Date Added: Dec 2009
During the last six years, botnets have become the biggest thorn in the side of cybersecurity professionals. Botnets have become the essential infrastructure used by cybercriminals and nation-states for launching nearly every type of cyberattack: from data exfiltration and espionage to spam and distributed denial of service. By using an extremely cheap-to-acquire and seemingly infinite supply of stolen computing power and bandwidth across the globe, attackers can not only amplify the impact of their attacks but also hide their true identities and locations behind numerous hops of compromised machines in their service. To combat this growing menace, security researchers and key infrastructure partners from telecommunications and domain-registration communities have begun to strategically target and shut down the control infrastructure of most threatening botnets.