Tuesday, March 11, 2025
HomeDDOSTop 10 Cities | Countries in the World for Total Bot Population

Top 10 Cities | Countries in the World for Total Bot Population

Published on

SIEM as a Service

Follow Us on Google News

Bot Population ;  As per the data published by Symantec  the most bot-infected cities and countries across the Europe, the Middle East, and Africa (EMEA) region.

The top 10 ranking was compiled using telemetry data gathered during 2015 from Symantec security products and includes details about bot-infected PCs, Macs, smartphones, tablets and connected smart devices.

Based on the number of total bots in one specific city, Istanbul, Turkey was the most infected city, with the largest number of detected bots, followed by another Turkish city, Ankara, the country’s capital.

Taking into account the number of Internet users in each country, and comparing this data with the number of detected bots, we get a “bot density” factor that provides a more accurate reflection of which countries do an appalling job at securing their computers and connected devices.

botmap

Top ten cities by total bot population
1 Istanbul, Turkey

2 Ankara, Turkey

3 Rome, Italy

4 Budapest, Hungary

5 Szeged, Hungary

6 Moscow, Russia

7 Petah Tiqwa, Israel

8 Madrid, Italy

9 Paris, France

10 London, UK

Top ten countries by total bot population

1 Turkey

2 Italy

3 Hungary

4 Germany

5 France

6 Spain

7 United Kingdom

8 Poland

9 Russia

10 Israel

With botnets increasingly leveraged for spam and DDoS attacks, the CERT teams of each of these countries will likely be busy in the following months. Don’t forget to check out Symantec’s interactive EMEA Bots map.

Latest articles

“Eleven11bot” Botnet Compromises 30,000 Webcams in Massive Attack

Cybersecurity experts have uncovered a massive Distributed Denial-of-Service (DDoS) botnet known as "Eleven11bot."This new...

SideWinder APT Deploys New Tools in Attacks on Military & Government Entities

The SideWinder Advanced Persistent Threat (APT) group has been observed intensifying its activities, particularly...

Apache Pinot Vulnerability Allows Attackers to Bypass Authentication

A significant security vulnerability affecting Apache Pinot, an open-source distributed data store designed for...

Lazarus Hackers Exploit 6 NPM Packages to Steal Login Credentials

North Korea's Lazarus Group has launched a new wave of attacks targeting the npm...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

CryptoDNA: AI-Powered Cryptojacking Defense Against DDoS Threats in Healthcare IoT

The integration of Internet of Things (IoT) and Internet of Medical (IoM) devices has...

Record Breaking 5.6 Tbps DDoS attack Launched by Mirai Botnet

 The Mirai botnet unleashed a record-breaking Distributed Denial of Service (DDoS) attack on October...