{"id":92430,"date":"2018-11-06T06:00:06","date_gmt":"2018-11-06T14:00:06","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=92430"},"modified":"2025-08-04T21:51:32","modified_gmt":"2025-08-05T04:51:32","slug":"zombie-iot-botnets","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/","title":{"rendered":"Beware: Zombie IoT Botnets"},"content":{"rendered":"<p>The ghosts and ghouls of October have come and gone, but the dangers lurking behind virtual walls have hardly disappeared. The threat of <a href=\"https:\/\/searchmidmarketsecurity.techtarget.com\/definition\/zombie\" target=\"_blank\" rel=\"noopener noreferrer\">zombie bots<\/a> is real, and it exists 365 days out of the year. Zombie bots, or devices that are taken over by hackers to disseminate different types of malware, viruses, or <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/necurs-botnet-leads-the-world-in-sending-spam-traffic\/\" target=\"_blank\" rel=\"noopener noreferrer\">spam<\/a> to other Internet-connected gadgets, are no longer limited to just home computers. As executed in the <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/mirai-malware-2016\/\" target=\"_blank\" rel=\"noopener noreferrer\">Mirai<\/a> botnet attack, they\u2019ve expanded into the world of IoT connected devices, too.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92471 alignleft\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/11\/McAfee-MobileBlog-110118-R2_TW.png\" alt=\"\" width=\"527\" height=\"296\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/McAfee-MobileBlog-110118-R2_TW.png 1200w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/McAfee-MobileBlog-110118-R2_TW-300x169.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/McAfee-MobileBlog-110118-R2_TW-768x432.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/McAfee-MobileBlog-110118-R2_TW-1024x576.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/McAfee-MobileBlog-110118-R2_TW-889x500.png 889w\" sizes=\"auto, (max-width: 527px) 100vw, 527px\" \/>Adding to their complexity, zombie bots are not just limited to one feature or attack; they can be morphed into whatever their \u2018master\u2019 wants them to be. From logging keystrokes or searching through files to updating malware and downloading more malware onto an infected device, zombie botnets are ever-evolving.<\/p>\n<p>To a hacker, zombie bots are more effective and infinitely stronger when they band together.\u00a0 And so one by one, cybercriminals work to spread their malware of choice to devices to form an army of zombie bots, also known as a <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/what-is-botnet\/\" target=\"_blank\" rel=\"noopener noreferrer\">botnet<\/a>. Massive botnets are used in distributed denial of service (DDoS) attacks, which are among the most intimidating types of attacks of which zombie botnet armies are capable. DDoS attacks are growing in number and severity; one <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/dramatic-increase-of-ddos-attack-sizes-attributed-to-iot-devices\/\" target=\"_blank\" rel=\"noopener noreferrer\">report<\/a> found that they\u2019ve increased by 29% since Q2 2017, with the average attack size having increased by 543% to 26.37 Gbps.<\/p>\n<p>The increase in DDoS attacks is attributed to large scale botnets comprised of insecure IoT devices. The adoption of IoT devices shows no signs of slowing down either. Today, there are currently <a href=\"https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/\" target=\"_blank\" rel=\"noopener noreferrer\">23.14 billion<\/a> IoT devices worldwide. That number is predicted to grow exponentially just in the next 7 years to approximately <a href=\"https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/\" target=\"_blank\" rel=\"noopener noreferrer\">75.44 billion<\/a> by 2025.<\/p>\n<p>New variations of the Mirai and <a href=\"https:\/\/krebsonsecurity.com\/tag\/gafgyt\/\" target=\"_blank\" rel=\"noopener noreferrer\">Gafgyt<\/a> botnets exploit vulnerabilities found in IoT devices, including the security flaw that led to the massive <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/equifax-anniversary\/\" target=\"_blank\" rel=\"noopener noreferrer\">Equifax breach of 2017<\/a>. Just this past month, a botnet by the name of <a href=\"https:\/\/gbhackers.com\/chalubo-botnet\/\" target=\"_blank\" rel=\"noopener noreferrer\">Chalubo<\/a> was discovered by security researchers. By targeting poorly-secured IoT devices and servers, the Chalubo botnet compromises users\u2019 devices for the purpose of executing a DDoS attack. Researchers also found that this botnet had copied a few code snippets from Mirai, demonstrating that cybercriminals have realized how effective this type of attack is.<\/p>\n<p>So, why the rise in DDoS and other IoT botnet attacks? IoT devices like security cameras, smart lights, DVRs, and routers are particularly easy to remotely access because they often come with factory-set admin password setups, and many of us never change them to something more secure.\u00a0 Our collective accumulation of connected devices shows no sign of slowing down, and without proper security in place, they are vulnerable to attacks. And what\u2019s particularly troubling is that more often than not, zombie botnet armies operate in the shadows, unbeknownst to their owners.<\/p>\n<h2>Tips to Protect Your Devices<\/h2>\n<p>Put simply, with more IoT devices in use, the risk of botnets increases, as does the need for awareness around this very real and potentially debilitating cyberthreat. While cybercriminals continue to try and leverage our own devices against us, the best way to protect your devices is through education and security best practices:<\/p>\n<ul>\n<li><strong><span style=\"text-decoration: underline;\">Keep your security software up-to-date<\/span>. <\/strong>Whether it\u2019s anti-virus, anti-spyware, or overall security, always keep your security solutions up-to-date. Software and firmware patches are ever-evolving and are made to combat newly discovered vulnerabilities, so be sure to update every time you\u2019re prompted to.<\/li>\n<li><strong><span style=\"text-decoration: underline;\">Change your device\u2019s factory security settings<\/span>.<\/strong> When it comes to products, many manufacturers don\u2019t think \u201csecurity first.\u201d That\u2019s to say, your device can be vulnerable as soon as you open the box. By changing the factory settings you\u2019re instantly upping your device\u2019s security.<\/li>\n<li><strong><span style=\"text-decoration: underline;\">Proceed with caution when opening emails with file attachments or hyperlinks<\/span>.<\/strong> One of the most common ways your device can become infected is by clicking on a bad link or attachment, through phishing or click fraud attempts. As a preventative safety measure, avoid engaging with suspicious messages altogether. You can often tell if the email is a hacking attempt if there is awkward language, improper spelling, or other signs. It\u2019s a good idea to send spam directly to the trash.<\/li>\n<li><span style=\"text-decoration: underline;\"><strong>Setup a separate IoT network<\/strong><\/span>. Consider setting up a second network for your IoT devices that doesn\u2019t share access to your other devices and data. Check your router manufacturer\u2019s website to learn how. Or, consider getting a <a href=\"http:\/\/securehomeplatform.mcafee.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">router with built-in security features<\/a>, making it easier to protect all the devices in your home from one access point.<\/li>\n<li><strong><span style=\"text-decoration: underline;\">Use a firewall<\/span>. <\/strong>A firewall is a tool that monitors traffic between an Internet connection and devices to detect unusual or suspicious behavior. Even if a device is infected, a firewall can keep a potential attacker from accessing all the other devices on the same network. When looking for <a href=\"https:\/\/www.mcafee.com\/consumer\/en-us\/store\/m0\/catalog.html\" target=\"_blank\" rel=\"noopener noreferrer\">comprehensive security solution<\/a>, to see if a Firewall is included to ensure that your devices are protected.<\/li>\n<\/ul>\n<p>Interested in learning more about IoT and mobile security trends and information? Follow\u00a0<a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee_Home<\/a>\u00a0on Twitter, and \u2018Like\u201d us on\u00a0<a href=\"https:\/\/www.facebook.com\/mcafee\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-68611\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/01\/Radhika.jpg\" alt=\"\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika.jpg 200w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-150x150.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-50x50.jpg 50w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-128x128.jpg 128w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The ghosts and ghouls of October have come and gone, but the dangers lurking behind virtual walls have hardly disappeared&#8230;.<\/p>\n","protected":false},"author":674,"featured_media":64206,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,1838],"tags":[49,4452,4131],"coauthors":[3973],"class_list":["post-92430","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-mobile-security","tag-botnet","tag-cybersecurity","tag-internet-of-things"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Beware: Zombie IoT Botnets<\/title>\n<meta name=\"description\" content=\"The ghosts and ghouls of October have come and gone, but the dangers lurking behind virtual walls have hardly disappeared. The threat of zombie IoT botnets is real, and it exists 365 days out of the year.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beware: Zombie IoT Botnets\" \/>\n<meta property=\"og:description\" content=\"The ghosts and ghouls of October have come and gone, but the dangers lurking behind virtual walls have hardly disappeared. The threat of zombie IoT botnets is real, and it exists 365 days out of the year.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-06T14:00:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-05T04:51:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/McAfee-MobileBlog-110118-R2_TW.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Beware: Zombie IoT Botnets\",\"datePublished\":\"2018-11-06T14:00:06+00:00\",\"dateModified\":\"2025-08-05T04:51:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/\"},\"wordCount\":845,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Botnet1.jpg\",\"keywords\":[\"botnet\",\"cybersecurity\",\"Internet of Things\"],\"articleSection\":[\"Internet Security\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/\",\"name\":\"Beware: Zombie IoT Botnets\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Botnet1.jpg\",\"datePublished\":\"2018-11-06T14:00:06+00:00\",\"dateModified\":\"2025-08-05T04:51:32+00:00\",\"description\":\"The ghosts and ghouls of October have come and gone, but the dangers lurking behind virtual walls have hardly disappeared. The threat of zombie IoT botnets is real, and it exists 365 days out of the year.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Botnet1.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Botnet1.jpg\",\"width\":1000,\"height\":563,\"caption\":\"botnet visual representation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Beware: Zombie IoT Botnets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beware: Zombie IoT Botnets","description":"The ghosts and ghouls of October have come and gone, but the dangers lurking behind virtual walls have hardly disappeared. The threat of zombie IoT botnets is real, and it exists 365 days out of the year.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Beware: Zombie IoT Botnets","og_description":"The ghosts and ghouls of October have come and gone, but the dangers lurking behind virtual walls have hardly disappeared. The threat of zombie IoT botnets is real, and it exists 365 days out of the year.","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-11-06T14:00:06+00:00","article_modified_time":"2025-08-05T04:51:32+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/McAfee-MobileBlog-110118-R2_TW.png","type":"image\/png"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Beware: Zombie IoT Botnets","datePublished":"2018-11-06T14:00:06+00:00","dateModified":"2025-08-05T04:51:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/"},"wordCount":845,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Botnet1.jpg","keywords":["botnet","cybersecurity","Internet of Things"],"articleSection":["Internet Security","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/","name":"Beware: Zombie IoT Botnets","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Botnet1.jpg","datePublished":"2018-11-06T14:00:06+00:00","dateModified":"2025-08-05T04:51:32+00:00","description":"The ghosts and ghouls of October have come and gone, but the dangers lurking behind virtual walls have hardly disappeared. The threat of zombie IoT botnets is real, and it exists 365 days out of the year.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Botnet1.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Botnet1.jpg","width":1000,"height":563,"caption":"botnet visual representation"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/zombie-iot-botnets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Beware: Zombie IoT Botnets"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/92430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=92430"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/92430\/revisions"}],"predecessor-version":[{"id":214374,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/92430\/revisions\/214374"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/64206"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=92430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=92430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=92430"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=92430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}