Page last updated at 10:51 GMT, Thursday, 4 September 2008 11:51 UK

Zombie plague sweeps the internet

Monitor and computer, Eyewire
Botnet operators are keen to hijack PCs and turn them into zombies

The summer saw a surge in the number of hijacked home PCs or "zombies", say security experts.

The Shadowserver Foundation, which tracks zombie numbers worldwide, said it had seen at least a threefold increase in the last three months.

More than 450,000 computers are now part of zombie networks, or botnets, run by hi-tech criminals, it said.

The rise is believed to be linked to attacks that booby-trap websites to try to infect the machines of visitors.

Attack vector

Criminals are keen to recruit new machines to a botnet to create a resource that they can use or which can be hired out to other gangs.

Most spam or junk mail is routed through the hijacked machines forming a botnet. The collection of PCs are often used to launch attacks on other websites, as anonymous stores for stolen data and to help with phishing scams.

The vast majority of machines in these botnets will be PCs running a version of Microsoft Windows.

In June 2008 Shadowserver Foundation knew about more than 100,000 machines that were part of a botnet. By the end of August this figure had exceeded 450,000 machines.

The Shadowserver Foundation is a group of security professionals who volunteer their time to track and measure botnets to help law enforcement investigations.

The rise in numbers has been accompanied by a fall in the number of so-called command and control (C&C) servers tracked by the Shadowserver group suggesting that hi-tech criminals are concentrating their resources. As their name implies, the C&C servers co-ordinate the use of all the machines linked to them.

The jump in individual zombie numbers is linked to a series of wide-spread attacks that inject malicious code on to legitimate websites that tries to compromise any visiting machine.

In recent months many hi-tech criminals have turned to web attacks to recruit new victims rather than rely on sending viruses out via e-mail.

Typically, a machine is compromised via a vulnerability in one of the programs it runs. Inside this initial attack program will be code that directs it to contact a C&C server which then downloads software to put it completely under the control of a botmaster.

The machines in any individual botnet can be spread across many different nations.


SEE ALSO
Jail sentence for botnet creator
12 Jun 08 |  Technology
Zombie PCs growing quickly online
22 Feb 06 |  Technology
Tackling the botnets at source
05 Oct 06 |  Technology
The battle against the botnet hordes
21 Feb 08 |  Technology
Hi-tech thieves target Olympics
09 Aug 08 |  Technology
FBI tries to fight zombie hordes
14 Jun 07 |  Technology

RELATED INTERNET LINKS
The BBC is not responsible for the content of external internet sites


FEATURES, VIEWS, ANALYSIS
Has China's housing bubble burst?
How the world's oldest clove tree defied an empire
Why Royal Ballet principal Sergei Polunin quit

BBC navigation

BBC © 2014 The BBC is not responsible for the content of external sites. Read more.

This page is best viewed in an up-to-date web browser with style sheets (CSS) enabled. While you will be able to view the content of this page in your current browser, you will not be able to get the full visual experience. Please consider upgrading your browser software or enabling style sheets (CSS) if you are able to do so.

Americas Africa Europe Middle East South Asia Asia Pacific