Pandora’s Bot: How Cyber Weapons Can Wreak Havoc

Bottom Line: U.S. cyber defenders know how to take down botnets – networks of computers that have been hacked to act as one – but not how to keep them from coming back, nor necessarily how to determine who is behind them and hold them accountable. These networks under the remote control of hacktivist, criminal or state-sponsored hackers are able to wreak havoc on modern society by enabling theft, espionage, information warfare and disruption at an unprecedented scale.

Background: Botnets spread by scanning networks for computers running software with known vulnerabilities or easily guessable default passwords that can be automatically exploited, or by spamming inboxes with automated social engineering emails to trick protected users into compromising their own security. Once built, botnets are able to siphon off personal, financial or even confidential information, amplify disinformation on social media sites, and disrupt critical services by flooding third party servers with artificial traffic until they get knocked offline.

“The Cipher Brief has become the most popular outlet for former intelligence officers; no media outlet is even a close second to The Cipher Brief in terms of the number of articles published by formers.” —Sept. 2018, Studies in Intelligence, Vol. 62

Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Subscriber+

Categorized as:InternationalTagged with:

Related Articles

How Safe Would We Be Without Section 702?

SUBSCRIBER+EXCLUSIVE INTERVIEW — A provision of the Foreign Intelligence Surveillance Act that has generated controversy around fears of the potential for abuse has proven to be crucial […] More

Search

Close