Bot herders[1] are hackers who use automated techniques to scan specific network ranges and find vulnerable systems, such as machines without current security patches, on which to install their bot program.[2] The infected machine then becomes one of many zombies[3] in a botnet and responds to commands given by the bot herder, usually via an Internet Relay Chat channel.

One of the new bot herders includes the controller of Conficker.

A bot herder usually uses a pseudonym to keep themselves anonymous and may use proxy servers, shell accounts, and bouncers to conceal their IP address thus maintaining anonymity.

See also

References

  1. Goodin, Dan. "Microsoft goes bot herder hunting in streets of Russia". www.theregister.com.
  2. "Bot herder | Malwarebytes Glossary". Malwarebytes.
  3. "Bugtraq". bugtraq.securityfocus.com.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.