How Botnets Are Used

Stealing Confidential Data

Many bots can be commanded to search a computer’s hard disks for personal information, including computer authentication credentials, bank account numbers and passwords, product keys for popular computer games and other software products, and other sensitive data. Some of the earliest malicious bots included the ability to transmit product keys back to the attacker, and such features are common in kit–based bots such as Win32/Rbot and Win32/Zbot.

Featured Articles

Locations

United States Change All Microsoft Sites

Search

Feedback:

Was the information in this article helpful?