In 2022, 47.4% of all internet traffic came from bots, a 5.1% increase over the previous year, according to Imperva. The proportion of human traffic (52.6%) decreased to its lowest level in eight years.
Bad bot traffic
For the fourth consecutive year, the volume of bad bot traffic — malicious automated software applications capable of high-speed abuse, misuse, and attacks — grew to 30.2%, a 2.5% increase over 2021.
The staggering level of bad bot activity across the internet in 2022 was the highest since the Imperva Bad Bot Report was created in 2013.
Malicious bot activity is a significant risk for businesses as it can result in account compromise, data theft, spam, higher infrastructure and support costs, customer churn, and degraded online services.
Collectively, billions (USD) are lost annually as a result of automated attacks on organizations’ websites, infrastructure, APIs, and applications.
Bot evolution and the rise of automated attacks
For the past decade, the annual Imperva report has provided security and business leaders with useful and practical information about the evolution of bot technology and automated traffic. Imperva documented these annual trends for the purpose of raising awareness about the business risk associated with bad bot activity.
Milestones in the evolution of bad bot technology:
- The EarthLink Spammer, one of the world’s first botnets, was discovered in 2000. It was created by a single individual and sent over a million emails as part of a phishing scam.
- In 2014, Imperva monitored one of the first examples of bots exploiting mobile browser settings to more easily scrape data. This was an earlier indicator that bot operators were adapting for mobile web and application environments.
- In 2015, the sophistication of bad bots soared 11%. Bot operators used a single bot to cycle through many IP addresses to make a single request while disguising their identity.
- In 2016, bad bots quickly adapted as mobile device usage grew. For the first time, mobile Safari was one of the leading self-reported user agents, while the volume of bots claiming to be mobile browsers increased 42.78%.
- In 2020 and 2021, bad bots became the pandemic of the internet as automation became more sophisticated. Through inventory hoarding and scraping, bots made it harder for humans to purchase gaming consoles or schedule COVID-19 vaccine appointments.
“Bots have evolved rapidly since 2013, but with the advent of generative artificial intelligence, the technology will evolve at an even greater, more concerning pace over the next 10 years,” says Karl Triebes, SVP and GM, Application Security, Imperva.
“Cybercriminals will increase their focus on attacking API endpoints and application business logic with sophisticated automation. As a result, the business disruption and financial impact associated with bad bots will become even more significant in the coming years,” Triebes continued.
Bad bots are increasingly sophisticated and harder to detect
In 2022, the proportion of bad bots classified as “advanced” accounted for 51.2% of all bad bot traffic. In comparison, the level of bad bot sophistication in 2021 was 25.9%. This is a concerning trend for businesses as advanced bad bots use the latest evasion techniques and closely mimic human behavior to evade detection by cycling through random IPs, entering through anonymous proxies, and changing identities.
Account takeover (ATO) attacks increased 155% in 2022
Further, 15% of all login attempts in the past 12 months, across all industries, were classified as account takeover. Cybercriminals use bad bots to facilitate credential stuffing and brute force attacks, as automation can cycle through credentials quickly until successful.
These attacks have the potential to lock customers out of their account, provide fraudsters with sensitive information, contribute to business’ revenue loss, and increase the risk of non-compliance.
Bad bots target APIs to abuse business logic and compromise accounts
In 2022, 17% of all attacks on APIs came from bad bots abusing business logic. A business logic attack exploits flaws in the design and implementation of an API or application for the intent of manipulating legitimate functionality to steal sensitive data or illegally gain access to accounts.
Further, 35% of account takeover attacks in 2022 specifically targeted an API. When APIs are called programmatically, attackers can easily automate the process of attempting to takeover an account without triggering any alarms.
Travel (24.7%), retail (21%), and financial services (12.7%) continue to experience the highest volume of bot attacks
Meanwhile, Healthcare and Law & Government experienced a considerable jump in the volume of bad bot attacks in 2022. Gaming (58.7%) and telecommunications (47.7%) had the highest proportion of bad bot traffic on their websites and applications. Taken together, bots are a growing problem for all industries.
Majority of countries have a bad bot problem
Of the 13 countries analyzed in the report, 7 had bad bot traffic levels that exceeded the global average of 30.2%. Germany (68.6%), Ireland (45.1%), and Singapore (43.1%) ranked in the top three, while the US also exceeded the average at 32.1%.
Browser settings disguise bad bot behavior
One-in-five bad bots used Mobile Safari as their browser of choice in 2022, up from 16.1% in 2021. Updated browsers offer privacy settings that obfuscate bad bot behavior, making it harder for organizations to detect and stop automated traffic.
“Every organization, regardless of size or industry, should be concerned about the rising volume of bad bots across the internet,” continued Triebes.
“Year-over-year, the proportion of bot traffic is growing and the disruptions caused by malicious automation results in tangible business risks – from brand reputation issues to reduced online sales and security risks for web applications, mobile apps, and APIs. Businesses need to act now and invest in bot management and online prevention that can identify and stop sophisticated automation that targets APIs and application business logic,” Triebes concluded.
from Help Net Security https://ift.tt/Jr78OYS
0 comments:
Post a Comment