What's a "botnet"?

Answers to your questions about the news.
April 30 2008 6:57 PM

What's a Botnet?

An army of infected computers that can send out 100 billion spam e-mails a day.


Microsoft revealed this week that it is helping law enforcement officials track down the operators of "botnets," or networks of computers that can be used to send out spam messages without the knowledge of their owners. Though the software company is tight-lipped about the specifics, Canadian security forces have already used Microsoft's information to bring down a botnet that infected close to 500,000 machines. What is a botnet, exactly?

It's a virus, worm, or other piece of software—the "bot"—which runs covertly on a series of computers—the "net." While several researchers are attempting to construct "good" botnets capable of protecting servers or undertaking massive computations, the term most often refers to viruses and other malicious programs that install on a computer without permission. Once a computer has been infected by a bot and recruited into the network—i.e., turned into a "zombie"—it surreptitiously communicates with a central command server or with other bots. Popular botnet activities include sending spam or flooding a targeted site with so much Web traffic that it's forced to shut down. (The latter is known as a "denial of service attack.")


At a recent conference of security analysts, one malware researcher reported that the 11 biggest botnets in the world comprise 1 million machines, and can send 100 billion spam e-mails per day. As security researchers develop more and more sophisticated means of tracking and detecting these threats, the authors of the predatory programs continue to find innovative ways to spread their bots and hide their tracks.

For example, early botnets tended to set up a direct line of communication between the infected computer and the person controlling the network—sometimes known as the "botmaster." This was done via a communication system called Internet Relay Chat (which was also used in early instant messaging systems). But a system like this makes it relatively easy for researchers to isolate a copy of the bot software, dissect it, and track down the server where the bot is phoning home. More sophisticated virus programmers have now turned to peer-to-peer systems, where bots disseminate commands through the network, in a "pass it along" system of giving orders. This makes it harder for investigators to find the source of the commands.

Until recently, the most infamous of these threats was a botnet called Storm Worm, so named because it originally propagated through e-mails in early 2007 with the subject line "230 dead as storm batters Europe." Microsoft claimed last week that its bot-hunting software had finally crushed Storm, but others were suspicious. In any case, Storm Worm is at the least significantly scattered, but several other botnets have taken its place. While researchers continue to track the newest threats, study their code, and devise new ways to detect and combat the bots, most concede that the computer security arms race won't end anytime soon.

Got a question about today's news? Ask the Explainer.

Explainer thanks Elizabeth Clarke and Joe Stewart of SecureWorks.



The Democrats’ War at Home

How can the president’s party defend itself from the president’s foreign policy blunders?

Congress’ Public Shaming of the Secret Service Was Political Grandstanding at Its Best

Michigan’s Tradition of Football “Toughness” Needs to Go—Starting With Coach Hoke

A Plentiful, Renewable Resource That America Keeps Overlooking

Animal manure.

Windows 8 Was So Bad That Microsoft Will Skip Straight to Windows 10


Cringing. Ducking. Mumbling.

How GOP candidates react whenever someone brings up reproductive rights or gay marriage.

Building a Better Workplace

You Deserve a Pre-cation

The smartest job perk you’ve never heard of.

Hasbro Is Cracking Down on Scrabble Players Who Turn Its Official Word List Into Popular Apps

The Ludicrous Claims You’ll Hear at This Company’s “Egg Freezing Parties”

  News & Politics
Sept. 30 2014 9:33 PM Political Theater With a Purpose Darrell Issa’s public shaming of the head of the Secret Service was congressional grandstanding at its best.
Oct. 1 2014 8:34 AM Going Private To undertake a massively ambitious energy project, you don’t need the government anymore.
The Vault
Oct. 1 2014 10:49 AM James Meredith, Determined to Enroll at Ole Miss, Declares His Purpose in a 1961 Letter
  Double X
The XX Factor
Sept. 30 2014 12:34 PM Parents, Get Your Teenage Daughters the IUD
  Slate Plus
Behind the Scenes
Oct. 1 2014 10:54 AM “I Need a Pair of Pants That Won’t Bore Me to Death” Troy Patterson talks about looking sharp, flat-top fades, and being Slate’s Gentleman Scholar.
Brow Beat
Oct. 1 2014 10:44 AM Everyone’s Favorite Bob’s Burgers Character Gets a Remix You Can Dance to
Future Tense
Oct. 1 2014 10:27 AM 3,000 French Scientists Are Marching to Demand More Research Funding
  Health & Science
Bad Astronomy
Oct. 1 2014 7:30 AM Say Hello to Our Quasi-Moon, 2014 OL339
Sports Nut
Sept. 30 2014 5:54 PM Goodbye, Tough Guy It’s time for Michigan to fire its toughness-obsessed coach, Brady Hoke.