{"id":84461,"date":"2024-11-12T05:00:43","date_gmt":"2024-11-12T13:00:43","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=84461"},"modified":"2025-04-25T00:29:53","modified_gmt":"2025-04-25T07:29:53","slug":"what-is-botnet","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/","title":{"rendered":"What Is a Botnet?"},"content":{"rendered":"<p>What is a botnet? And what does it have to do with a toaster?<\/p>\n<p>We\u2019ll get to that. First, a definition:<\/p>\n<p><em>A botnet is a group of internet-connected devices that bad actors hijack with malware. Using remote controls, bad actors can harness the power of the network to perform several types of attacks. These include distributed denial-of-service (DDoS) attacks that shut down internet services, breaking into other networks to steal data, and sending massive volumes of spam.<\/em><\/p>\n<p>In a way, the metaphor of an \u201carmy of devices\u201d leveling a cyberattack works well. With thousands or even millions of compromised devices working in concert, bad actors can do plenty of harm. As we\u2019ll see in a moment, they\u2019ve done their share already.<\/p>\n<p>Which brings us back to that toaster.<\/p>\n<p>The pop-up toaster as we know it first hit the shelves in 1926, under the brand name \u201cToastmaster.\u201d<a href=\"#_edn1\" name=\"_ednref1\">[i]<\/a> With a familiar springy *pop*, it has ejected toast just the way we like it for nearly a century. Given that its design was so simple and effective, it\u2019s remained largely unchanged. Until now. Thanks to the internet and so-called \u201csmart home\u201d devices.<\/p>\n<p>Toasters, among other things, are all getting connected. And have been for a few years now, to the point where the number of connected Internet of Things (IoT) devices\u00a0reaches well into the billions\u00a0worldwide \u2014 which includes smart home devices.<a href=\"#_edn2\" name=\"_ednref2\">[ii]<\/a><\/p>\n<p>Businesses use IoT devices to track shipments and various aspects of their supply chain. Cities use them to manage traffic flow and monitor energy use. (Does your home have a smart electric meter?) And for people like us, we use them to play music on smart speakers, see who\u2019s at the front door with smart doorbells, and order groceries from an LCD screen on our smart refrigerators \u2014 just to name a few ways we\u2019ve welcomed smart home devices into our households.<\/p>\n<p>In the U.S. alone,\u00a0smart home devices make up a $30-plus billion marketplace\u00a0per year.<a href=\"#_edn3\" name=\"_ednref3\">[iii]<\/a> However, it\u2019s still a relatively young marketplace. And with that comes several security issues.<\/p>\n<h2><strong>IoT security issues and big-time botnet attacks\u00a0<\/strong><\/h2>\n<p>First and foremost, many of these devices still lack sophisticated security measures, which makes them easy pickings for cybercriminals. Why would a cybercriminal target that smart lightbulb in your living room reading lamp? Networks are only as secure as their least secure device. Thus, if a cybercriminal can compromise that smart lightbulb, it can potentially give them access to the entire home network it is on \u2014 along with all the other devices and data on it.<\/p>\n<p>More commonly, though, hackers target smart home devices for another reason. They conscript them into botnets. It\u2019s a highly automated affair. Hackers use bots to add devices to their networks. They scan the internet in search of vulnerable devices and use brute-force password attacks to take control of them.<\/p>\n<p>At issue: many of these devices ship with factory usernames and passwords. Fed with that info, a hacker\u2019s bot can have a relatively good success rate because people often leave the factory password unchanged. It\u2019s an easy in.<\/p>\n<p>Results from one real-life test show just how active these hacker bots are:<\/p>\n<p>We created a fake smart home and set up a range of real consumer devices, from televisions to thermostats to smart security systems and even a smart kettle &#8211; and hooked it up to the internet.<\/p>\n<p>What happened next was a deluge of attempts by cybercriminals and other unknown actors to break into our devices, at one stage, reaching 14 hacking attempts every single hour.<\/p>\n<p>Put another way, that hourly rate added up to more than 12,000 unique scans and attack attempts a week.<a href=\"#_edn4\" name=\"_ednref4\">[iv]<\/a> Imagine all that activity pinging your smart home devices.<\/p>\n<p>Now, with a botnet in place, hackers can wage the kinds of attacks we mentioned above, particularly DDoS attacks. DDoS attacks can shut down websites, disrupt service and even choke traffic across broad swathes of the internet.<\/p>\n<p>Remember\u00a0the \u201cMirai\u201d botnet attack of 2016, where hackers targeted a major provider of internet infrastructure?<a href=\"#_edn5\" name=\"_ednref5\">[v]<\/a> It ended up crippling traffic in concentrated areas across the U.S., including the northeast, Great Lakes, south-central, and western regions. Millions of internet users were affected, people, businesses, and government workers alike.<\/p>\n<p>Another more recent set of headline-makers are the December 2023 and July 2024 attacks on Amazon Web Services (AWS).<a href=\"#_edn6\" name=\"_ednref6\">[vi]<\/a><sup>,<\/sup> <a href=\"#_edn7\" name=\"_ednref7\">[vii]<\/a> AWS provides cloud computing services to millions of businesses and organizations, large and small. Those customers saw slowdowns and disruptions for three days, which in turn slowed down and disrupted the people and services that wanted to connect with them.<\/p>\n<p>Also in July 2024, Microsoft likewise fell victim to a DDoS attack. It affected everything from Outlook email to Azure web services, and Microsoft Office to online games of Minecraft. They all got swept up in it.<a href=\"#_edn8\" name=\"_ednref8\">[viii]<\/a><\/p>\n<p>These attacks stand out as high-profile DDoS attacks, yet smaller botnet attacks abound, ones that don\u2019t make headlines. They can disrupt the operations of websites, public infrastructure, and businesses, not to mention the well-being of people who rely on the internet.<\/p>\n<h2><strong>Botnet attacks: Security shortcomings in IoT and smart home devices\u00a0<\/strong><\/h2>\n<p>Earlier we mentioned the problem of unchanged factory usernames and passwords. These include everything from \u201cadmin123\u201d to the product\u2019s name. Easy to remember, and highly insecure. The practice is so common that they get posted in bulk on hacking websites, making it easy for cybercriminals to simply look up the type of device they want to attack.<\/p>\n<p>Complicating security yet further is the fact that\u00a0some IoT and smart home device manufacturers introduce flaws in their design, protocols, and code that make them susceptible to attacks.<a href=\"#_edn9\" name=\"_ednref9\">[ix]<\/a> The thought gets yet more unsettling when you consider that some of the flaws were found in things like smart door locks.<\/p>\n<p>The ease with which IoT devices can be compromised is a big problem. The solution, however, starts with manufacturers that develop IoT devices with security in mind. Everything in these devices will need to be deployed with the ability to accept security updates and embed strong security solutions from the get-go.<\/p>\n<p>Until industry standards get established to ensure such basic security, a portion of securing your IoT and smart home devices falls on us, as people and consumers.<\/p>\n<h2><strong>Steps for a more secure network and smart devices\u00a0<\/strong><\/h2>\n<p>As for security, you can take steps that can help keep you safer. Broadly speaking, they involve two things: protecting your devices and protecting the network they\u2019re on. These security measures will look familiar, as they follow many of the same measures you can take to protect your computers, tablets, and phones.<\/p>\n<p><strong>Grab online protection for your smartphone.\u00a0<\/strong><\/p>\n<p>Many smart home devices use a smartphone as a sort of remote control, not to mention as a place for gathering, storing, and sharing data. So whether you\u2019re an Android owner or iOS owner, <a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html?path=blogs\" target=\"_blank\" rel=\"noopener\">use online protection software on your phone<\/a>\u00a0to help keep it safe from compromise and attack.<\/p>\n<p><strong>Don\u2019t use the default \u2014 Set a strong, unique password.\u00a0<\/strong><\/p>\n<p>One issue with many IoT devices is that they often come with a default username and password. This could mean that your device and thousands of others just like it all share the same credentials, which makes it painfully easy for a hacker to gain access to them because those default usernames and passwords are often published online. When you purchase any IoT device, set a fresh password using a strong method of password creation, such as ours. Likewise, create an entirely new username for additional protection as well.<\/p>\n<p><strong>Use multi-factor authentication.\u00a0<\/strong><\/p>\n<p>Online banks, shops, and other services commonly offer multi-factor authentication to help protect your accounts \u2014 with the typical combination of your username, password, and a security code sent to another device you own (often a mobile phone). If your IoT device supports multi-factor authentication, consider using it there too. It throws a big barrier in the way of hackers who simply try and force their way into your device with a password\/username combination.<\/p>\n<p><strong>Secure your internet router too.\u00a0<\/strong><\/p>\n<p>Another device that needs good password protection is your internet router. Make sure you use a strong and unique password as well to help prevent hackers from breaking into your home network. Also, consider changing the name of your home network so that it doesn\u2019t personally identify you. Fun alternatives to using your name or address include everything from movie lines like \u201cMay the Wi-Fi be with you\u201d to old sitcom references like \u201cCentral Perk.\u201d Also check that your router is using an encryption method, like WPA2 or the newer WPA3, which keeps your signal secure.<\/p>\n<p><strong>Upgrade to a newer internet router.\u00a0<\/strong><\/p>\n<p>Older routers might have outdated security measures, which might make them more prone to attacks. If you\u2019re renting yours from your internet provider, contact them for an upgrade. If you\u2019re using your own, visit a reputable news or review site such as Consumer Reports for a list of the best routers that combine speed, capacity, and security.<\/p>\n<p><strong>Update your apps and devices regularly.\u00a0<\/strong><\/p>\n<p>In addition to fixing the odd bug or adding the occasional new feature, updates often fix security gaps. Out-of-date apps and devices might have flaws that hackers can exploit, so regular updating is a must from a security standpoint. If you can set your smart home apps and devices to receive automatic updates, that\u2019s even better.<\/p>\n<p><strong>Set up a guest network specifically for your IoT devices.\u00a0<\/strong><\/p>\n<p>Just as you can offer your guests secure access that\u2019s separate from your own devices, creating an additional network on your router allows you to keep your computers and smartphones separate from IoT devices. This way, if an IoT device is compromised, a hacker will still have difficulty accessing your other devices on your primary network, the one where you connect your computers and smartphones.<\/p>\n<p><strong>Shop smart.\u00a0<\/strong><\/p>\n<p>Read trusted reviews and look up the manufacturer\u2019s track record online. Have their devices been compromised in the past? Do they provide regular updates for their devices to ensure ongoing security? What kind of security features do they offer? And privacy features too? Resources like Consumer Reports can provide extensive and unbiased information that can help you make a sound purchasing decision.<\/p>\n<h2><strong>Don\u2019t let botnets burn your toast<\/strong><\/h2>\n<p>As more and more connected devices make their way into our homes, the need to ensure that they\u2019re secure only increases. More devices mean more potential avenues of attack, and your home network is only as secure as the least secure device that\u2019s on it.<\/p>\n<p>While standards put forward by industry groups such as\u00a0UL\u00a0and\u00a0Matter\u00a0have started to take root, a good portion of keeping IoT and smart home devices secure falls on us as consumers. Taking the steps above can help prevent your connected toaster from playing its part in a botnet army attack \u2014 and it can also protect your network and your home from getting hacked.<\/p>\n<p>It\u2019s no surprise that IoT and smart home devices have raked in billions of dollars over the years. They introduce conveniences and little touches into our homes that make life more comfortable and enjoyable. However, they\u2019re still connected devices. And like anything that\u2019s connected, they must be protected.<\/p>\n<p><a href=\"#_ednref1\" name=\"_edn1\">[i]<\/a> <a href=\"https:\/\/www.hagley.org\/librarynews\/history-making-toast\" target=\"_blank\" rel=\"noopener\">https:\/\/www.hagley.org\/librarynews\/history-making-toast<\/a><\/p>\n<p><a href=\"#_ednref2\" name=\"_edn2\">[ii]<\/a> <a href=\"https:\/\/www.statista.com\/statistics\/1183457\/iot-connected-devices-worldwide\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.statista.com\/statistics\/1183457\/iot-connected-devices-worldwide\/<\/a><\/p>\n<p><a href=\"#_ednref3\" name=\"_edn3\">[iii]<\/a> <a href=\"https:\/\/www.statista.com\/outlook\/dmo\/smart-home\/united-states\" target=\"_blank\" rel=\"noopener\">https:\/\/www.statista.com\/outlook\/dmo\/smart-home\/united-states<\/a><\/p>\n<p><a href=\"#_ednref4\" name=\"_edn4\">[iv]<\/a> <a href=\"https:\/\/www.which.co.uk\/news\/article\/how-the-smart-home-could-be-at-risk-from-hackers-akeR18s9eBHU\" target=\"_blank\" rel=\"noopener\">https:\/\/www.which.co.uk\/news\/article\/how-the-smart-home-could-be-at-risk-from-hackers-akeR18s9eBHU<\/a><\/p>\n<p><a href=\"#_ednref5\" name=\"_edn5\">[v]<\/a> <a href=\"https:\/\/en.wikipedia.org\/wiki\/Mirai_(malware)\" target=\"_blank\" rel=\"noopener\">https:\/\/en.wikipedia.org\/wiki\/Mirai_(malware)<\/a><\/p>\n<p><a href=\"#_ednref6\" name=\"_edn6\">[vi]<\/a> <a href=\"https:\/\/www.darkreading.com\/cloud-security\/eight-hour-ddos-attack-struck-aws-customers\" target=\"_blank\" rel=\"noopener\">https:\/\/www.darkreading.com\/cloud-security\/eight-hour-ddos-attack-struck-aws-customers<\/a><\/p>\n<p><a href=\"#_ednref7\" name=\"_edn7\">[vii]<\/a> <a href=\"https:\/\/www.forbes.com\/sites\/emilsayegh\/2024\/07\/31\/microsoft-and-aws-outages-a-wake-up-call-for-cloud-dependency\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.forbes.com\/sites\/emilsayegh\/2024\/07\/31\/microsoft-and-aws-outages-a-wake-up-call-for-cloud-dependency\/<\/a><\/p>\n<p><a href=\"#_ednref8\" name=\"_edn8\">[viii]<\/a> <a href=\"https:\/\/www.bbc.com\/news\/articles\/c903e793w74o\" target=\"_blank\" rel=\"noopener\">https:\/\/www.bbc.com\/news\/articles\/c903e793w74o<\/a><\/p>\n<p><a href=\"#_ednref9\" name=\"_edn9\">[ix]<\/a> <a href=\"https:\/\/news.fit.edu\/academics-research\/apps-for-popular-smart-home-devices-contain-security-flaws-new-research-finds\/\" target=\"_blank\" rel=\"noopener\">https:\/\/news.fit.edu\/academics-research\/apps-for-popular-smart-home-devices-contain-security-flaws-new-research-finds\/<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is a botnet? And what does it have to do with a toaster? We\u2019ll get to that. First, a&#8230;<\/p>\n","protected":false},"author":1407,"featured_media":203898,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[49,4131],"coauthors":[15735],"class_list":["post-84461","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","tag-botnet","tag-internet-of-things"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is a Botnet? | McAfee Blog<\/title>\n<meta name=\"description\" content=\"What is a botnet? And what does it have to do with a toaster? We\u2019ll get to that. First, a definition: A botnet is a group of internet-connected devices\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is a Botnet? | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"What is a botnet? And what does it have to do with a toaster? We\u2019ll get to that. First, a definition: A botnet is a group of internet-connected devices\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-12T13:00:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-25T07:29:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" \/>\n<meta name=\"author\" content=\"Jasdev Dhaliwal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jasdev Dhaliwal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/\"},\"author\":{\"name\":\"Jasdev Dhaliwal\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\"},\"headline\":\"What Is a Botnet?\",\"datePublished\":\"2024-11-12T13:00:43+00:00\",\"dateModified\":\"2025-04-25T07:29:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/\"},\"wordCount\":1965,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/300x200_Blog_111224.png\",\"keywords\":[\"botnet\",\"Internet of Things\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/\",\"name\":\"What Is a Botnet? | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/300x200_Blog_111224.png\",\"datePublished\":\"2024-11-12T13:00:43+00:00\",\"dateModified\":\"2025-04-25T07:29:53+00:00\",\"description\":\"What is a botnet? And what does it have to do with a toaster? We\u2019ll get to that. First, a definition: A botnet is a group of internet-connected devices\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/300x200_Blog_111224.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/300x200_Blog_111224.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What Is a Botnet?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\",\"name\":\"Jasdev Dhaliwal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"caption\":\"Jasdev Dhaliwal\"},\"description\":\"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/jasdhaliwal\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/jasdev-dhaliwal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is a Botnet? | McAfee Blog","description":"What is a botnet? And what does it have to do with a toaster? We\u2019ll get to that. First, a definition: A botnet is a group of internet-connected devices","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"What Is a Botnet? | McAfee Blog","og_description":"What is a botnet? And what does it have to do with a toaster? We\u2019ll get to that. First, a definition: A botnet is a group of internet-connected devices","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-11-12T13:00:43+00:00","article_modified_time":"2025-04-25T07:29:53+00:00","og_image":[{"url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg","type":"","width":"","height":""}],"author":"Jasdev Dhaliwal","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Jasdev Dhaliwal","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/"},"author":{"name":"Jasdev Dhaliwal","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f"},"headline":"What Is a Botnet?","datePublished":"2024-11-12T13:00:43+00:00","dateModified":"2025-04-25T07:29:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/"},"wordCount":1965,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/300x200_Blog_111224.png","keywords":["botnet","Internet of Things"],"articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/","name":"What Is a Botnet? | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/300x200_Blog_111224.png","datePublished":"2024-11-12T13:00:43+00:00","dateModified":"2025-04-25T07:29:53+00:00","description":"What is a botnet? And what does it have to do with a toaster? We\u2019ll get to that. First, a definition: A botnet is a group of internet-connected devices","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/300x200_Blog_111224.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/300x200_Blog_111224.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-botnet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"What Is a Botnet?"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f","name":"Jasdev Dhaliwal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","caption":"Jasdev Dhaliwal"},"description":"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.","sameAs":["https:\/\/www.linkedin.com\/in\/jasdhaliwal\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/jasdev-dhaliwal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/84461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1407"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=84461"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/84461\/revisions"}],"predecessor-version":[{"id":212227,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/84461\/revisions\/212227"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/203898"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=84461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=84461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=84461"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=84461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}