• A malware is released into cyberspace, with specific instructions programmed into it. The instructions direct the malware to take over as many devices connected to the internet as possible.
    • Depending on its programming, the malware turns internet-connected devices into ‘bots’ and starts building a botnet.
    • Malware like Reaper and Saposhi are capable of identifying weaknesses in devices and exploiting them to turn the devices into bots.
    • Once a large enough botnet is created, simultaneous pings are sent to a single server, causing a server failure, which is called a Distributed Denial of Service attack.
    • Depending on the size of the botnet, malware can execute multiple DDOS attacks at the same time, or over a period of time.