{"id":1845,"date":"2006-01-26T00:00:00","date_gmt":"2006-01-26T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/26\/bots-nearly-triple-in-2005\/"},"modified":"2021-12-30T11:40:07","modified_gmt":"2021-12-30T11:40:07","slug":"bots-nearly-triple-in-2005","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/26\/bots-nearly-triple-in-2005\/","title":{"rendered":"Bots Nearly Triple In 2005"},"content":{"rendered":"<p>The number of bots released in 2005 was almost triple that of the year before, Madrid-based Panda Software, spotlighting the growing problem of PC hijacking.  That&#8217;s not surprising, considering the large number of variations attackers crank out for some bot families.   The Gaobot clan (also dubbed &#8220;Agobot&#8221;) alone spun off more than 6,000 variants last year.  Botnets, which are typically controlled by a &#8220;herder,&#8221; or handler, can be composed of thousands, or hundreds of thousands, of contaminated PCs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The first arrest of a botnet herder in the U.S. occurred in November 2005, when Jeanson James Ancheta, 20, of California, was accused of accumulating 400,000 bots.  Ancheta pleaded guilty to several federal felony counts Monday, and faces up to 25 years in prison.<\/p>\n<p>http:\/\/news.yahoo.com\/s\/cmp\/20060127\/tc_cmp\/177104269;_ylt=AtcaWdg2oQE051AhT6AP3GQ1k4gC;_ylu=X3oDMTBiMW04NW9mBHNlYwMlJVRPUCUl<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1845","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1845"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1845\/revisions"}],"predecessor-version":[{"id":4332,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1845\/revisions\/4332"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}