Think your PC is infected….

Think your PC is infected? It could be a Zombie?  What is a Zombie Computer….

Zombie Computer

 

 

 

 

 

 

 

 

 

 

Have you ever asked yourself where all of the spam on the internet comes from? You probably receive lots of spam junk emails every day. Does that mean there are   hundreds and thousands of people out there, sitting around sending them out themselves? NO…. This is mostly performed by zombie computers.

What?? Zombie computers. That sounds scary doesn’t it? There are millions of zombified computers all around the world that perform terrible acts, like sending out spam and malware. It’s not the end of the world yet, but it’s definitely a hassle. And worst of all, your computer might be one of those zombies.

 

What Is A Zombie Computer?

Zombie Computer Botnet

 

 

 

 

 

 

 

We’re not talking about computers that have risen from the dead. When we talk about zombie computers we are describing a computer that has been infected and hijacked by a third party. Most of time, this zombification occurs through malware, trojans, and viruses.

What happens when your computer turns into a zombie? It can be controlled by a third party – whether that third party is a single person, a group of people, or even a corporation–to do things without your knowledge. Like, for example, sending out spam emails or performing denial of service attacks.

When a person has an army of zombie computers at their command, these armies are called “botnets”.  Botnets are used to cause mischief across the Internet because they are so difficult to trace back to the original controller. Most PC owners don’t even realize that their computers have been doing the bidding of another.

 

Is Your Computer A Zombie?

Computer Trojan Virus Worm

 

 

 

 

 

 

 

In most cases, zombie infections are not intentional – meaning that hackers don’t intentionally pick a specific computer to zombify. If anything, computers are zombified through contagious contact with malware links and virus-laden emails. So if your computer is a zombie, don’t immediately assume that someone is intentionally hacking you.

The thing about malware and virus infections is that they don’t want to be detected, which means it can be hard to determine if your computer is a zombie. Fortunately, there are a few ways that can point you in the right direction. Look for these symptoms on your computer:

Zombie processes require use of the computer’s processor and network. If you’ve experienced a slowdown in your computer’s operating speed or your network speed, then you may have an infection.

Check your email accounts – particularly their outbound messages. Botnets require bots to operate, which means that botnets are always “recruiting” new computers. This is done through the spread of malware. If you’re sending out emails that you’ve never written, then you may be infected.

Zombie IP addresses are often put onto blacklists. If you suspect an infection, you can check to see if your IP address has been added to any blacklists. Copy this URL into your browser–http://www.robtex.com/ip/xxx.xxx.xxx.xxx.html#blacklists–and replace the “xxx.xxx.xxx.xxx” with your own IP address (use http://www.whatismyip.net).

If you have a zombie infection, the best thing you can do is to run a scan of your system using anti-malware and anti-virus programs. My own recommendations include Malwarebytes Anti-Malware, Super-Anti-Spyware, and Avast Anti-Virus.

When you are done running those 3 utilities I recommend a follow up with CCleaner.

 

Preventing Zombie Infections:

Preventing Zombie Infections

 

 

 

 

 

The best defense against zombie infections is a strong offense – meaning a proactive approach towards keeping yourself safe and out of malware’s way. Here are some ways to keep you as safe as possible:

Patch your internet software applications as often as possible. Things like browsers, chat programs, cloud storage services, and others–all of these things require Internet access. A security vulnerability in a program can leave an opening for malware to exploit.

Run anti-malware and anti-virus programs regularly. This will catch problems on a regular basis, keeping your computer from being infected for too long.

Use a firewall. I know, it can be pretty annoying at times, but a firewall is always recommended in security tips because firewalls work. Don’t neglect it.

Practice safe Internet habits and always be wary of suspicious links. When you have malware, clear it out as soon as possible. But all the same, don’t be too scared or paranoid of zombie infections. Yes, infections are annoying, but they won’t demolish your system. Just stay alert and you’ll be fine.

 

Download the article in different formats from the links below:

 

Download in PDF          Download in Word DOCX          Download in Word DOC