Is Your PC A Zombie? And What’s a Zombie Computer, Anyway? [MakeUseOf Explains]

Zombie Computers Intro   Is Your PC A Zombie? And Whats a Zombie Computer, Anyway? [MakeUseOf Explains]Have you ever wondered where all of the Internet spam comes from? You probably receive hundreds of spam-filtered junk emails every day. Does that mean there are hundreds and thousands of people out there, sitting around sending them out manually? Unfortunately, no. The process is mostly performed by zombie computers.

Whoa! Zombie computers? That sounds dangerous, scary, and a bit apocalyptic, doesn’t it? In a sense, that could be a true description. There are millions of zombified computers all around the world that perform terrible acts, like sending out spam and malware. It’s not the end of the world yet, but it’s definitely a hassle. And worst of all, your computer might be one of those zombies.

What Is A Zombie Computer?

zombie computers what is   Is Your PC A Zombie? And Whats a Zombie Computer, Anyway? [MakeUseOf Explains]

We’re not talking about computers that have risen from the dead – that would be a rather fascinating investigation of its own. Instead, when we talk about zombie computers, we’re describing a computer that has been infiltrated and hijacked by a third party. Most of time, this zombification occurs through malware, Trojans, and viruses.

What happens when your computer turns to the dark side? It can be controlled by a third party – whether that third party is a single person, a group of people, or even a corporation–to do things without your knowledge. Like, for example, sending out spam emails or performing denial of service attacks.

When a person has an army of zombie computers at their command, these armies are called “botnets”.  Botnets are used to cause mischief across the Internet because they are so difficult to trace back to the original controller. Most PC owners don’t even realize that their computers have been doing the bidding of another.

Is Your Computer A Zombie?

zombie computers are you   Is Your PC A Zombie? And Whats a Zombie Computer, Anyway? [MakeUseOf Explains]

In most cases, zombie infections are not intentional–meaning that hackers don’t intentionally pick a specific computer to zombify. If anything, computers are zombified through contagious contact with malware links and virus-laden emails. So if your computer is a zombie, don’t immediately assume that someone is out to get you.

The thing about malware and virus infections is that they don’t want to be detected, which means it can be hard to determine if your computer is a zombie. Fortunately, there are a few ways that can point you in the right direction. Look for these symptoms on your computer:

  • Zombie processes require use of the computer’s processor and network. If you’ve experienced a slowdown in your computer’s operating speed or your network speed, then you may have an infection.
  • Check your email accounts–particularly their outbound messages. Botnets require bots to operate, which means that botnets are always “recruiting” new computers. This is done through the spread of malware. If you’re sending out emails that you’ve never written, then you may be infected.
  • Zombie IP addresses are often put onto blacklists. If you suspect an infection, you can check to see if your IP address has been added to any blacklists. Copy this URL into your browser–http://www.robtex.com/ip/xxx.xxx.xxx.xxx.html#blacklists–and replace the “xxx.xxx.xxx.xxx” with your own IP address (use http://www.whatismyip.net).

If you have a zombie infection, the best course of action is to run a scan of your system using anti-malware and anti-virus programs. My own recommendations include Malwarebytes Anti-Malware and Lavasoft Ad-Aware Pro.

Preventing Zombie Infections

zombie computers prevent   Is Your PC A Zombie? And Whats a Zombie Computer, Anyway? [MakeUseOf Explains]

The best defense against zombie infections is a strong offense – meaning a proactive approach towards keeping yourself safe and out of malware’s way. Here are some ways to keep yourself as safe as possible:

  • Patch Internet software applications as often as possible. Things like browsers, chat programs, cloud storage services, and others–all of these things require Internet access. A security vulnerability in a program can leave a hole open for malware to exploit.
  • Run anti-malware and anti-virus programs regularly. This will catch problems on a regular basis, keeping your computer from being infected for too long.
  • Use a firewall. I know, it can be pretty annoying at times, but a firewall is always recommended in security tips because firewalls work. Don’t neglect it.
  • 7 Important Email Security Tips You Should Know About
  • 5 Common Security Mistakes That Can Put Your Privacy & Money At Risk

Practice safe Internet habits and always be wary of suspicious links. When you have malware, clear it out as soon as possible. But all the same, don’t be too scared or paranoid of zombie infections. Yes, infections are annoying, but they won’t demolish your system. Just stay alert and you’ll be fine.

Image Credits: Zombie Computer Via Shutterstock, Botnet Via drdobbs.com, Malware Computer Via Shutterstock, Security Via Shutterstock

The comments were closed because the article is more than 180 days old.

If you have any questions related to what's mentioned in the article or need help with any computer issue, ask it on MakeUseOf Answers—We and our community will be more than happy to help.

25 Comments -

Gerald Huber

My computer might be a zombie. Its slow, its front left case foot fell off and it makes a noise that sounds like “CPUUUuuuuusssssss”.

thanks for the article

Joel Lee

The best kind of computer zombie. ;)

Achraf Almouloudi

You should check Ctrl + Alt + Delete in Processes to detect any unusual, not official (from a company you know) memory and network eating processes, end them and see what happens, then if nothing wrong happens, reboot and write their process names and try to find them using your computer search. If you’re not sure about a process name try first searching it in Google for more information.

Lee

Need a print friendly version of this. I would like to print it up and put it on the wall in my cube but not with all the noise on the right-side.

Joel Lee

We don’t have a print-friendly option on this site, but you can always use a service like Evernote Clearly. Our editor loves it. :)

Igor Rizvi?

Wow my ip i s blacklisted 2 times :S ..thanks for sharing this..

vineed gangadharan

Sorry, we are currently missing dns information for 183.87.56.3

It is blacklisted in 14 lists.
This was shown on the site when i entered my ip as you have said.so am i infected???

Alexander

Yes :/ . Since it is blacklisted on 14 lists, it sounds like it have been “zombified” for a while. Just follow the article and i think you will be fine !

Douglas Mutay

This is far beyond one of the most instructive and best article ever!
Thank you very much. I am going to share this with all my officemates and friends!
Thumbs up for the great job!!!

Joel Lee

Thank you for your kind words, Douglas. :D

ha14

if the pc refuse to sleep then this is sign of zombification:)

Achraf Almouloudi

What does it do exactly.

Anonymous

I hope mine isn’t one :P

Vishal Srivastava

Thanks for this article!!
Checked out that mine isn’t a zombie and hope that it stays that way!!

dragonmouth

You forgot the most important advice of all – Do not use an O/S in which administrative tasks can be performed by a user, such as Windows. Use one in which administrator and user capabilities are clearly defined and clearly separated, such as BSD.

Mac Witty

Here, I think the one in front of the computer is more of a zombie ;)

Joel Lee

Haha. That’s definitely true in my case. :D

Anonymous

What if I have a dynamic ip?

Joel Lee

You can still be infected with a dynamic IP. The problem is that if your IP is blacklisted and you change IPs, you won’t know that you’ve been blacklisted if you check the blacklists. This just makes it harder to diagnose if you really are zombied.

In that case, I would just run one or two big-name high-quality malware/spyware/antivirus scanners just to make sure you’re clean.

Shmuel Mendelsohn

I’m afraid of my computer!!!!

Austen Gause

thats kind of freaky but its not surprising.

Giggity Goebbels

My isp using a proxy,how do i check?

Din One

This is most worry thing… tHanks for info…

Giggity Goebbels

To get rid of that,all we need is to win a match of plants vs zombies

Sriram

Luckily, My PC was not a zombie now!