FBI 2 300WASHINGTON, D.C. (6/8/13) - Last month, the head of an international securities fraud ring was sentenced to federal prison for manipulating stock prices by using botnets to distribute spam promoting those stocks. And several months ago, 10 members  of an international cyber-crime ring were arrested for using botnets to steal more than  $850 million after obtaining personal financial information from compromised computers.

The use of botnets is on the rise and industry experts estimate that botnet attacks have resulted in the overall loss of millions of  dollars from financial institutions and other major U.S. businesses. They've also affected universities, hospitals, defense contractors, law enforcement, and all levels of government.

What exactly is a botnet? A bot, or web robot, is an automated malware program that scans blocks of network addresses and infects vulnerable computers. A network of these infected computers-numbering in the hundreds of thousands or even millions-is called a botnet (robot network), and each computer becomes connected to a command- and-control server operated by the criminal.

Once the botnet is in place, it can be used in distributed denial of service (DDoS) attacks, proxy and spam services, malware distribution, and other organized criminal activity. Botnets can also be used for covert intelligence collection, and terrorists or state-sponsored actors could use a botnet to attack Internet-based critical infrastructure. And, they can be used as weapons in ideology campaigns against their target to instigate fear, intimidation, or public embarrassment.

Your personal computer could become part of a botnet-it only takes one wrong click for you to download malicious code. For example, you might get an unsolicited e-mail promoting a dating website or a work-at-home arrangement or an e-mail that appears to come from your bank containing a seemingly harmless link. You could be sent a link by a friend asking you to view a great video (which was actually sent because the friend's  computer is already infected). You could see a link on a webpage that seems to be soliciting donations for a recent tragedy. And you might even visit a fraudulent website-or a legitimate one that's been compromised-and download video, pictures, or a document containing malicious code.

Your personal computer could become part of a botnet-it only takes one wrong click for you to download malicious code. For example, you might get an unsolicited e-mail promoting a dating website or a work-at-home arrangement or an e-mail that appears to come from your bank containing a seemingly harmless link. You could be sent a link by a friend asking you to view a great video (which was actually sent because the friend's computer is already infected). You could see a link on a webpage that seems to be soliciting donations for a recent tragedy. And you might even visit a fraudulent website-or a legitimate one that's been compromised-and download video, pictures, or a document containing malicious code.

Once the malware is on your computer, it's hard to detect. And in addition to your computer being commanded to link up with other compromised computers to facilitate criminal activity, the bot can also collect and send out your personal identifiable information-like credit card numbers, banking information, and passwords-to the criminals running it. Those criminals will take advantage of the information themselves or offer it for sale on cyber-criminal forums, and you could find yourself being victimized again.

The FBI-with its law enforcement and private sector partners-has had success in taking down a number of large botnets, most notably Coreflood. By combining the resources of government and the private sector-and with the support of the public, they will continue to improve cyber-security by identifying and catching those who threaten it.

If you think your computer may be part of a botnet, file a complaint with the Internet Crime Complaint Center (IC3) http://www.ic3.gov/ and/or contact the cyber task force at your local FBI office http://www.fbi.gov/contact-us/field.

SurfKY News
Information provided by the Federal Bureau of Investigation

.
e-max.it: your social media marketing partner

LIKE SurfKY on Facebook - Click here to LIKE us now.

© Copyright 2015 SurfKY News Group, Inc. All rights reserved. This material may not be published, broadcast, or rewritten without permission. SurfKY News encourages you to share this story on social media.

Posted on 2/2/14
3/13 - 16
3/13 - 16

Most Read This Week

July 27, 2015 5260

Death of Central City Man in Dawson Springs Under…

by SurfKY News
July 27, 2015 3664

School System Announces Free Lunch/Breakfast at…

by SurfKY News
July 28, 2015 2102

Hanson Youth Wins Soap Box Derby World…

by Tammy Holloway, SurfKY News
July 27, 2015 2001

Family Needs Help in Paying 18-Year-Old's Funeral…

by SurfKY News
July 28, 2015 1917

Heavy Rains, Two Wrecks Impede WKP Travel

by Doreen Dennis, SurfKY News

Most Read This Month

July 02, 2015 19553

Emergency Response Team on Scene of Standoff on…

by Doreen Dennis, SurfKY News
July 17, 2015 15732

Muhlenberg Most Wanted - Top 10

by SurfKY News

Stories Trending Now

July 28, 2015 1917

Heavy Rains, Two Wrecks Impede WKP Travel

by Doreen Dennis, SurfKY News
July 29, 2015 1709

Miss Hopkins County Fair 2015 Chosen

by Tammy Holloway, SurfKY News
July 29, 2015 1435

Crime Stoppers Top Most Wanted - July 29, 2015

by SurfKY News
July 29, 2015 981

PPD Warns Public: Beware of Facebook Scam

by SurfKY News
July 29, 2015 820

Local Teen Cited on Charges for Alleged…

by SurfKY News
July 29, 2015 802

Madisonville Police Arrest Reports Released -…

by SurfKY News
July 29, 2015 639

Yeti Spotted at Hanson Pharmacy

by SurfKY News
July 29, 2015 634

Crime Stoppers Fugitive of the Week – July 29,…

by SurfKY News
July 29, 2015 569

Muhlenberg County Head Start Preschool Program…

by Charles W. Riley II, SurfKY News
July 29, 2015 502

24th Annual Miss Teen Hopkins County Fair Pageant…

by Tammy Holloway, SurfKY News