How Zombie Computers Work


Preventing Zombie Computer Attacks

You don't want your computer to become a zombie, so what do you do to prevent it? The most important thing to remember is that prevention is an ongoing process -- you can't just set everything up and expect to be protected forever. Also, it's important to remember that unless you employ common sense and prudent Internet habits, you're courting disaster.

Antivirus software is an absolute necessity. Whether you purchase a commercial package like McAfee VirusScan or download a free program like AVG Anti-Virus Free Edition, you need to activate it and make sure your version remains current. Some experts say that to be truly effective, an antivirus package would need to update on an hourly basis. That's not practical, but it does help stress the importance of making sure your software is as up to date as possible. For more information, read our article on How Computer Viruses Work.

Install spyware scanners to search for malicious spyware. Spyware includes programs that monitor your Internet habits. Some go even further, logging your keystrokes and recording everything you do on your computer. Get a good anti-spyware program like Ad-Aware from Lavasoft. Like the antivirus software, make sure the program stays up to date. To learn more, read our article on How Spyware Works.

Install a firewall to protect your home network. Firewalls can be part of a software package or even incorporated into some hardware like routers or modems. To learn more about firewalls, be sure to read our article on How Firewalls Work.

You should also make sure that your passwords are difficult or impossible to guess, and you shouldn't use the same password for multiple applications. This makes remembering all those passwords a pain, but it gives you an added layer of protection.

If your computer has already been infected and turned into a zombie computer, there are only a few options open to you. If you have access to tech support who can work on your computer for you, that would be the best option. If not, you can try to run a virus removal program to kill the connection between your computer and the cracker. Unfortunately, sometimes the only option you have is to erase everything on your computer and reload its operating system, then starting from scratch. You should make backup disks of your hard drive on a regular basis just in case. Remember to scan those files with an antivirus program to make sure none of them are corrupted.

Your computer is a great resource. Sadly, crackers think the same thing -- they want to make your computer their own resource. If you practice careful Internet habits and follow the tips we've described on this page, your chances of your computer remaining secure are very good.

To learn more about zombie computers and how to avoid them, check out the links below.

Related How Stuff Works Articles:

More Great Links

Sources

  • "A good bot roast." The Economist Online. June 21, 2007. http://www.economist.com/world/international/displaystory.cfm?story _id=9375697
  • "Botnets and Hackers and Spam (Oh My)! OnGuard Online. http://onguardonline.gov/botnet.html
  • "Bots, Drones, Zombies, Worms and other things that go bump in the night." SwatIt.org. http://www.swatit.org/bots/
  • "Operation: Bot Roast." Federal Bureau of Investigations. June 13, 2007. http://www.fbi.gov/page2/june07/botnet061307.htm
  • "Virtual attacker arrested in Hanoi." Thanh Nien. August 1, 2006. http://www.thanhniennews.com/education/?catid=4&newsid=18363
  • "Your computer could be a 'spam zombie.'" CNN.com. http://www.cnn.com/2004/TECH/ptech/02/17/spam.zombies.ap/
  • Acohido, Bryan and Swartz, Jon. "Are hackers using your PC to spew spam and steal?" USA Today. September 8, 2004. http://www.usatoday.com/tech/news/computersecurity/2004-09-08- zombieuser_x.htm
  • Bächer, Paul, et al. "Know your Enemy: Tracking Botnets." The Honeynet Project & Research Alliance. March 13, 2005. http://www.honeynet.org/papers/bots/
  • Berger, Sandy. "Zombie Computers Abount." AARP Online. http://www.aarp.org/learntech/computers/howto/zombie.html
  • Biever, Celeste. "Spies infiltrate zombie computer networks." NewScientist. March 16, 2005. http://www.newscientist.com/article.ns?id=dn7158
  • Chapman, Greg. "As the Worm Turns...Your Computer into a Zombie." TechTrax. http://pubs.logicalexpressions.com/Pub0009/LPMArticle.asp?ID=218
  • Durkota, Michael D. "Recovering from a Trojan Horse or Virus." United States Computer Emergency Readiness Team. http://www.us-cert.gov/reading_room/trojan-recovery.pdf
  • How to remove a Trojan, Virus, Worm or other Malware. Bleeping Computer. May 18, 2005. http://www.bleepingcomputer.com/tutorials/tutorial101.html
  • Markoff, John. "Attack of the Zombie Computers Is Growing Threat." The New York Times. January 7, 2007. http://www.nytimes.com/2007/01/07/technology/07net.html?ex= 1325826000&en=cd1e2d4c0cd20448&ei=5090
  • Raisbeck, Fiona. "Postini: Spam, botnet levels soar." SC Magazine. January 10, 2007. http://www.scmagazine.com/us/news/article/625355/
  • Reid, Tim. "Spam King and the zombie computers." TimesOnline. June 2, 2007. http://technology.timesonline.co.uk/tol/news/tech_and_web/article 1873105.ece
  • Spring, Tom. "Spam Slayer: Slaying Spam-Spewing Zombie PCs." PC World. June 20, 2005. http://www.pcworld.com/article/id,121381-page,1/article.html
  • Stopping Zombies Before They Attack: Microsoft Teams with Federal Trade Commission and Consumer Action to Promote PC Protection. Microsoft. http://www.microsoft.com/presspass/features/2005/oct05/10-27 Zombie.mspx
  • Turner, Dean, et al. "Symantec Internet Security Threat Report: Trends for July-December 06." Volume XII, published March 2007. http://www.symantec.com/enterprise/theme.jsp?themeid=threatreport
  • Tynan, Daniel. "Zombie PCs: Silent, Growing Threat." PCWorld. http://www.pcworld.com/article/id,116841-page,1/article.html
  • US-CERT http://www.us-cert.gov

More to Explore