Botnet AttackWhat Happens When Hackers Enlist Their Victims to Do Their Dirty Work?

Harlan Hutson | November 24, 2025 | 16 min read

This featured video was created using artificial intelligence. The article, however, was written and edited by actual payment experts.

What is a Botnet Attack?

In a Nutshell

Hackers aren’t always after your data. In some cases, they may just be aiming to borrow your computer. By placing small, barely noticeable programs in your operating system, they can secretly connect your device to an entire network of other small programs. As we’ll explore today, this “bot” network can do more damage than any single device.

What is a Bot Scam? Understanding & Preventing Botnet Attacks

In your mind, picture the kind of guy who commits identity theft. You’re probably imagining a shady guy in a dark room, working diligently to try and break into your account.

There are obviously crooks doing that manual hacking work. They’re not the biggest threat, though. Cybercrime is an industry unto itself, and anyone who uses a computer is at risk. That’s because, in the case of botnet attacks, cybercriminals may be using your machine to do their dirty work, without you even knowing it.

How Do Botnets Work?

TL;DR

A botnet (short for robot network) is a group of devices that are all running the same automated script. The purpose is to do a lot of work with a minimal amount of human input required.

Let’s start with some fundamentals.

What we refer to as a bot is in reality a computer program used to perform automated tasks. Mostly, these tasks are routine, uncomplicated, and repetitive. Bots have legitimate uses; for example, search engines use bots to scour the internet and identify new or updated content on web pages.

An army of bots — called a botnet — can do the job considerably faster than humans, and with fewer errors. A botnet (short for robot network) is not a program itself, but rather a group of electronic devices that are all running the same script or program. As with any other application of botnets, the goal is to do a lot of work with a minimal amount of human input required.

Common QuestionWhat is a “Zombie” Device?Individual devices in a botnet are often referred to as zombies. This is because the device is infected with malware, allowing the hacker to use the device remotely and without the owner's knowledge. Like those shambling creatures from the movies, the device operates according whatever command its master gives.

What is a Botnet Attack?

Botnet Attack

[noun]/bôt • net • ə • tək/

A botnet attack is an attempt by a hacker to conduct large-scale, automated cyberattacks through a massive network of hijacked, internet-connected devices, rather than manually controlling one single machine.

Bots have legitimate uses; the problem is when scammers deploy botnets to facilitate fraud. With a botnet attack, the work in question could be brute force attacks to try and guess account passwords, or to overwhelm a server and conduct a DDoS attack.

Merchants are particularly susceptible to botnet attacks for two big reasons. First, most merchants submit transactions for processing on the daily. This creates an monetizable and always-on testing environment for scammers, who can test stolen cards or launch credential stuffing attacks with ease.

The other reason is that many merchants operate at scale. They submit dozens, hundreds, or even thousands of transactions for processing at once. Botnet attackers can use this volume to either fly under the radar among the backdrop of mostly legitimate payment activity, or actively exploit a merchant’s infrastructure to attempt thousands of transactions at once.

Did You Know?

According to LexisNexis Risk Solutions, bad bots — including those that scrape data, attempt account takeovers, or test cards — accounted for 31% of eCommerce traffic in 2024.

How Do Hackers Create Bot Networks?

TL;DR

Hackers infect targeted machines with malware. Once infected, the attacker can send commands to all the compromised systems at once.

The first step in committing a botnet attack is creating the network itself. Hackers can infect targeted machines with malware through a variety of methods, enabling outside access. The end result is an entire network under the control of the attacker. Any device that connects to the internet could potentially be compromised, including:

  • Computers
  • Tablets
  • Mobile Phones
  • Smartwatches
  • Fitness Trackers
  • Smart Home Devices
  • Doorbell or Security Cameras
  • Web Servers
  • Network Routers

In order to remain hidden from the device’s owner, the malware programs must be very small and take up minimal processing power. The crook will need to infect a large number of machines to get the job done. In theory, a dozen infected devices could be called a botnet, but botnets often consist of millions of linked devices.

Hackers can use a variety of methods to gain control of a device, including phishing, installing Trojan horse viruses, exploiting security vulnerabilities, and deploying social engineering attacks. As we’ll see, crooks can even leverage a botnet attack to infect machines for use in a different botnet attack.

After it has been hacked and infected, the “zombie” device will be linked back to the central botnet server. All the linked devices can then be operated remotely through Command and Control (C&C) software, enabling the attacker to send commands to all the compromised systems at once. 

Important!

Herders don’t completely hijack devices. The hacker doesn’t want to assume total control; they actually want the zombie’s true owner to continue using their device as normal, while the scammer’s programs run in the background.

Centralized vs. Decentralized Botnet Attacks

There are two common types of botnets hackers use. In one version, all the connected programs/machines are governed by a single machine (called a “bot herder”). In other words, one server is giving orders to each individual bot in the network.

For the hacker, the downside of this method is that the entire operation can be shut down from a single machine. This is generally not the preferred attack method, for obvious reasons.

In a decentralized botnet attack, each bot in the network shares responsibility for giving attack instructions. As long as the hacker can communicate with a single device in the network, they can still execute the attack through all the other linked devices. This greatly increases the difficulty of tracking the attack to its source. 

In either situation, though, a single attacker with an extensive army of zombie bots can spread rapidly. They can target and infect every computer in a company, or even compromise entire networks.

How Botnet Attacks Work: From Infection to Attack

TL;DR

A botnet attack begins when an attacker recruits thousands of compromised devices into a botnet under a single command and control (C&C) server. The attacker then initiates the attack by sending a signal from the C&C server to all botnet devices at once.

Although a botnet attack may appear random, it’s really the terminal stage of a four-phase lifecycle.

The attack starts when thousands of everyday internet-connected devices, from PCs and phones to smart TVs and security cameras, get roped into a bot network. At this stage, malicious bot herders are less concerned about the particular type of device infected and more concerned that the device can be controlled. 

Once infected, devices begin reporting to a hidden command and control (C&C) server. If the bot herder is the puppet master, then this server is the set of strings that the puppet master uses to manipulate all the bots at once. C&C servers are often decentralized or hidden behind layers of proxy networks, which make them incredibly resilient and difficult for authorities to identify and shut down.

With the network in place, the bot herder can begin to launch attacks, which happen when thousands of devices carry out coordinated commands simultaneously. When these attacks hit merchants, they often manifest as card-testing events, site-crashing denial-of-service (DoS) attacks, or spam campaigns that involve bad traffic from every corner of the globe.

Bot attacks are just one way cybercriminals threaten your digital security.

Talk to us about a comprehensive fraud prevention strategy.

Request a Demo
The Original End-to-End Chargeback Management Platform

Common Botnet Attacks Strategies: How Do Hackers Use Botnets?

When building their botnet, hackers specifically try to gain security access at the administration level or higher. The greater access a zombie device has, the easier it is to infect other machines. Admin access also enables a wider range of potential attack types.

Some of the most common tactics deployed by hackers conducting botnet attacks include:

Warning

Phishing Campaigns

Bots are used to send mass emails, with the aim of tricking victims into revealing confidential information.

Warning

Mass-Mail Spamming

Sending bogus messages containing malicious links or attachments to capture data or expand the botnet.

Warning

DDoS Attacks

A “distributed denial of service” attack uses bots to overload a server with request traffic, thereby making the site in question crash.

Warning

Social Spamming

Distributing spam messages across online forums, review sites, or social media/blog post comments sections.

Warning

Brute Force Attacks

Using bots to try all possible combinations of a code (a 4-digit PIN or password, for example) until a working code is discovered.

Warning

Click Fraud

Repeatedly clicking on sponsored ads or affiliate links to drive up victims’ expenses or artificially inflate content popularity with phony likes.

Warning

Card Testing Attacks

Rapidly testing thousands of stolen card numbers with micro-transactions, resulting in a wave of authorization fees and subsequent chargebacks.

Warning

Inventory Denial

A malicious form of automated “window shopping” that targets high-demand or limited-stock items, leading to phantom sell-outs that make it impossible for legitimate customers to buy.

Warning

Web Scraping

Bad bots systematically steal proprietary pricing data, product descriptions, and customer reviews. This allows competitors to instantly undercut prices and clone successful eCommerce listings with minimal effort.

Warning

Gift Card Balance Draining

Exploiting balance-checking portals with bots that systematically guess and check numbers, enabling attackers to find and drain active gift cards before real customers can ever use them.

Warning

Crypto Mining

Stealing processing power from devices in the network to perform cryptocurrency mining operations at the others’ expenses.

Using Botnets for Fraud-as-a-Service (FaaS) Schemes

TL;DR

Scammers with limited technical knowledge can conduct sophisticated botnet attacks by renting a dormant botnet (a practice called “fraud as a service” or “FaaS.”

Technology is no longer a barrier to entry, as scammers with limited technical knowledge can simply buy a botnet on the dark web. They can rent access to a botnet and launch complex attacks for less than the price of a cup of coffee; a classic example of a fraud-as-a-service (FaaS) arrangement.

In some cases, these underground, criminal services function just like legitimate SaaS platforms, offering user-friendly dashboards and subscription plans. A DDoS attack, for instance, might be sold for $50 per hour, while card testing services may charge a fixed fee per thousand attempts. This accessibility removes technical barriers to entry and allows even the least sophisticated bad actors to launch massive, automated attacks against eCommerce businesses with minimal investment and near-total anonymity.

This is a highly profitable criminal model. For bad actors, botnet attacks are low-risk, high-reward propositions, and that’s in large part why merchants continue to face an unrelenting barrage of bot attacks.

How Botnet Attacks Impact Your Business

Every time you experience a botnet attack, you incur a litany of direct costs, operational chaos, and fines that can jeopardize the long-term health of your business. Negative impacts include:

Direct Fraud Losses

This is the most obvious cost; the full value of any merchandise successfully shipped to a scammer before the fraud was caught. These losses are almost never recoverable, so you have to eat the product, fulfillment, and transaction costs yourself.

Operational Costs

A bot attack is an “all-hands-on-deck” emergency that pulls your team away from productive work. Your staff now needs to spend time manually investigating suspicious activity, fielding complaints from legitimate customers locked out of their accounts, and managing the fallout of the attack, instead of performing revenue-generating activities that help you grow your business.

Authorization Fees From Card Testing

This is essentially a “death by a thousand cuts” scenario. Depending on the fee agreement you inked with your payment processor, you may have to pay an authorization fee (which can range from $0.01 to $0.25) for every transaction attempt — even the ones that are declined or reversed. A bot testing 10,000 stolen cards can generate thousands of dollars in non-refundable fees overnight, effectively billing you for the privilege of being attacked.

Chargeback Ratio Damage

Card networks like Visa and Mastercard strictly monitor your chargeback-to-transaction ratio, and a sudden spike in fraud from a bot attack can easily push you over the “excessive” or “high-risk” threshold. This can lead to involuntary enrollment in a merchant monitoring program, resulting in account restrictions, higher processing costs, and punitive surcharges for continued non-compliance.

Merchant Account Jeopardy

Mandatory monitoring programs are only the first step. If you’re chronically unable to keep your chargeback ratio in check, your payment processor may terminate your merchant account entirely, leaving you unable to process any payments. In the worst case, you may even risk placement on the MATCH List, which is essentially an industry-wide blacklist.

Revenue Loss From Downtime

Even a DDoS attack, which doesn’t seem as “bad” as a deluge of account takeovers, can have consequences. When your site is taken offline, it pauses sales and drives potential customers to your competitors. Every minute of downtime is a direct loss of revenue and an opportunity for a frustrated customer — who found your site “broken” — to find a new, more reliable store.

Reputational Harm

Customer trust is the single most valuable long-term asset in eCommerce, and a bot-driven account takeover or data breach can erode it rapidly. The resulting negative reviews, social media complaints, and waning brand loyalty can inflict damage that lasts for years after the attack.

Inventory Impact

Bots can paralyze your business by adding all of your high-demand items to thousands of carts without completing any purchases. These “phantom sell-outs” can sabotage sales events by preventing genuine, paying customers from buying your products.

Higher Card Processing Fees

Even if you survive a bot attack, your payment processor may still reclassify you as a higher-risk merchant. When it comes time to renew your contract, you could be presented with elevated transaction processing rates that eat into your margins on every single legitimate sale you make from that point onward.

Customer Lifetime Value Loss

The ultimate, long-term impact of botnet attacks is the permanent erosion of your customer base. Legitimate customers who have their accounts compromised, their loyalty points stolen, or who are simply blocked by overly aggressive fraud filters will often leave in frustration and never return, resulting in the loss of their entire lifetime value.

How to Detect Botnet Attacks in Real-Time

Bots do not behave like human customers. They leave a distinct, automated fingerprint, and identifying these patterns in real-time can help you deflect or thwart an attack before it causes catastrophic damage. Here are some warning signs to consider:

  • Sudden spike in authorization attempts: A high volume of transactions, especially for small, identical amounts (e.g. $1.00).
  • Multiple cards, one address: Dozens of different card numbers all using the same shipping address could be a sign that the fraudster is using a freight forwarder to conceal their address.
  • Rapid-fire submissions: A velocity of transaction attempts from a single IP or user that is physically impossible for a human.
  • High decline volume: An abnormally high ratio of card declines concentrated in a short timeframe.
  • Testing velocity limits: A pattern of transactions just below your preset velocity limits (e.g. 4 attempts when the limit is 5).
  • Sequential card numbers: Repeated attempts using card numbers that are numerically sequential (e.g. ending in ...1234, ...1235, ...1236).
  • Similar transaction patterns: Testing BINs by using many different card numbers all issued by the same bank.
  • Repeated attempts with slight variations: The same card being tested multiple times with small changes to the Card Verification Value (CVV) or expiration date.
  • Abnormal spike in failed logins: A sudden, massive increase in failed login attempts or password reset requests.
  • Multiple accounts, one IP: One IP address attempting to log in to dozens or hundreds of different customer accounts.
  • Inhuman login velocity: Hundreds of login attempts per minute, far exceeding any normal human behavior.
  • Mass account lockouts: A sudden increase in customers being locked out of their accounts due to repeated failed attempts.
  • Unusual traffic spikes: A massive surge in site traffic without a corresponding marketing campaign or sales event.
  • Traffic from odd sources: High traffic from known data centers, cloud hosting providers, or proxy services instead of residential ISPs.
  • Server slowdowns: Unexplained high CPU, memory, or bandwidth consumption that makes your site slow or unresponsive.
  • Connections from known botnets: Your firewall or web application firewall (WAF) logging a high volume of blocked connections from known malicious IP ranges.
  • Residential proxy indicators: Traffic that is globally distributed but shows coordinated, identical behavior patterns.
  • IP and billing mismatches: A high volume of transactions where the IP address location does not match the billing address country.
  • Overnight or weekend activity: A major spike in activity during off-business hours when your monitoring and staff are at a minimum.
  • Event-timed attacks: An attack that begins right around the same time a limited-edition product drops or a major sale goes live.
  • Coordinated multi-vector attacks: A simultaneous attack on multiple endpoints, such as login pages, checkout, and “add to cart” functions.
  • New accounts, high-value purchases: Brand-new accounts that are created and immediately attempt to make repeated large or expensive purchases.
  • Bulk account creation: A rapid influx of new accounts created with similar or nonsensical email addresses or usernames.
  • Dormant accounts waking up: Long-inactive customer accounts that suddenly become active with new login attempts or password resets.

Responding to an Active Botnet Attack

Knowing that you’re the victim of a botnet attack is no fun. But, panic is the enemy. Instead, carrying out a calm, methodical, and pre-planned incident response plan can help you minimize financial and operational damage. Consider the following steps:

Triage & Containment

Step #1 | Triage & Containment

You may be tempted to just shut down your site to contain the damage, but there’s no need to do that. Instead, just add friction to create a temporary barrier.

Confirm the attack by cross-referencing traffic spikes with transaction declines, and then immediately deploy emergency rate limiting, activate CAPTCHA challenges on login and checkout, and block the most obvious offending IP ranges or geolocations. The goal is to make the attack unprofitable and ineffective for the bot herder for the time being so that you can buy time to analyze the attack’s full scope.

Coordinate & Communicate

Step #2 | Coordinate & Communicate

After the initial threat is contained, coordinate an all-hands event. Then, reach out to your payment processor to notify them of the attack and request that they immediately tighten their own upstream fraud filters on your behalf.

Internally, establish a “war room” comprising key members of your IT, risk, and customer service staff to ensure that your entire organization is prepared to field questions and assuage concerns from legitimate customers who may be impacted. During this time, you can also file a police report with your local law enforcement agency or lodge a complaint with the FBI’s Internet Crime Complaint Center (IC3).

Assess the Full Scope of the Damage

Step #3 | Assess the Full Scope of the Damage

Once the initial cleanup is over, shift to forensics. When assessing the damage, consider direct fraud losses like inventory costs and authorization fees from failed transactions. Also, account for the potential impact on your chargeback ratio, and determine which customer accounts (if any) were compromised.

This data can help with post-attack hardening and give you the information you need to file a compelling cyber or eCommerce fraud insurance claim.

Recover, Harden, & Report

Step #4 | Recover, Harden, & Report

Recovery is a gradual process. As you slowly lift temporary blocks, you’ll need to replace them with permanent, smarter rules based on the attack's unique signature.

This is also the time to negotiate a waiver of invalid authorization fees with your payment processor, force password resets on compromised accounts (or on all accounts), and conduct a detailed post-mortem report to build a stronger and more resilient defense for the next attack.

Botnet Attack Prevention Strategies for Merchants

A robust defense against botnet attacks is a multi-layered one. Fraud detection and prevention tools should target vulnerabilities across the entire buying journey, from signup and login to checkout and payment. Here are some security measures to consider:

Foundation-Level Defenses

Start by mastering the tools you already have. Enabling Address Verification Service (AVS) and CVV checks, setting basic rate limits in your payment gateway, and requiring CAPTCHA on account creation are low or no-cost barriers that slow down bots. Doing so dramatically increases their cost-per-attempt and makes your store an unprofitable and undesirable target.

Transaction Controls & Velocity Rules

This layer acts as your site’s “speed trap,” catching bots that try to move faster than a real customer. Go beyond simple limits by implementing progressive delays that add a few seconds of friction after each failed transaction.

While this delay adds little to no friction for a human re-typing their card information, it can effectively roadblock automated scripts trying to test thousands of cards per minute.

Account Security Measures

Treat customer accounts like the high-value assets they are. Requiring email verification on creation, for example, can stop bulk synthetic sign-ups, while implementing multi-factor authentication (MFA) can help you defang credential stuffing attacks by rendering a bot herder’s stolen password list useless without additional verification factors.

Payment Page Hardening

Your checkout page is the primary target and must be hardened. Use tokenization so that sensitive card data never touches your server, minimizing your PCI-DSS scope and risk.

You can also implement invisible “honeypot” fields. For instance, a text field hidden from all human users but visible to bots that, when filled, instantly flags the user as non-human and blocks the transaction.

Network & Infrastructure Protection

These perimeter defenses can help you filter out the most obvious threats. A web application firewall (WAF) and a content delivery network (CDN) work together as a powerful first line of defense; a CDN is built to absorb the sheer volume of a DDoS attack, while a WAF filters the traffic, applying rules to block known bot signatures and malicious requests before they reach your store.

Implementing a Multi-Layered Bot Defense Strategy

In the section above, we talked about developing a time-based incident response plan. We’ll now discuss how you can complement your responses with defensive tactics, beginning on the first day of the attack and beyond.

Time Actions

The First 72 Hours: Immediate Actions

As mentioned above, “Level 1” of your defense strategy should be about triaging. At the most basic level, you should be focused on stopping the immediate bleeding with tools you already pay for.

For example, enable every available filter within your payment processor’s dashboard. Set aggressive velocity rules, strictly enforce AVS/CVV checks, and add CAPTCHA to checkout and login flows. This high-impact first step can help you establish a baseline defense and document your starting traffic patterns.

Time Actions

The First Month: Fundamental Protections

“Level 2” of your defensive strategy should mark a shift from a purely reactive to a proactive defense posture.

For as little as $20 a month, you can add a basic web application firewall to filter known bot signatures and deploy simple device fingerprinting. This security layer can help you differentiate bad traffic from good by analyzing a user’s browser type, operating system, and IP reputation.

Time Actions

The First Quarter: Advanced Detection

“Level 3” of your defense strategy is where you shift to predictive defense by investing in a dedicated bot detection service.

By analyzing behavioral biometrics — such as mouse movements, typing cadence, and mobile swipe patterns — you can generate a score for a user’s “humanity” in real-time. This allows you to stop sophisticated bots that mimic human behavior without ever showing a CAPTCHA, and adding friction, to a legitimate customer’s buying experience.

Time Actions

The One-Year Goal: Enterprise-Grade Protection

At “Level 4,” bot protection is a fully integrated part of your business intelligence and security operations. In practice, this means deploying a custom-trained machine learning model fed by your own transaction data, integrated with real-time threat intelligence feeds, and managed by a dedicated security team that can identify and adapt to new attack vectors as they emerge.

Digital Security is an Ongoing Issue

In the end, it doesn’t matter whether you’re an individual user or responsible for an entire company network. In either case, the most effective way to mitigate the risk posed by botnet attacks is to prevent them from happening in the first place.

Training, vigilance, and up-to-date systems and virus protection tools are all strong methods of botnet takeovers. In fact, prevention is typically the best way to deal with any type of digital crime, including account takeover attempts and other fraud threats.

A comprehensive strategy can help identify threats before they happen and protect your business and revenue. To learn how we can help, speak to one of our experts today.

FAQs

What is an example of a botnet attack?

One of the most well-known botnet attacks occurred in 2016 against the DNS provider Dyn. The hackers used a DDoS (distributed denial of service) attack to overload and shut down several major sites — including Twitter, CNN, Reddit, Airbnb, and Netflix — with fraudulent traffic.

How does botnet attack work?

The first objective of the botnet is to build a network of internet-connected devices which are then infected with a small malicious software program, or bot. Once the hacker controls this “botnet” of infected devices, they can remotely command every device to simultaneously perform activities, such as DDoS attacks or large-scale phishing attempts.

What is a botnet attack in simple terms?

A botnet attack is any attack leveraging a botnet, or a network of devices infected by malware and linked together to perform the same task. All are under the control of a single attacking party, who uses thousands or millions of infected computers to accomplish more than would be possible with a single direct attack.

Is a botnet attack a DDoS attack?

Often, but not exclusively. Botnets are commonly used for DDoS attacks, but bot networks can be leveraged for other purposes such as account takeover or large-scale spam attacks.

How do hackers use botnets?

Botnets can be used for multiple types of attacks, such as click fraud. In this situation, the network of bots uses malicious software to divert web browser traffic to specific online advertisements. The browser believes the ad has been clicked on, meaning unearned affiliate fees will be paid to the hacker. By using a botnet, the hacker makes it appear as if the fraudulent clicks all come from different users.

How do you know if you are in a botnet?

Unusually slow performance, high CPU, RAM, or GPU usage, the presence of spam or pop-ups, and unexpected application crashes are some signs that you could be in a botnet.

What does a botnet look like?

A botnet is a network of compromised wireless devices, like computers, phones, and even smart devices like laundry machines and security cameras. Botnets can be centralized, decentralized, or structured in a hierarchical fashion.

Like What You're Reading? Join our newsletter and stay up to date on the latest in payments and eCommerce trends.
Newsletter Signup
We’ll run the numbers; You’ll see the savings.
triangle shape background particle triangle shape background particle triangle shape background particle
Please share a few details and we'll connect with you!
Revenue Recovery icon
Over 18,000 companies recovered revenue with products from Chargebacks911
Close Form
Embed code has been copied to clipboard