By building a network of 'zombie' computers, cyber-criminals can use the army of compromised machines to spread junk email, viruses and stage distributed denial of service attacks on businesses, for extortion purposes.
http://www.technewsworld.com/story/V...ers-37293.html