Authored by a Symantec employee
Bots, or Internet robots, are also known as spiders, crawlers, and web bots. While they may be utilized to perform repetitive jobs, such as indexing a search engine, they often come in the form of malware. Malware bots are used to gain total control over a computer.
One of the typical “good” bot uses is to gather information. Bots in such guises are called web crawlers. Another “good” use is automatic interaction with instant messaging, instant relay chat, or assorted other web interfaces. Dynamic interaction with websites is yet another way bots are used for positive purposes.
Malicious bots are defined as self-propagating malware that infects its host and connects back to a central server(s). The server functions as a “command and control center” for a botnet, or a network of compromised computers and similar devices. Malicious bots have the “worm-like ability to self-propagate,” and can also:
- Gather passwords
- Log keystrokes
- Obtain financial information
- Relay spam
- Capture and analyze packets
- Launch DoS attacks
- Open back doors on the infected computer
- Exploit back doors opened by viruses and worms
Bots are usually used to infect large numbers of computers. These computers form a “botnet,” or a bot network.
One of the many unfortunate things about malicious bots is the fact that they can easily go unnoticed. They hide in “the shadows” of a computer, and many times have file names and processes similar if not identical to regular system files/processes.
The download method is one of the ways in which bots infect your computer. Malware is delivered in download format via social media or email messages that advise clicking a link. The link is often in picture or video form, with either containing viruses and other malware.
Another typical bot attack comes in the form of “scare tactics.” Many times a bot will appear as a warning saying that if you do not click on the associated link, your computer will get a virus. Clicking the link subsequently infects your computer with a virus.
Is Your Computer Infected?
Here are some of the many ways to tell if your computer is infected by bots:
- Internet access is slow for no apparent reason.
- The computer crashes for no apparent reason.
- The fan goes into overdrive when the device is idle.
- The computer takes a long time to shut down, or fails to shut down correctly.
- Pop-up windows and advertisements appear even when you aren’t using a web browser.
- Friends and family receive email messages you did not send.
- Computer programs are running slowly.
- Settings have changed, and there’s no way to reverse them.
- The browser features components you didn’t download.
How Do I Protect My Computer From Bots?
It’s very possible to protect your computer from bots, but it takes diligence and knowing what to look for. Use the following tips to keep your computer safe:
- Install firewalls to block malicious attacks and never turn them off.
- Use a long and complicated password that contains numbers and symbols.
- Never use the same password for multiple programs.
- Install quality anti-malware software such as Norton Security to protect your device.
- Ensure software is up to date, and never ignore system updates.
- Refrain from using flash drives, or thumb drives, in an infected computer.
How Do I Clean Up My Infected Computer?
If your computer is already infected by bots, protecting your data is the most important thing. Disconnect the computer from the network as soon as possible, which will halt the theft of sensitive information. It also prevents your computer from being used to attack other networks. The next step is moving all important/personal data to another computer or external hard drive—just make certain they’re malware-free first! Once this is complete, you’ll need to clean your computer using assorted security tools, or by having a professional work on the device.
Remember, prevention is the best medicine in regard to bots and all other malware. Stay up to date with your software, never click on anything suspicious, and utilize anti-malware techniques to the fullest extent.
Symantec Corporation, the world’s leading cyber security company, allows organizations, governments, and people to secure their most important data wherever it lives. More than 50 million people and families rely on Symantec’s Norton and LifeLock comprehensive digital safety platform to help protect their personal information, devices, home networks, and identities.
© 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Norton, Norton by Symantec, LifeLock, and the Lockman Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Google Chrome is a trademark of Google, Inc. Mac, iPhone and iPad are trademarks of Apple Inc. Microsoft and the Windows logo are trademarks of Microsoft Corporation in the United States and/or other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.