Akhil Bhartiya Cyber Suraksha Sangathan (Regd.)
Regd. with Registrar of Society of NCT Delhi-Regd. No-287
Cyber Criminals se Suraksha, Digital India ki Raksha
अखिल भारतीय साइबर सुरक्षा संगठन (पंजी)
भारत की पहली साइबर क्राइम इन्वेस्टीगेशन एन जी ओ
ऑनलाइन रहें सतर्क, साइबर अपराध से रहें सुरक्षित
www.abcss.org Email: [email protected]
AMIT MALHOTRA
(Cyber Crime Investigation Specialist)
Founder Akhil Bhartiya Cyber Suraksha Sangathan
18 yrs experience in crime prevention, detection and investigation. Certified Ethical Hacker from Ec-Council. Certified Cyber Crime Investigator from Asian School of Cyber Laws. Presently working in the area of cyber crime investigation.
⚠️ How Botnets Spread
- Malware downloaded from infected websites
- Phishing emails with malicious attachments
- Exploiting unpatched software vulnerabilities
- Infected USB drives or external storage
- Malicious apps from unofficial app stores
- Weak or default passwords on routers & IoT devices
- Drive-by downloads from compromised web pages
- Pirated software bundled with bot malware
✅ How to Protect Yourself
- Keep OS, browsers and all software fully updated
- Install reputed antivirus and run regular scans
- Never download software from unofficial sources
- Change default passwords on routers and IoT devices
- Do not open unknown email attachments or links
- Use a firewall on your home and office network
- Disable unused remote access features on devices
- Monitor your internet usage for unusual activity
🚨 Signs Your Device May Be Infected / What To Do
- Device is unusually slow, overheating or crashing frequently
- Unusually high internet data usage even when idle
- Unknown programs running in background or starting on boot
- Immediately run a full antivirus and anti-malware scan
- Disconnect from the internet and isolate the infected device
- Change all passwords from a different, clean device
- Report the incident to cybercrime.gov.in or call 1930
- Contact a certified cyber security professional for deep cleaning
- File FIR at nearest Cyber Crime Cell if financial loss occurred
DDoS Attack (Distributed Denial of Service)
Thousands of infected bots simultaneously flood a target website or server with traffic, making it unavailable to legitimate users. Banks, e-commerce sites and government portals are common targets of DDoS botnet attacks.
Spam & Phishing Campaigns
Botnets send billions of spam or phishing emails per day using infected devices. These emails carry malware, fake bank alerts, lottery scams, and fraudulent links — spreading the botnet further or stealing credentials.
Credential Stuffing & Brute Force
Bot masters use botnets to automatically try millions of username/password combinations across websites and banking portals. Even if most fail, a small success rate across millions of attempts yields thousands of compromised accounts.
Cryptojacking (Crypto Mining Botnet)
Criminals secretly use the processing power of infected devices to mine cryptocurrency like Monero or Bitcoin. Victims notice high CPU usage, slow performance, overheating and increased electricity bills without knowing the cause.
Spyware & Data Theft Botnet
Bots silently monitor infected devices — logging keystrokes, capturing screenshots, recording webcam footage, and stealing banking credentials, personal files and sensitive business data which is sent back to the attacker.
Ransomware Distribution via Botnet
Botnets are used to rapidly distribute ransomware across thousands of connected systems simultaneously. Once infected, all files on the device are encrypted and victims are demanded ransom — often in cryptocurrency — for decryption.
IoT Botnet (Smart Device Attack)
Smart TVs, CCTV cameras, Wi-Fi routers, smart speakers and other Internet of Things (IoT) devices with weak passwords are compromised and added to botnets. The infamous Mirai botnet used IoT devices to launch record-breaking DDoS attacks.
Click Fraud Botnet
Bots are programmed to repeatedly click on online advertisements, generating fake revenue for fraudsters through pay-per-click schemes. This costs advertisers and businesses crores of rupees annually and distorts marketing data.
IT Act Section 43A: Liability of body corporates for failing to implement reasonable security practices leading to data breach — applicable when botnets cause corporate data theft.
IT Act Section 66: Computer-related offences including dishonestly or fraudulently using a computer system — up to 3 years imprisonment and/or fine. Applicable to bot herders who control botnet operations.
IT Act Section 66B: Dishonestly receiving stolen computer resources or communication devices — up to 3 years imprisonment + ₹1 lakh fine.
IT Act Section 66F: Cyber Terrorism — if botnet attacks target critical infrastructure like power grids, banking systems or government networks, this section carries imprisonment up to life.
IPC 120B: Criminal conspiracy — when organized groups operate botnets for financial gain or targeted attacks, all members are liable under conspiracy charges.
IPC 425 & 441: Mischief and criminal trespass — applicable when botnet attacks cause damage to computer systems, networks or destroy data of individuals or organisations.





