Top 10 Cities | Countries in the World for Total Bot Population

Bot Population ;  As per the data published by Symantec  the most bot-infected cities and countries across the Europe, the Middle East, and Africa (EMEA) region.

The top 10 ranking was compiled using telemetry data gathered during 2015 from Symantec security products and includes details about bot-infected PCs, Macs, smartphones, tablets and connected smart devices.

Based on the number of total bots in one specific city, Istanbul, Turkey was the most infected city, with the largest number of detected bots, followed by another Turkish city, Ankara, the country’s capital.

Taking into account the number of Internet users in each country, and comparing this data with the number of detected bots, we get a “bot density” factor that provides a more accurate reflection of which countries do an appalling job at securing their computers and connected devices.

Top ten cities by total bot population
1 Istanbul, Turkey

2 Ankara, Turkey

3 Rome, Italy

4 Budapest, Hungary

5 Szeged, Hungary

6 Moscow, Russia

7 Petah Tiqwa, Israel

8 Madrid, Italy

9 Paris, France

10 London, UK

Top ten countries by total bot population

1 Turkey

2 Italy

3 Hungary

4 Germany

5 France

6 Spain

7 United Kingdom

8 Poland

9 Russia

10 Israel

With botnets increasingly leveraged for spam and DDoS attacks, the CERT teams of each of these countries will likely be busy in the following months. Don’t forget to check out Symantec’s interactive EMEA Bots map.

Priya James

View Comments

Recent Posts

Google Guide! How to Detect Browser Data Theft Using Windows Event Logs

In the ever-evolving cybersecurity landscape, Google is continually striving to protect user data from malicious actors. In a recent blog…

18 hours ago

Millions of Malicious “Imageless” Docker Hub Repositories Drop Malware

In a startling revelation, nearly 20% of Docker Hub repositories have been identified as conduits for malware and phishing scams,…

19 hours ago

Attackers Leverage Sidecar Container Injection Technique To Stay Stealthy

Kubernetes (K8s) is an open-source container orchestration platform designed to automate application container deployment, scaling, and running.  Containers are isolated…

21 hours ago

How to Utilize Azure Logs to Identify Threats: Insights From Microsoft

Microsoft's Azure platform is a highly acclaimed and widely recognized solution that organizations worldwide are leveraging. It is regarded as…

23 hours ago

Redline Malware Using Lua Bytecode to Challenge the SOC/TI Team to Detect

The first instance of Redline using such a method is in a new variant of Redline Stealer malware that McAfee…

1 day ago

Threat Actor Claims Selling of Dell Database with 49M User Records

A threat actor reportedly sells a database containing 49 million user records from Dell, one of the world's leading technology…

2 days ago