A network of computer zombies is also known as a ________.

A bot is a piece of malware that infects a computer to carry out commands under the remote control of the attacker.

A botnet (short for “robot network”) is a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder.” Each individual machine under the control of the bot-herder is known as a bot. From one central point, the attacking party can command every computer on its botnet to simultaneously carry out a coordinated criminal action. The scale of a botnet (many comprised of millions of bots) enable the attacker to perform large-scale actions that were previously impossible with malware. Since botnets remain under control of a remote attacker, infected machines can receive updates and change their behavior on the fly. As a result, bot-herders are often able to rent access to segments of their botnet on the black market for significant financial gain.

Common botnet actions include:

  • Email spam– though email is seen today as an older vector for attack, spam botnets are some of the largest in size. They are primarily used for sending out spam messages, often including malware, in towering numbers from each bot. The Cutwail botnet for example, can send up to 74 billion messages per day. They are also used to spread bots to recruit more computers to the botnet.
  • DDoS attacks– leverages the massive scale of the botnet to overload a target network or server with requests, rendering it inaccessible to its intended users. DDoS attacks target organizations for personal or political motives or to extort payment in exchange for ceasing the attack.
  • Financial breach– includes botnets specifically designed for the direct theft of funds from enterprises and credit card information. Financial botnets, like the ZeuS botnet, have been responsible for attacks involving millions of dollars stolen directly from multiple enterprises over very short periods of time.
  • Targeted intrusions– smaller botnets designed to compromise specific high-value systems of organizations from which attackers can penetrate and intrude further into the network. These intrusions are extremely dangerous to organizations as attackers specifically target their most valuable assets, including financial data, research and development, intellectual property, and customer information.

Botnets are created when the bot-herder sends the bot from his command and control servers to an unknowing recipient using file sharing, email, or social media application protocols or other bots as an intermediary. Once the recipient opens the malicious file on his computer, the bot reports back to command and control where the bot-herder can dictate commands to infected computers. Below is a diagram illustrating these relationships:

A network of computer zombies is also known as a ________.

A number of unique functional traits of bots and botnets make them well suited for long-term intrusions. Bots can be updated by the bot-herder to change their entire functionality based on what he/she would like for them to do and to adapt to changes and countermeasures by the target system. Bots can also utilize other infected computers on the botnet as communication channels, providing the bot-herder a near infinite number of communication paths to adapt to changing options and deliver updates. This highlights that infection is the most important step, because functionality and communication methods can always be changed later on as needed.

A network of computer zombies is also known as a ________.

As one of the most sophisticated types of modern malware, botnets are an immense cybersecurity concern to governments, enterprises, and individuals. Whereas earlier malware were a swarm of independent agents that simply infected and replicated themselves, botnets are centrally coordinated, networked applications that leverage networks to gain power and resilience. Since infected computers are under the control of the remote bot-herder, a botnet is like having a malicious hacker inside your network as opposed to just a malicious executable program.

A Zombie is a malicious program that is installed on a device that transforms it into a “zombie” that attacks other systems.

A computer or other device transformed by zombie malware is first infected by a virus or Trojan. It is then deprived of its intended motivations, and instead acts in the service of the zombie (or that program's creator). It then acts as a bot or is joined into a botnet and performs mundane but harmful automated attacks. Zombie computers and assemblages of them, for example botnets, often conduct e-mail spam, silent click fraud against pay-per-click (PPC) advertising, theft of financial or personally-identifiable information (PII), and [distributed] denial-of-service (DDoS, DoS) attacks.

Specific zombie programs throughout to be destroyed, but which can still pose a threat if found on unattended devices for example, include Conficker, Flashback, Storm, Windigo, and Zeus. A novel form of zombie that arose in the early 2010s was cryptocurrency-mining malware that transformed host computers into bitcoin-mining zombies. It hijacked the computing power of laptops, then sufficient to mine digital currency. The coin was then sent to the zombie's creator who profited off of others' competing power and electricity.


“My friend’s Macbook got infected with malware and now his computer is a bitcoin-mining zombie. Does anyone know how to dislodge this from his system?”


Popular Pages

Adversary-in-the-Middle (AitM) SIM Swapping Asymmetric Encryption QR Code (Quick Response Code)

Share This Post

A network of computer zombies is also known as a ________.

Quick Links

  • Contact Us
  • Partners
  • Careers
  • User Guide
  • News Room
  • Accessibility
  • Platform
  • Support
  • Blog
  • FAQ
  • Contact Support
  • Vulnerability Disclosure


  • True Passwordless MFA
  • Passwordless Customer Authentication
  • Passwordless Remote Login
  • True Passwordless SSO
  • True Passwordless MFA for Financial Services

Receive Updates and News from HYPR

Ready to Go Passwordless?

Get a free personalized demo and see for yourself how easy it is to eliminate passwords for your workforce and customers.

Which computers are called zombies?

zombie computer, computer or personal computer (PC) connected to the Internet and taken over by a computer worm, virus, or other “malware.” Groups of such machines, called botnets (from a combination of robot and network), often carry out criminal actions without their owners' detecting any unusual activity.

What does a zombie network mean?

In computing, a zombie is a computer connected to a network that has been compromised by a hacker, a virus or a Trojan. It can be used remotely for malicious tasks.

Why is computer called zombies?

In computing, a zombie is a computer connected to the Internet that has been compromised by a hacker via a computer virus, computer worm, or trojan horse program and can be used to perform malicious tasks under the remote direction of the hacker.

What is another term for a zombie computer army?

(roBOT NETwork) Also called a "zombie army," a botnet is a large number of compromised computers that are used to generate spam, relay viruses or flood a network or Web server with excessive requests to cause it to fail (see denial-of-service attack).