Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 551

IoT Botnet

What is IoT Botnet?

IoT BotnetA network of compromised Internet-of-Things devices remotely controlled to launch attacks such as DDoS, credential stuffing, click fraud, or cryptomining.


An IoT botnet is a collection of compromised Internet-of-Things devices — routers, cameras, DVRs, smart appliances, set-top boxes — that an attacker controls via command-and-control infrastructure. Devices are typically infected by exploiting default or weak credentials, exposed Telnet/SSH services, unpatched firmware, or known CVEs in webcam and router software. Once recruited, the botnet is rented out or used directly for distributed denial of service (DDoS), proxy/anonymization services, credential stuffing, ad fraud, or cryptomining. Mirai and its many variants (Bashlite, Mozi, Echobot, Reaper) demonstrated that millions of low-cost IoT devices can generate multi-Tbps attacks. Defences include strong default-credential policies, automatic patching, segmentation of IoT VLANs, and disabling unneeded remote-management services.

Examples

  1. 01

    A botnet of compromised home routers using DNS amplification to flood a hosting provider with terabits of traffic.

  2. 02

    Hijacked IP cameras sold as residential proxies for credential-stuffing attacks.

Frequently asked questions

What is IoT Botnet?

A network of compromised Internet-of-Things devices remotely controlled to launch attacks such as DDoS, credential stuffing, click fraud, or cryptomining. It belongs to the OT / ICS / IoT category of cybersecurity.

What does IoT Botnet mean?

A network of compromised Internet-of-Things devices remotely controlled to launch attacks such as DDoS, credential stuffing, click fraud, or cryptomining.

How does IoT Botnet work?

An IoT botnet is a collection of compromised Internet-of-Things devices — routers, cameras, DVRs, smart appliances, set-top boxes — that an attacker controls via command-and-control infrastructure. Devices are typically infected by exploiting default or weak credentials, exposed Telnet/SSH services, unpatched firmware, or known CVEs in webcam and router software. Once recruited, the botnet is rented out or used directly for distributed denial of service (DDoS), proxy/anonymization services, credential stuffing, ad fraud, or cryptomining. Mirai and its many variants (Bashlite, Mozi, Echobot, Reaper) demonstrated that millions of low-cost IoT devices can generate multi-Tbps attacks. Defences include strong default-credential policies, automatic patching, segmentation of IoT VLANs, and disabling unneeded remote-management services.

How do you defend against IoT Botnet?

Defences for IoT Botnet typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for IoT Botnet?

Common alternative names include: Internet of Things botnet, IoT-based botnet.

Related terms

See also