Your Zombie PC

Your Zombie PC

What is a zombie PC? Simple everyday people who go about doing their own everyday things while surfing the internet own a zombie PC. Although the innocent computer users are unaware that their computer is being used for sending spam, which leads to the person being unknowingly used by a hacker in acts of spamming. Simply put, a zombie PC is a Private Computer that malware has silently attacked. The infectious malware instigates the computer into becoming one of its own. Once a private computer has been infected, it is an instrument used by a spammer for further instigation of perhaps thousands of emails being sent from a zombie PC.

Once your PC has been transformed into a zombie PC, it becomes one in a network of small zombie groups called botnets. Botnets can be involved with sending out spam that may carry viruses, worms and phishing attempts to infect other online users. As to date zombie can be employed to send malware that features the use of hidden programs, which by all appearances seem to be human participants clicking advertisement links on a website or blog. Hackers also use zombies to commit acts of Denial of Service or DoS attacks, on companies, which are designed to cause a hosted web page within a network or website to become inaccessible to employees and customers. As a result, the company attacked by DoS in all probability looses customers and any business income that may have been conducted on the scheduled day of the attack.

Hacker’s are also inclined to promote pump and dump stock methods, which is a scheme that involves the spammer buying up a large block of sub-dollar stock, and then using zombies to send spam to millions of other email users. The ploy behind this technique is to lure individual buyers into buying shares of said stock, which will prematurely elevate the stocks value; subsequently the spammer sells his smallholdings and makes more fast, yet dishonest money. A zombie is also used for installing unsolicited software, uninstalling your own software, modifying and deleting your computer files as well as transmitting case sensitive login and password sequences to the hacker’s computer.

Hacker’s are also known to share their list of systems that have succumbed to a netbot attack with their peers. These systems are shared as a free for all collection of targeted machines, by other dishonest computer users. Attackers also scan the internet for cooperative computer systems that send a sociable signal of ease to being scanned, and attack these systems easily. A zombie computer may show symptoms of infection recognizable as unwarranted hard drive activity, slow-moving broadband connection as well as an unresponsive keyboard or mouse. Other signs are email notifications from unknown people reporting bounced email notifications.

However, it is possible for computer to show these signs, yet not be infected by malware viruses. Computer users are encouraged to educate themselves and their employees to keep their forms of security software updated as well as use their virus scan on a regular basis. They must also be leery of any unsolicited email, and avoid opening any unknown attachments, regardless of the sender’s identification. Internet users are also cautioned that instance messages are often targets of malware attacks. File sharing networks are rampant with every form of malicious code conceivable, online users are admonished to understand that anonymous file sharing is not safe.