Zombies (botnet PCs) - what they are, signs to spot, and how to clean up

Zombies

What it is

In security, a zombie is a hacked computer that an attacker controls from far away. Your PC keeps working like normal, but in the background it follows commands as part of a botnet - sending spam, launching DDoS attacks, or trying to break into other accounts.

Why it matters

If your device is a zombie, it can help criminals attack others, get your internet blocked, slow everything down, and expose your data and accounts.

How it works 

  • Infect: malware arrives via a bad download, fake update, or phishing link.

  • Call home: the malware connects to a command server to get tasks.

  • Act: sends spam, joins DDoS attacks, mines crypto, or steals data.

  • Hide: runs quietly at startup and updates itself to avoid removal.

Red flags

  • Internet is slow and router lights blink nonstop even when you are idle.

  • Unknown processes use a lot of CPU or network in Task Manager.

  • Friends get spam from your accounts, or you see mailer-daemon bounces.

  • Security tool is disabled, or new startup tasks appear with random names.

  • Your IP shows up on blocklists or your ISP sends abuse notices.

Do it right

  • Disconnect from the internet, then run a full scan with reputable anti-malware.

  • Remove unknown startup items and scheduled tasks; reset browsers.

  • Update Windows, apps, and your router firmware; change Wi-Fi and account passwords from a clean device.

  • Turn on firewall and real-time protection; avoid cracks and random installers.

  • If problems persist, back up documents and do a clean reinstall.

    Threat Glossary (A–Z)

    All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
      • Related Articles

      • Data Execution Prevention

        What it is Data Execution Prevention (DEP) is a Windows safety net that stops code from running in places it shouldn’t—like the stack or heap. If malware tries to execute from those memory areas, Windows blocks it and shuts the app down instead of ...
      • Malware

        What it is Malware is any software made to harm your device or data. It can steal passwords, lock your files, spy on activity, or hijack your browser. For a quick primer and examples, see our malware explainer. How it spreads Phishing emails and fake ...
      • Malware Obfuscation

        What it is Malware obfuscation is the trick of disguising malicious code so security tools and analysts cannot recognize it. Attackers change how the code looks and runs without changing what it does, letting the same malware slip past filters again ...
      • Local Area Network (LAN)

        What it is A Local Area Network (LAN) connects computers and devices in a small area like a home, office, or school. Devices talk to each other through ethernet cables or Wi-Fi, sharing files, printers, and internet access. Why it matters A good LAN ...
      • Security Software

        What it is Security software is a set of apps and services that protect your devices and data from hackers, malware, and mistakes. It covers tools like antivirus/anti-malware, firewalls, VPNs, email and web filters, intrusion detection/prevention, ...