Level 3 Communications reports that America is the home for more server commands and botnet control, followed by Ukraine, and Russia in second and third place.
Administration and control servers are used to manage botnets, and they usually manage to run for an average of 30 around days before their service providers stop, or local police authorities.
The Level 3 Communications research reports that US servers are used as botnets administration and control servers as they provide reliable network infrastructures.
Let's say that all of these servers are not legal but have been tampered with and used by botnets without their owners knowing it.
"On average, 20 percent of the botnet's command and control servers are located in North America, while the same percentage are from Ukraine and Russia combined," the report said. study [PDF].
The United Kingdom is sixth on the list, while Australia is not included in the global list at all report which monitored 1000 command and control servers during the first quarter of 2015.
Noteworthy is the fact that 600 from botnets attended by Level 3 used corporate networks.
"It seems uncontrollable that command and control servers have the potential to disrupt business and destroy assets. data and vital information.”
Level 3 describes in its report some of the latest botnet threats such as bot SSHPsychos that accounted for 35% of total SSH traffic.
This bot has stopped working at Level 3 together with Cisco Talos, which has stopped automated SSH brute-force attacks against Linux servers.