Zombie

7th February 2020 | Cybrary Zombie


A zombie is the term for a computer that is infected and being used remotely by a bot. A bot, short for “robot”, is a type of software application or script that performs automated tasks on command. Bad bots perform malicious tasks that allow an attacker to remotely take control over an affected computer. These infected computers are called zombies. 

What Does This Mean For My SMB?

SMBs are most certainly are at risk to everyday hackers. Hackers breach Small to Medium Sized businesses 15x more often than larger firms. Hackers know this and target you because of it. SMB’s generally lack resources to properly secure systems, fail to train employees on cybersecurity hygiene, and sometimes lack proper security tools.

For these reasons, CyberHoot recommends all SMB’s take these actions:

Train employees on how to spot and delete phishing emails. Here’s a free video to help with this: How to Protect Yourself from Phishing Attacks.

  • Train employees on how to use strong passphrases instead of passwords.
  • Test employees with Phishing tests. CyberHoot includes this in our services.
  • Implement basic cybersecurity technical best practices including:
  • Update/patch all devices and software whenever possible to ensure vulnerabilities are fixed.
  • Establish risk management at your SMB by having a risk assessment performed at least once on your business.

Taking these proactive measures can reduce your risk of a costly breach, downtime, brand damage, and a cyber insurance claim (or all four).

Related Terms: Bot, Botnet, Bot Herder, and Bot Master

Source: Webroot

To learn more about Zombies, watch this short video:

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

When the Attack Looks Just Like You

When the Attack Looks Just Like You

Artificial Intelligence (or AI) is making phishing emails smarter, malware sneakier, and credential theft easier...

Read more
Cybercriminals Are Exploiting DocuSign with Customizable Phishing Templates

Cybercriminals Are Exploiting DocuSign with Customizable Phishing Templates

DocuSign has become one of the most trusted tools in modern business. Contracts, HR paperwork, NDAs, vendor...

Read more
PromptSpy: The Android Malware That Hired an AI Assistant

PromptSpy: The Android Malware That Hired an AI Assistant

And yes, Google's Gemini AI had no idea it was working for the bad guys. Malware has always followed a script....

Read more