
There are many threats that are present on the network. Many types of malware that can compromise our security in one way or another. One of those problems is botnets . In this article we will explain how an attack of this type is generated. What are the steps to get from the attacker to the target. It is a process that requires several phases, as we will see.
Steps in a botnet attack
A botnet , as we know, is a set of computers that make up a network controlled by attackers. They have been infected through malicious software by cybercriminals and in this way they can control them to send Spam, carry out DDoS attacks, send viruses …
This is a major problem and users are not always aware that they have been affected. Logically it can affect the performance of the devices, compromise privacy and harm third parties.
The attacker infects a device
The first step, the main one so that all this can be carried out, is to infect a computer . Attackers are looking for a way to deliver malicious software that runs on a victim’s system in order to take control of that device.
Basically what they do is send malware through very different methods, such as email, social networks, fraudulent links … The victim installs or downloads that software and everything begins there.

They send orders to attack servers
Subsequently, the second step is to send the orders . We have mentioned that the main objective is to attack other computers or carry out certain actions, through those infected systems.
The hackers send a series of orders, of actions to be carried out, and it is those devices that are now part of the botnet that carry them out. They can be very varied.
Infected computers carry out those orders
Once these orders are received , the computers that have been infected, those that are ultimately part of that botnet, carry out the attack. They carry out the actions ordered from the cybercriminals’ servers.
This process can be more or less fast, it can be a single action or several, once or repeatedly, etc.
The target is attacked
The fourth step is the final one: the target is attacked . The botnet executes the orders and the computers or systems that are targeted suffer the consequences.
This could be for example a DDoS attack in which a server receives multiple requests and cannot function normally. You can shut down a web page, for example. They could also send massive spam or any other action.
In short, botnet attacks are very present on the network. It is important to maintain security at all times and not make mistakes that could affect us.