How do you perform on a test that checks if your device can contact a known Botnet?

How are we testing?:

This test tries to contact a known Botnet command and control server ('calling home') and download a benign file. The server is selected from Google's Safebrowsing list; real information is not sent out.

Why is this test important?:

Once a device is 'botted,' it's no longer entirely under your control - criminals can now direct it for their own purposes. 'Botted' devices might try to exfiltrate your intellectual property or credentials, infect other machines on your internal network, participate in Distributed Denial of Service attacks, email spam, spread spyware and more.

Take our security preview now

Botnets affect millions of computers

Tens of millions of computers are taken over by botnets every year. In one example, the notorious Gameover ZeuS botnet, blamed for infecting over one million computers in 12 countries and the theft of more than $100 million worldwide, has already been revived by criminals - just five weeks after its takedown by the FBI. Source

In the News:

Locky Ransomware Returns yet Again Thanks to the Necurs Botnet ... - The Merkle

26 Apr 2017
Even though a lot of people had hoped Locky ransomware would finally disappear into obscurity, it appears we are not so lucky after all. In fact, researchers ...

The Necurs Botnet: A Pandora's Box of Malicious Spam - Security Intelligence (blog)

24 Apr 2017
Since its initial launch five years ago, the Necurs botnet has quickly ascended the cybercriminal ranks. Today, it controls more than 6 million endpoints.

Amnesia botnet targeting DVRs, Palo Alto report - SC Magazine

06 Apr 2017
Over a quarter of a million devices used with DVRs around the globe are susceptible to a new botnet its discoverers have dubbed Amnesia. Unit 42 researchers at Palo Alto Networks announced on Thursday their detection of a new variant of the IoT/Linux ...

More »