Botnet — Network of Compromised Systems Controlled Remotely

A Botnet is a network of compromised devices remotely controlled by an attacker for coordinated malicious activity. This SECMONS glossary entry explains how botnets operate, how they are built, and how they are used in DDoS attacks, spam campaigns, and ransomware distribution.

What Is a Botnet? 🧠

A Botnet is a network of compromised computers, servers, or IoT devices that are remotely controlled by an attacker.

Each infected device (often called a “bot” or “zombie”) connects back to attacker-controlled infrastructure described under /glossary/command-and-control/.

Botnets enable coordinated malicious activity at scale.


How Botnets Are Built 🎯

Botnets are typically established through:

  • Malware distribution
  • Exploitation of vulnerabilities listed under /vulnerabilities/
  • Weak or default credentials
  • Security misconfigurations
  • Phishing campaigns
  • Exploitation of internet-facing services

Compromise often begins with techniques described in /glossary/initial-access/.

Once infected, devices maintain /glossary/persistence/ and communicate with central infrastructure.


Common Uses of Botnets 🔎

Botnets are frequently used for:

Activity Purpose
Distributed Denial of Service (DDoS) Overwhelm target infrastructure
Spam Distribution Send large volumes of malicious email
Credential Stuffing Automate login attempts
Malware Propagation Spread additional payloads
Ransomware Deployment Deliver ransomware at scale
Data Exfiltration Relay stolen information

Large botnets can involve thousands to millions of infected devices.


Botnet Architecture 🔬

Botnets may use different control structures:

Architecture Description
Centralized Single C2 server controls bots
Peer-to-Peer (P2P) Bots communicate with each other
Hybrid Combination of centralized and distributed control

Peer-to-peer models are more resilient to takedown efforts.


Botnet vs Malware 🔄

Concept Scope
Malware Software used to compromise devices
Botnet Collection of compromised devices
Backdoor Persistent access mechanism
Threat Actor Entity controlling botnet

Botnets are infrastructure. Malware is the infection mechanism.


Detection Challenges ⚠️

Botnets are difficult to detect because:

  • Traffic may appear as normal outbound communication
  • Encryption hides payload content
  • IoT devices often lack logging visibility
  • Distributed architecture complicates takedown
  • Devices may be geographically dispersed

Botnet activity frequently overlaps with:


Defensive Considerations 🛡️

Reducing botnet risk requires:

  • Strong patch management
  • Disabling unnecessary services
  • Changing default credentials
  • Network segmentation
  • Monitoring abnormal outbound connections
  • Threat intelligence feeds
  • IoT security governance

If a vulnerability is marked as /glossary/exploited-in-the-wild/, rapid patching is critical to prevent mass exploitation.


Why SECMONS Treats Botnets as Strategic 📌

Botnets represent scale.

They allow attackers to amplify impact far beyond a single compromised system.

Understanding botnet architecture and usage helps defenders anticipate distributed attacks and infrastructure-level threats.


Authoritative References 📎

  • MITRE ATT&CK — Command and Control
  • CISA Distributed Denial of Service Guidance