Most users are unaware that their machine has become a zombie computer. This concept is inspired by the zombies of Haitian Voodoo folklore, which is perceived as a corpse resurrected by a sorcerer and enslaved to their commands.
Applications
1 Applications1.1 Advertising1.2 Distributed Denial-of-Service Attacks1.3 Smartphones
Advertising
Zombie computers were known to be used in email spam; in 2005, an estimated 50-80% of all spam globally was sent by zombie computers. Hackers benefit from this by making themselves virtually invisible from law enforcement and significantly reducing bandwidth costs since most owners of infected computers still pay for their internet bills. Widespread spam also caused the emergence of Trojan horses since Trojan horses are not self-replicating. They rely on the movement of emails to grow, compared to computer worms, which can spread in various ways. Zombies are also used for other scams, like click fraud displaying pay-per-click (PPC) advertising, phishing, and money mule recruitment.
Distributed Denial-of-Service Attacks
Zombies can be used to do activities like distributed denial-of-service (DDoS) attacks, a term that refers to the orchestrated flooding of target sites by large numbers of computers at once. The simultaneous requests made by these computers cause overwhelming traffic on the website’s server, causing it to crash and preventing legitimate users from accessing the site. Another variation of DDoS attacks is distributed degradation-of-service (DoS) attacks. It’s the moderated and periodic flooding of target websites, leading to slow server responses. DoS attacks are made instead of the typical DDoS since the latter can be quickly detected and stopped, while DoS attacks done by pulsing zombie computers have long-term effects that can go unnoticed for long periods.
Smartphones
In 2009, similar botnet capabilities also emerged for smartphones. One of the most notable worms was the Sexy Space text message worm, the first botnet-capable worm in the world. It specifically targeted devices with the Symbian OS in Nokia smartphones. Users in the United Arab Emirates were also targeted by the Etisalat by e& Blackberry spyware program.