Unlike a typical bot-net, which hijacks PCs with malicious software, that network of unwitting proxies wouldn't leave anything behind on victims' machines, making the attack harder to trace.
FORBES: Magazine Article
应用推荐
模块上移
模块下移
不移动