zombie computer, computer or personal computer (PC) connected to the Internet and taken over by a computer worm, virus, or other “malware.” Groups of such machines, called botnets (from a combination of robot and network), often carry out criminal actions without their owners’ detecting any unusual activity. Over time, however, most zombie computers accumulate so much malware that they become unusable by their owners. Often, the only cure for heavily infected machines is to completely erase the hard drive and reinstall the operating system. There are millions of zombie computers in the world, about one-fourth of them located in the United States.

The most typical use of botnets is for widely disseminating spam (unwanted commercial e-mail), which makes it difficult to determine the original spammer. Cybercrime experts believe that 50–80 percent of all spam is generated by botnets. Similarly, botnets are used to transmit phishing scams, which seek to extract personal data from unwary individuals. Occasionally, botnets are used to launch denial of service attacks on World Wide Web sites, effectively shutting them down. Although criminals have sometimes tried to extort money from Web site administrators with threats of continual denial of service attacks, such attacks more often are based on some political, environmental, or religious motivation.

Individual zombie computers have been used to store and transmit child pornography and other illegal materials, which has sometimes resulted in the prosecution of individuals, including minors, who are later shown to be innocent. In an effort to combat botnets, some computer security scientists, such as those associated with the German Honeynet Project, have begun creating fake zombies, which can enter into and interact with members of a botnet in order to intercept commands relayed by their operators. This information can then be used to help find and arrest the “masterminds.”

computer chip. computer. Hand holding computer chip. Central processing unit (CPU). history and society, science and technology, microchip, microprocessor motherboard computer Circuit Board
Britannica Quiz
Computers and Technology Quiz

The largest known botnet was uncovered in April 2009. A six-person gang operating out of Ukraine had compromised 1.9 million computers around the world; approximately half were in the United States. The cybercriminals infected others’ computers using JavaScript code executed within a Web browser to install a trojan that they could activate on command. The criminals were discovered after they posted an advertisement on a criminal “black-hat” site offering to rent out portions of their botnet.

William L. Hosch
In full:
malicious software
Key People:
Leonard M. Adleman

malware, malicious computer program, or “malicious software,” such as viruses, trojans, spyware, and worms. Malware typically infects a personal computer (PC) through e-mail, Web sites, or attached hardware devices. Mobile malware, including spyware and ransomware, attacks smartphones and tablets, often through text messages and mobile apps.

Malware may be used to take over PCs, turning them into zombie computers that may form part of a “botnet” used to send out spam or perform denial of service attacks on Web sites. In addition, malware has been used to distribute pornography and unlicensed software. Owners of infected PCs often become aware of a problem only as their machines become progressively slower or they find unidentifiable software that cannot be removed.

Rootkits are one of the worst forms of malware. Their name comes from the fact that they infect the “root-level” of a computer’s hard drive, making them impossible to remove without completely erasing the drives. In efforts to curb copyright infringement, some computer software makers and music companies secretly install detection software on users’ machines. For example, it was revealed in 2005 that the Sony Corporation had been secretly installing rootkits as its music CDs were loaded into PCs. The rootkit was discovered because of the way that it collected information on users’ PCs and sent the data back to Sony. The revelation turned into a public relations disaster, which forced the company to abandon the practice. The practice of monitoring users’ data, with or without installing rootkits, continues in the software industry.

computer chip. computer. Hand holding computer chip. Central processing unit (CPU). history and society, science and technology, microchip, microprocessor motherboard computer Circuit Board
Britannica Quiz
Computers and Technology Quiz

The evolution of malware reached a new milestone in 2010, when the Stuxnet worm proliferated on computers around the world. Characterized as “weaponized software” by security experts, Stuxnet exploited four separate vulnerabilities in the Windows operating system to achieve administrator-level control over specialized industrial networks created by Siemens AG. By attacking these supervisory control and data acquisition (SCADA) systems, Stuxnet was able to cause industrial processes to behave in a manner inconsistent with their original programming, thus crossing the line between cyberspace and the “real world.” While Stuxnet’s intended target remained a matter of debate, the worm demonstrated that SCADA systems, which provide the backbone for such critical infrastructure sites as nuclear power plants and electrical grid substations, could be subverted by malicious code.

Another development in 2010 was the founding of the Israeli cyber-intelligence firm NSO Group for eavesdropping on mobile phones and harvesting their data. Its chief spyware, Pegasus, has been highly controversial, used to track politicians, government leaders, human rights activists, dissidents, and journalists. Although NSO Group claims its product is sold exclusively to government security and law enforcement agencies and only for the purpose of aiding rescue operations and battling criminals, such as money launderers, sex- and drug-traffickers, and terrorists, the spyware was used in 2018 by the Saudi Arabian government to track Saudi journalist and U.S. resident Jamal Khashoggi. Months before Khashoggi’s murder and dismemberment by Saudi agents in October 2018, Pegasus had been attached to the phone of Khashoggi’s wife. Facebook (now Meta Platforms) sued NSO Group under the United States Computer Fraud and Abuse Act in 2019, and two years later, Apple also sued. U.S. President Joseph Biden blacklisted the company in 2021, making it illegal for U.S. firms to sell technology to NSO Group.

William L. Hosch