Stage 1: A hacker sends out a virus or worm over the internet to infect vulnerable home computers. This creates a network of slave machines known as a botnet. Stage 2: The hacker sells or hires out the botnet to other criminals who use it for fraud, spamming, DDoS attacks and other cyber crimes.