Botnets are wide networks of pirated devices that can be operated remotely by their master (the hacker). Criminal syndicates mostly use them for profits, such as used to mine crypto-currencies, or they can be targeted to use up the bandwidth – thereby, slowing down the various site, through the denial of service attacks.
谁面临僵尸网络的风险?
僵尸网络的主要目标设备是过时的机器--仍在运行,但被忽视,被遗弃在学校、气象站、博物馆的角落里--以及不安全的物联网小工具。
Simply put, when an internet-connected device stays out of date for so long, then it becomes vulnerable since more unaddressed security flaws are discovered. These security flaws will somewhat give access to the attacker, who will control your machine remotely – they will then send any illegal tasks to it, say a task to open the server.
此外,任何计算机如果长期无人值守,最终都会耗尽带宽和处理能力;再加上一些奇怪的行为,甚至连创建者也会解决这些问题。监控摄像头、智能冰箱、恒温器、图书馆电脑等一些设备始终面临僵尸网络攻击的风险,这些设备可能会受到攻击,并长期处于无人注意的状态。
僵尸网络与物联网
Most IoT devices always ship with weak-default passwords, and their pattern of login credentials is always the same. And with each tech-advancing day, manufacturers are using poorer security techniques on their smart gadgets, while exerting pressure for lower prices.
The extent of how insecure most smart-home gadgets might be is overly undetermined. The joke on the security of IoT devices was heightened by the attempt of the Japanese government who wanted to use the default login credentials to hack into these smart-home devices – as a security measure, they said.
It remains a subject of discussion, whether it’s the right move by authorities to demand access to its citizen’s private possessions. However, an argument continues, whether using default login credentials on these gadgets is the same as leaving them without passwords at all.
也许可以用现实生活中的例子来说明:让警察在停车场巡逻,试图找到未上锁的车辆,这可以吗?让这些警察去试着关上未上锁车辆的车门,这样好吗?
僵尸网络有什么作用?
僵尸网络可以造成各种常见的安全危害,这取决于操作者的目的:
- Spam; Botnets can distribute millions of spam globally. They can use email platforms to spread their spam messages. For instance, in 2018, the average email spam sent between January and September was 56.69%.
- 恶意软件;僵尸网络可以向不安全的机器发送恶意软件和间谍软件。大多数犯罪集团利用僵尸网络买卖各种犯罪企业。
- 数据;僵尸网络可以获取你的密码和其他个人数据。
- Click baits; botnets can send phishing links, adverts and specific attractive images with false information.
- 加密货币;僵尸网络能够向不安全的设备发送私人控制器,以挖掘比特币和其他加密货币,而不会引起法律纠纷。
- DDoS;僵尸网络欺诈者可以将这些不安全机器的功率导向目标设备,使其处于离线模式的 DDoS 模式。
僵尸网络欺诈者通常会调整网络设置,以实现其中的一些功能,从而获取利润。例如,向美国公民发送医疗垃圾邮件的僵尸网络运营商,也会让他们的药剂师提供药品和产品。
如何防止僵尸网络攻击您的设备
经常更新机器软件应用程序,以获得最新的网络安全功能。养成不断更改各种智能家居设备密码的习惯--切记遵守密码创建规则。
However, all IoT device manufacturers are expected to start practicing improving the security levels of its products. Users should also demand improved privacy and protection when using smart devices.
Be Smart, Use IPBurger VPN
Using IPBurger VPN especially on your router will protect all your devices from most internet threats and attacks. IPBurger VPN uses the AES 256-bit encryption which ensures no prying eyes get access to your data nor devices. IPBurger VPN also ensures your devices are private when they access the internet. This is because IPBurger VPN assigns them a virtual IP address which hides their real IP address hence privacy.