A device infected with a malicious program for remote management. Users are usually unaware that their device is compromised, allowing cybercriminals to use it as part of a botnet in online campaigns. Networks of zombie devices are used for DDoS attacks, spam mailings, and as proxies for masking illegal activities.