{"id":62518,"date":"2015-12-16T13:07:03","date_gmt":"2015-12-16T11:07:03","guid":{"rendered":""},"modified":"2025-01-07T11:36:09","modified_gmt":"2025-01-07T09:36:09","slug":"device-used-ddos-attacks","status":"publish","type":"post","link":"https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks","title":{"rendered":"Is Your Device Being Used For DDoS Attacks?"},"content":{"rendered":"<p>You may have heard about the massive <a href=\"http:\/\/www.ibtimes.co.uk\/mysterious-hackers-are-trying-bring-down-entire-internet-by-ddos-ing-critical-servers-1532762\">DDoS attack<\/a> that reportedly tried to \u201cbring down the internet\u201d with a reported 5 million queries (requests for data\/information) per second targeting key servers for 48 hours. Following this attack between November 30th and December 1st, everyday users and web security experts alike are asking:<\/p>\n<p>-How did it happen?<\/p>\n<p>-Who was behind this?<\/p>\n<p>-Was my device used as part of this attack?<\/p>\n<p><b>How DDoS attacks work:<\/b><br \/>\nIn order to launch a Distributed Denial of Service (DDoS) attack, a large number of \u201cbots\u201d are recruited. Bots are vulnerable computers that have been infected with specialized malware, which can be spread through a compromised website, email attachments or a network. Once a computer is a bot, it begins accepting commands from a centralized command server, and thousands of infected computers form a botnet. When a botnet gets a command to attack a particular site from the centralized command server, all of the bots begin sending requests to a targeted URL or server. The timing is well-coordinated and the bot traffic is distributed to maintain a high level of traffic, overload and effectively bring down the targeted server, forming a Distributed Denial of Service attack.<\/p>\n<p>While there has been speculation as to the \u201cwho\u201d and \u201chow\u201d, with some<br \/>\n<a href=\"https:\/\/www.ibtimes.co.uk\/john-mcafee-massive-ddos-attack-internet-was-smartphone-botnet-popular-app-1532993\">pointing the finger<\/a> at government and terrorist organizations, the bottom line remains that it remains speculation. Most users want to know: \u201cWas my device turned into a bot and used in this DDoS attack? If so, what can I do about it, if not, how can I keep my device safe?\u201d<\/p>\n<p><b>How do you know if your PC or mobile device is being used for DDoS attacks? <\/b><\/p>\n<p>The answer isn\u2019t as simple as one would hope. Bot malware has become more sophisticated over the years, often taking on more subtle forms that are overlooked by most malware scanners. You may have heard the term \u201czombie\u201d used to describe a computer that has been turned into a bot. It\u2019s not easy to tell if your computer or mobile device is a zombie, and while there are <a href=\"http:\/\/www.pcworld.com\/article\/170546\/how_to_clean_bots.html\">tools<\/a> that reportedly help remove bot malware from your device, the strongest measures users can take are preventative.<\/p>\n<p>How can you protect your device?<\/p>\n<p>It\u2019s important to steer clear from online threats and avoid downloading applications that install bot malware on your computer. Visit trustworthy sites and download files from trusted sources. If you don\u2019t know what danger to look for, you can use <a href=\"https:\/\/www.mywot.com\/\">tools that warn<\/a> you before entering a dangerous site.<\/p>\n<p>2016 will be a year that sees several new threats trying to force their way onto your devices, both desktop and mobile. This does not mean that you and your devices need to be vulnerable forever. Users can help make the internet a safer place by rating suspicious and safe sites accordingly, warning unsuspecting users before they fall victim to threats. The WOT team is working hard to ensure that users have tools to protect themselves from threats. More on that topic coming soon.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You may have heard about the massive DDoS attack that reportedly tried to \u201cbring down the internet\u201d with a reported 5 million queries (requests for data\/information) per second targeting key servers for 48 hours. Following this attack between November 30th and December 1st, everyday users and web security experts alike are asking: -How did it [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":63201,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_links_to":"","_links_to_target":""},"categories":[41],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Is Your Device Being Used For DDoS Attacks? | WOT<\/title>\n<meta name=\"description\" content=\"Beware of DDos attacks, they target anyone! Learn about Distributed Denial of Service attacks and how WOT keeps you protected from becoming a victim. Read more!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is Your Device Being Used For DDoS Attacks? | WOT\" \/>\n<meta property=\"og:description\" content=\"Beware of DDos attacks, they target anyone! Learn about Distributed Denial of Service attacks and how WOT keeps you protected from becoming a victim. Read more!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks\" \/>\n<meta property=\"og:site_name\" content=\"WOT\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/weboftrust\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-16T11:07:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-07T09:36:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2015\/12\/Botnet.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1067\" \/>\n\t<meta property=\"og:image:height\" content=\"598\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alex at WOT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:site\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex at WOT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks\"},\"author\":{\"name\":\"Alex at WOT\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9\"},\"headline\":\"Is Your Device Being Used For DDoS Attacks?\",\"datePublished\":\"2015-12-16T11:07:03+00:00\",\"dateModified\":\"2025-01-07T09:36:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks\"},\"wordCount\":514,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"articleSection\":[\"Device Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks\",\"url\":\"https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks\",\"name\":\"Is Your Device Being Used For DDoS Attacks? | WOT\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\"},\"datePublished\":\"2015-12-16T11:07:03+00:00\",\"dateModified\":\"2025-01-07T09:36:09+00:00\",\"description\":\"Beware of DDos attacks, they target anyone! Learn about Distributed Denial of Service attacks and how WOT keeps you protected from becoming a victim. Read more!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.mywot.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is Your Device Being Used For DDoS Attacks?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"name\":\"WOT\",\"description\":\"Safe Web Search &amp; Browsing\",\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"alternateName\":\"WOT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mywot.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\",\"name\":\"Web of Trust\",\"alternateName\":\"WOT\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"contentUrl\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"width\":395,\"height\":150,\"caption\":\"Web of Trust\"},\"image\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/weboftrust\",\"https:\/\/twitter.com\/Web_of_Trust\",\"https:\/\/www.linkedin.com\/company\/wot-services-ltd.\",\"https:\/\/www.youtube.com\/user\/MyWOT\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9\",\"name\":\"Alex at WOT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g\",\"caption\":\"Alex at WOT\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is Your Device Being Used For DDoS Attacks? | WOT","description":"Beware of DDos attacks, they target anyone! Learn about Distributed Denial of Service attacks and how WOT keeps you protected from becoming a victim. Read more!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks","og_locale":"en_US","og_type":"article","og_title":"Is Your Device Being Used For DDoS Attacks? | WOT","og_description":"Beware of DDos attacks, they target anyone! Learn about Distributed Denial of Service attacks and how WOT keeps you protected from becoming a victim. Read more!","og_url":"https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks","og_site_name":"WOT","article_publisher":"https:\/\/www.facebook.com\/weboftrust","article_published_time":"2015-12-16T11:07:03+00:00","article_modified_time":"2025-01-07T09:36:09+00:00","og_image":[{"width":1067,"height":598,"url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2015\/12\/Botnet.jpg","type":"image\/jpeg"}],"author":"Alex at WOT","twitter_card":"summary_large_image","twitter_creator":"@Web_of_Trust","twitter_site":"@Web_of_Trust","twitter_misc":{"Written by":"Alex at WOT","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks#article","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks"},"author":{"name":"Alex at WOT","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9"},"headline":"Is Your Device Being Used For DDoS Attacks?","datePublished":"2015-12-16T11:07:03+00:00","dateModified":"2025-01-07T09:36:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks"},"wordCount":514,"commentCount":0,"publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"articleSection":["Device Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks","url":"https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks","name":"Is Your Device Being Used For DDoS Attacks? | WOT","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/#website"},"datePublished":"2015-12-16T11:07:03+00:00","dateModified":"2025-01-07T09:36:09+00:00","description":"Beware of DDos attacks, they target anyone! Learn about Distributed Denial of Service attacks and how WOT keeps you protected from becoming a victim. Read more!","breadcrumb":{"@id":"https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mywot.com\/blog"},{"@type":"ListItem","position":2,"name":"Is Your Device Being Used For DDoS Attacks?"}]},{"@type":"WebSite","@id":"https:\/\/www.mywot.com\/blog\/#website","url":"https:\/\/www.mywot.com\/blog\/","name":"WOT","description":"Safe Web Search &amp; Browsing","publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"alternateName":"WOT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mywot.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mywot.com\/blog\/#organization","name":"Web of Trust","alternateName":"WOT","url":"https:\/\/www.mywot.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","contentUrl":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","width":395,"height":150,"caption":"Web of Trust"},"image":{"@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/weboftrust","https:\/\/twitter.com\/Web_of_Trust","https:\/\/www.linkedin.com\/company\/wot-services-ltd.","https:\/\/www.youtube.com\/user\/MyWOT"]},{"@type":"Person","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9","name":"Alex at WOT","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g","caption":"Alex at WOT"}}]}},"_links":{"self":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/62518"}],"collection":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/comments?post=62518"}],"version-history":[{"count":4,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/62518\/revisions"}],"predecessor-version":[{"id":67741,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/62518\/revisions\/67741"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media\/63201"}],"wp:attachment":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media?parent=62518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/categories?post=62518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/tags?post=62518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}