A botnet (short for “robot network”) is a network of compromised computers or devices, called bots, that are infected with malware and controlled remotely by a cybercriminal known as a bot herder. These bots work together to carry out large-scale malicious activities, including DDoS attacks, data theft, and spam distribution.
Key Takeaways:

A botnet works by infecting multiple devices, such as computers, smartphones, and Internet of Things (IoT) devices, with malicious software that allows a hacker to remotely control them. Once infected, these devices become “bots” or “zombies” and operate under the command of a central authority known as a Command and Control (C2) server.
The motivations for creating botnets are similar to those of most other malicious cyberthreats. Threat actors primarily create botnets for profit, but some use them for activism and to facilitate state-sponsored disruptions.
Several of the most common reasons botnets are created include:
Cybercriminals use botnets for various illegal purposes:
Botnets come in different forms based on their structure and control. Understanding these types helps you identify and mitigate threats more effectively.
Botnets operate silently in the background, making them difficult to detect. However, infected devices often show unusual behavior. Watch for these warning signs that your device may be compromised:
Slower-than-Normal Performance
Your device might become sluggish, take longer to open apps, or respond slowly to commands. This happens because the botnet is using system resources to perform tasks such as sending spam or participating in DDoS attacks.
Unexpected Crashes or Errors
Frequent system crashes, blue screens, or unexplained application errors could indicate that malware is interfering with your system’s normal operations.
Unusual or High Data Usage
A sudden spike in your data usage, especially when you're not actively using the internet, could be a red flag. Botnets often send and receive data in the background without your knowledge.
Device Running Hot While Idle
If your device feels hot even when it's not in use, it could be working overtime for a botnet. Tasks like cryptocurrency mining or spam delivery can strain your processor and battery, causing overheating.
Frequent Pop-Ups or Suspicious Background Activity
Unexpected pop-ups, unknown programs running in the background, or new processes appearing in your task manager may be signs of a malware infection. Botnets often install additional tools to maintain control or expand the infection.
Increased Network Activity
If your router lights are constantly blinking or you notice unusual outgoing traffic when you're not using the internet, a bot might be communicating with a command and control server.
Security Software Disabled or Not Working
Some botnets attempt to disable antivirus programs or prevent updates to keep themselves hidden. If your security software is malfunctioning or won’t launch, it could be a symptom of an infection.

Preventing botnet infections requires a combination of good cybersecurity hygiene, updated technology, and user awareness. Here are essential steps to safeguard your devices and networks:
Organizations must regularly update their operating systems, applications, and firmware to patch known security vulnerabilities that botnets exploit. Enable automatic updates whenever possible for both desktop and mobile devices, as well as IoT equipment like routers and cameras.
Use reputable antivirus and anti-malware tools to detect, quarantine, and remove threats. Modern solutions often include real-time protection, behavioral monitoring, and threat intelligence to identify botnet activity early.
Most botnets begin with a phishing email or a malicious download. Avoid clicking on suspicious links or attachments, especially if the sender is unknown. Watch for emails that urge immediate action or contain strange formatting and grammar.
IoT devices are a favorite target for botnets like Mirai due to their weak default security. To protect them:
Firewalls act as a barrier between your network and potential threats. Configure your firewall to monitor outbound traffic, which can help detect unusual activity, like a device contacting a known C2 server.
Human error remains a major factor in successful botnet infections. Educate employees or family members on the signs of phishing, safe browsing habits, and how to recognize malicious files or websites.
Add an extra layer of protection to your accounts with MFA. Even if a botnet captures your password, it won’t be able to log in without the second authentication factor.
Conduct periodic security checks on your devices and network. Look for outdated software, weak passwords, or unusual access logs. Proactive audits can help you spot signs of compromise before severe damage occurs.
One of the most important steps an enterprise can take to control modern malware is to reduce infection vectors and eliminate the bots' ability to hide. Today, most infection vectors used by botnets are largely unchecked, and botnet traffic is typically small enough to blend seamlessly into regular network traffic.
By regaining complete visibility and control of strictly what traffic is allowed into the network and why, security teams can greatly satisfy both goals.
Several unique functional traits of bots and botnets make them well-suited for long-term infiltration. The bot herder can update bots to modify their entire functionality based on their objectives and to adapt to changes and countermeasures by the target system.
Bots can also employ other infected computers on the botnet as communication channels, offering the bot herder a near-infinite number of communication paths to adjust to changing options and deliver updates. This underscores that infection is the most crucial step because functionality and communication methods can always be altered later as needed.
Since the remote bot herder controls infected computers, a botnet resembles having a malicious hacker inside your network, rather than merely having a malicious executable program.
Once a botnet is discovered, the two widely used approaches for disabling it are to take down the control centers and remove the malware that controls the botnet. The best approach will depend on the botnet's architecture, scale, and the resources available to the organization.
If a botnet employs a client-server architecture, it can be disabled by shutting down the central server or servers that control it. Taking down a botnet control center usually requires the support of law enforcement.
Several approaches can be used to remove botnet malware from individual systems. The easiest is to use anti-virus tools. In cases where this does not work, the system needs to be wiped and reimaged. The malware can be removed from IoT devices by doing a factory reset, reformatting the device, or flashing the firmware.
Several tools and techniques are available to defend against botnet threats. Some are specific to botnets, and others are part of an organization’s overall security program. The following are several tools and techniques that can be employed.
Many botnet attacks are zero-day varieties. The following is a review of several real-world botnet attacks. While most of these have been disabled, a few are still active.
One of the first botnets to gain public attention was the EarthLink botnet, also known as the EarthLink Spammer. Launched in 2000, the botnet was used by its creator and other cyber criminals to send more than 1.25 million phishing emails over the EarthLink network.
This botnet software used Trojan horse malware to infect systems and remotely access users' information. Over a year, the EarthLink botnet affected approximately 12% of EarthLink's email traffic and resulted in an estimated $4.1 million in lost profits for the organization.
Discovered in 2007, the Curtwail botnet was sending more than 51 million emails per minute by 2009, accounting for over 45% of the world's spam. It is estimated that, at its peak, the Curwail botnet comprised 1.5 to 2 million infected computer systems sending 74 billion spam emails a day.
Cutwall targeted Windows systems with Trojan horse malware, which used infected computers as spambots. Cutwail was also used to spread well-known malware families and was used as a DDoS botnet for SSL attacks.
The ZeuS botnet, also known as Zbot, was believed to be the most widely used malware, infecting more than 13 million computers in 196 countries.
ZeuS used Trojan horse malware for several nefarious purposes, including spreading CryptoLocker ransomware and stealing credentials for users' accounts, such as social media, banking, FTP, and email accounts. Over 90% of all online bank fraud incidents were attributed to the ZeuS botnet.
Storm, also known as the Storm Worm Botnet, Dorf Botnet, and E-card Malware, was one of the first peer-to-peer botnets. This Trojan horse malware was available for rent on the dark web.
Believed to have infected up to 2 million computers, Storm was used for various criminal activities, including identity theft, bank fraud, and distributed denial-of-service (DDoS) attacks. This was one of the most virulent botnets, as it had defensive capabilities that thwarted attempts to track and deactivate it.
The Kraken botnet was a massive spyware botnet. It was estimated to have infected 10% of all Fortune 500 companies, but each of the almost 500,000 bots in the network could send about 600,000 emails a day. In addition to its size, the Kraken botnet is believed to have been one of the first to employ evasion techniques to evade detection by anti-malware tools.
Specializing in targeting the pharmaceutical industry with spam, the Grum botnet could send nearly 40 billion emails daily, accounting for around 20% of the world's spam. At its peak, the Grum botnet included more than 100,000 computers.
A notable feature of the Grum botnet was that it used two types of control servers, one for infecting systems and one for sending commands. Additionally, the control servers were located in Panama, Russia, and Ukraine, which provided resiliency and allowed the system to stay operational even when one control server was disabled.
The Mariposa botnet, comprising more than 12 million computers, used worm malware that propagated itself through malicious digital ads, also known as malvertising. This botnet was used to steal sensitive data from over 800,000 users, including credentials for financial services sites and credit card numbers. It was also used to launch online scams and DDoS attacks.
After the client-server ZeuS botnet was disabled, GameOver Zeus (GOZ) emerged with a peer-to-peer architecture, making it harder to disrupt. Before it was disrupted, GameOver Zeus had infected over 250,000 computers and caused an estimated $100 million in monetary losses.
Dridex, also known as Bugat and Cridex, is a Trojan horse malware that mainly spreads through phishing campaigns. It is delivered as a Word or Excel document attachment with a malicious macro that downloads and executes malware.
Distributed through a malware-as-a-service model, this infostealer botnet is used to perform various malicious actions, including stealing users' information by capturing screenshots, keylogging, and launching ransomware attacks.
Built to target Microsoft Windows operating systems, ZeroAccess is a peer-to-peer botnet that uses Trojan horse malware. The ZeroAccess botnet was particularly difficult to disable because it evaded detection by using a trick to disable anti-virus software running on infected systems. Growing to more than 9 million computers, the ZeroAccess botnet was used for cryptocurrency mining and spamming malware.
3ve was the head of three interconnected sub-botnets used for ad fraud. The botnet was used to create more than 5,000 fake websites, spoofing the domains of high-ranking and prestigious publishers and selling their "premium" traffic to advertisers.
3ve was believed to have generated 3-12 billion ad bid requests daily using the more than 1.7 million computers under its control. By using an anti-forensics evasion tactic, 3ve is estimated to have collected around $30 million before it was disabled.
Emotet, also known as Heodo and Geodo, is considered one of the most dangerous botnets because it is polymorphic, changing its code each time it is called up. It uses Trojan horse malware to spread and distribute other malware and ransomware. Threat actors use Emotet to commit financial fraud, espionage, and political sabotage with malicious spam.
The Mirai botnet is known for targeting and weaponizing IoT devices. It is believed to have infected over 600,000 devices, which it uses to launch DDoS attacks. In 2016, it ran a 1TB/second DDoS. The Mirai source code is publicly available and has been used to create hundreds more botnets. Mirai is considered to be the largest IoT botnet.
The simple answer as to what botnets can do is anything. Botnets are used to automate and scale many malicious cyber activities. The following examples demonstrate the variety of actions that botnets can be directed to execute on behalf of cybercriminals.
These functions are made possible because once botnet malware is installed, it enables the botmaster to send commands such as: