Spread primarily via email spam with malicious attachments or links, a technique still common today to create botnets.

Technical Report: Analysis of "botnet.mp4" (Storm Botnet Case Study)

Used for massive spam campaigns, stealing personal data, and launching distributed denial-of-service (DDoS) attacks.

Detailed exploitation of the Storm Botnet’s command-and-control (C2) infrastructure.

To prevent a device from becoming part of a botnet (as seen in the video), organizations should:

Use services like Cloudflare to mitigate DDoS risks.