to know whether your PC is being used as a zombie machine. Jason Adler, the Semalt Customer Success Manager, suggests checking the following symptoms:
- Slow broadband connection
- An unresponsive keyboard or mouse
- Excessive hard drive activity
- Numerous bounce-back notifications in your inbox from strangers
Other indications that your computer might be a zombie include frequently crashing, web browser closing itself for no apparent reason and unexplained loss of hard disk/flash storage space.
However, these symptoms are not a definite indication that a computer is infected. A computer may exhibit these behaviors and still not be infected.
Keeping your system safe from botnets
When it comes to matters of internet security, the importance of keeping applications updated cannot be overestimated. It’s inherent that Windows Update is kept up to date. Installing a properly configured personal firewall as well as antivirus software will also significantly reduce the computer’s exposure to malicious software spread by zombie PCs. An updated firewall will provide the highly needed security enhancements such as protection from remote access to PC.
Protection against cybersecurity vulnerabilities is an ongoing process – installing a firewall, and antivirus software can’t set up everything pertaining internet security forever.
Taking the neighborhood-watch approach to internet security
Fred Felman, a San Francisco security software maker, suggests that the neighborhood-watch approach can be adopted in the fight against malware. He argues that just as people look out for unusual occurrences in neighborhoods and airports, they should also watch out for any weird behaviors on networks. Always watch your machine and the other machines in a network. In case there is a change in its normal functionality, a closer investigation is required to unearth the underlying problem as quickly as possible.