The Cybercriminal’s Toolkits 215
infected computers, which run automated tasks for cybercriminals, are com-
monly known as zombies. Attackers mainly target computers that have broad-
band access to Internet and a low level of security.
The main vectors of infection are the placement of an executable code
downloaded by a Trojan, through e-mails, or via a malicious website. Bots
also propagate by mass scanning to nd vulnerabilities in services. The hacker
perpetrates the infection and the attack without the user’s knowledge. As men-
tioned above, the hacker can run thousands of bot computers to launch DoS
attacks. He can attack such targets as an e-commerce organization which
allows on-line payments and money transfers, or online auction companies. ...