How do you perform on a test that checks if your device can contact a known Botnet?

How are we testing?:

This test tries to contact a known Botnet command and control server ('calling home') and download a benign file. The server is selected from Google's Safebrowsing list; real information is not sent out.

Why is this test important?:

Once a device is 'botted,' it's no longer entirely under your control - criminals can now direct it for their own purposes. 'Botted' devices might try to exfiltrate your intellectual property or credentials, infect other machines on your internal network, participate in Distributed Denial of Service attacks, email spam, spread spyware and more.

Take our security preview now

Botnets affect millions of computers

Tens of millions of computers are taken over by botnets every year. In one example, the notorious Gameover ZeuS botnet, blamed for infecting over one million computers in 12 countries and the theft of more than $100 million worldwide, has already been revived by criminals - just five weeks after its takedown by the FBI. Source

In the News:

Attack of the Bots - Finextra (blog)

23 Mar 2017
One signature quality behind bot attacks is their high rate of speed. Because of this, technology that can detect potential velocity attacks can identify and screen out the bots. These solutions work by flagging devices that are used to perform ...

Botnets: Is your network really protected? - Network World

13 Mar 2017
Look for malicious traffic detection, botnet detection, and command and control call-home traffic detection. You want a system that can identify suspicious traffic and highlight an infected host quickly, then isolate it until you can take action. We ...

Why Aren't IoT Manufacturers Doing More to Prevent Botnet Attacks? - IoT Evolution World (blog)

23 Feb 2017
... need to include proper device security in their IoT products. And then, perhaps, the Internet will have one less danger to worry about. Jeff Finn is CEO at zvelo, a provider of content and device categorization, as well as malicious botnet ...

More »