March 26, 2007 By Reid Goldsborough
But another dictionary definition is "one who looks or behaves like an automaton." That's the one that applies to computers.
A zombie is a computer that has been taken over by someone else over the Internet and that works like a robot in behalf of the person who has taken it over. The phenomenon is as interesting as it's frightening.
One such beneficial purpose is providing the support for Internet Relay Chat, which is a protocol for chatting over the Internet. But it's the nefarious purposes that are the more interesting.
The most common nefarious purpose is the taking over your and other PCs to send out spam in behalf of a scammer, who prefers to use you to do his dastardly deeds to prevent himself from getting caught.
The spam typically directs recipients to a "phishing" Web site, which mimics a legitimate credit card site, bank site, Internet auction site, Internet payment site, or other business site, with the intention of tricking you into providing your personal information. Using personal information such as your credit card information or Social Security number, the scammer makes purchases in your name, empties your bank account, or otherwise steals your identity.
Another nefarious purpose that botnets are put to is serving unwanted pop-up ads and other advertising on PCs and charging clients each time an ad is clicked on. Yet another is to use others' PCs to launch "denial of service" attacks on big companies or government agencies, shutting down their computer networks. Maybe the scariest purpose of all is using your PC as a zombie to turn other PCs into zombies too, with all of them then used to aid the scammer in his criminal enterprise.
The types of attacks have changed over the past two years, said Brian Trombley, McAfee's product manager for consumer security products, in a phone interview. McAfee (www.mcafee.com) is one of the major and most reliable vendors of Internet security products, with other major vendors including Symantec (www.symantec.com), Trend Micro (www.trendmicro.com), and Microsoft (www.microsoft.com).
In the past, a typical hacker trying to attack or take over your PC was a teenage prankster, who tried to infect other computers with viruses, trojans, worms, and other malicious software or "malware" in order to gain a warped kind of prestige among fellow pranksters. Today, said Trombley, the attacks are more sophisticated and are designed for financial gain ... and your financial loss.
From the research McAfee has done, Trombley believes that organized crime organizations in this country and abroad are behind most of the efforts.
Some people have speculated that among these crime organizations are terrorists groups looking to take advantage of vulnerable Westerners to help finance their terrorist activities. Even though as yet there's no proof of this, logic supports these fears. Scary indeed.
At the World Economic Forum in January 2007, Vint Cerf, one of the fathers of the Internet, estimated that as many as a quarter of all computers connected to the Internet may surreptitiously be part of a botnet used by criminals. Highly publicized botnets include 10,000 zombie PCs controlled by a server in Norway in 2004 and 1.5 million zombie PCs engineered by
You may use or reference this story with attribution and a link to