Wednesday, April 2, 2025
HomeDDOSTop 10 Cities | Countries in the World for Total Bot Population

Top 10 Cities | Countries in the World for Total Bot Population

Published on

SIEM as a Service

Follow Us on Google News

Bot Population ;  As per the data published by Symantec  the most bot-infected cities and countries across the Europe, the Middle East, and Africa (EMEA) region.

The top 10 ranking was compiled using telemetry data gathered during 2015 from Symantec security products and includes details about bot-infected PCs, Macs, smartphones, tablets and connected smart devices.

Based on the number of total bots in one specific city, Istanbul, Turkey was the most infected city, with the largest number of detected bots, followed by another Turkish city, Ankara, the country’s capital.

Taking into account the number of Internet users in each country, and comparing this data with the number of detected bots, we get a “bot density” factor that provides a more accurate reflection of which countries do an appalling job at securing their computers and connected devices.

botmap

Top ten cities by total bot population
1 Istanbul, Turkey

2 Ankara, Turkey

3 Rome, Italy

4 Budapest, Hungary

5 Szeged, Hungary

6 Moscow, Russia

7 Petah Tiqwa, Israel

8 Madrid, Italy

9 Paris, France

10 London, UK

Top ten countries by total bot population

1 Turkey

2 Italy

3 Hungary

4 Germany

5 France

6 Spain

7 United Kingdom

8 Poland

9 Russia

10 Israel

With botnets increasingly leveraged for spam and DDoS attacks, the CERT teams of each of these countries will likely be busy in the following months. Don’t forget to check out Symantec’s interactive EMEA Bots map.

Latest articles

Brinker Named Among “10 Most Promising Defense Tech Startups of 2025”

Brinker, an innovative narrative intelligence platform dedicated to combating disinformation and influence campaigns, has...

Hackers Use DeepSeek and Remote Desktop Apps to Deploy TookPS Malware

A recent investigation by cybersecurity researchers has uncovered a large-scale malware campaign leveraging the...

SmokeLoader Malware Uses Weaponized 7z Archives to Deliver Infostealers

A recent malware campaign has been observed targeting the First Ukrainian International Bank (PUMB),...

New Malware Targets Magic Enthusiasts to Steal Logins

A newly discovered malware, dubbed Trojan.Arcanum, is targeting enthusiasts of tarot, astrology, and other...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

CryptoDNA: AI-Powered Cryptojacking Defense Against DDoS Threats in Healthcare IoT

The integration of Internet of Things (IoT) and Internet of Medical (IoM) devices has...

Record Breaking 5.6 Tbps DDoS attack Launched by Mirai Botnet

 The Mirai botnet unleashed a record-breaking Distributed Denial of Service (DDoS) attack on October...