• About
  • Subscribe
  • Contact
Wednesday, May 7, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

Managing the rising risks of bad bots

Allan Tan by Allan Tan
June 28, 2022
Managing the rising risks of bad bots

Managing the rising risks of bad bots

The IEEE defines a robot as an autonomous machine capable of sensing its environment, carrying out computations to make decisions, and performing actions in the real world.

An internet bot is a software application that performs automated tasks by running scripts over the internet.

The 2021 Barracuda report, Bot Attacks: Top Threats and Trends, acknowledged that there are good bots and bad ones: “While some bots, such as search engine crawlers, are good, bad bots are built to carry out malicious attacks at scale.”

Source: 2022 Imperva Bad Bot Report

The 2022 Imperva Bad Bot Report goes on to explain that bad bots mask themselves and attempt to interact with applications in the same way a legitimate user would, making them harder to detect and block. “Bots enable high-speed abuse, misuse, and attacks on your websites, mobile apps, and APIs. They allow bot operators, attackers, unsavoury competitors, and fraudsters to perform a wide array of malicious activities,” added the report.

Reinhart Hansen, director of technology with the office of the CTO at Imperva, says the intent of the bot determines whether it is a good bot or a bad one. “An example of a bad bot would be something like a content scraping bot, which scrapes product content and pricing information of your website for competitive intelligence and so they can undercut you,” he continued.

Attack of the bad bots

To avoid detection, Jamie Boote, software security consultant at Synopsys Software Integrity Group, says bots must continually evolve. He goes on to explain that their executables are constantly being changed and recompiled to evade anti-virus detection.

“Their methods have also had to evolve to evade DDOS detection with low-volume attacks replacing the virtual flood of packets that internet service providers and content distributors can easily detect and mitigate,” he continued.

Jamie Boote

“When it comes to questions of “better” or “worse”, it doesn’t get much direr than having a piece of malware on your system that obeys an attacker command and not yours.”

Jamie Boote

Hansen observed that the pandemic saw a big rush for many to improve their online presence so that they can stay in business. This has led to many applications being developed, much more APIs being used, and exposure to a lot of new data on the internet.

“Bad bots are used to harvest this newly exposed data for identity theft or fraudulent activities, so we have been seeing a steady increase in bad bot traffic,” he continued.

For his part, Boote added that the pandemic also coincided with a few other trends that contributed to the rise of botnets. As smart devices such as watches, thermostats, plugs, doorbells, cars, tractors, and everything else that can connect to the internet was connected to the internet via 5G, botnets found new victims to host their malware.

“Botnets increasing in size by taking advantage of new victim devices in new places combined with increased reliance on remote-work and internet-driven retail services saw increased impact from botnet attacks during the pandemic,” he added.

Mitigating the risks of bad bots

Because bots are, by design, meant to run unsupervised, in the background performing a specific task, this has made it very challenging to detect them.

Reinart added that the difficulty of detection lies in the fact that bots do their best to mimic human behaviour to avoid detection.

Reinhart Hansen

“They are also typically distributed in nature, constantly changing the source of their IP address. Some bot operators run emulated bots in a farm, pretending to be thousands of legitimate mobile apps and devices.”

Reinhart Hansen

“Such techniques can be countered by embedding specific technology within an app to detect whether it's being run in a mobile emulation environment instead of on a legitimate device,” he added.

Source: 2022 Imperva Bad Bot Report
Sandy Carielli

The Forrester report, The Forrester Wave: Bot Management, Q2 2022, Sandy Carielli, said protecting against a range of attacks; protecting web applications, mobile apps, and APIs; and leveraging machine learning have all become table stakes.

“Modern bot management tools must keep up with ever-evolving attacks, offer a range of out-of-the-box and customizable reports, and enable human end customers to transact business with little friction or frustration,” she continued.

Boote noted that botnet defence requires cooperation and vigilance. When the number of compromised devices numbers in the hundreds of thousands or millions, solving this problem goes beyond a single user or business. On one side, devices owned by users and businesses need to be patched and monitored to prevent the takeover by botnet software.

“They should rely on up-to-date malware signatures to keep their devices and networks clean and practice good digital hygiene when possible. The victims of botnet attacks must work closely with their ISPs and content distribution network providers to blunt the worst of the attacks,” he added.

Hansen believes that at the end of the day, to protect their customers' experience and data, online businesses should have proper bot detection and mitigation measures in place.

Managing the bot wars

Should bots be the responsibility of the CISO or the CIO?

For Hansen, this responsibility is typically split between two stakeholders – the security team that’s responsible for application security, and the digital team that represents the digital presence of the organisation.

“The latter team looks at the issue from a financial perspective – for instance, what sort of impact the bots have on their ability to transact cleanly with their customers, and what sort of potential revenue loss they could experience if the bots are not dealt with appropriately,” he added.

Boote opined that with a problem as big as botnets, ultimately the COO, CIO, or CISO would oversee all the departments that can be affected by and contribute to botnets and counter-bot responses.

“Their IT department will keep servers and employee devices clean from any botnet malware. Their Operations and Infrastructure teams will be responsible for coordinating network defences against botnet attacks. Their application development teams will need to build software that resists credential stuffing and site scraping,” he concluded.

Related:  Lack of information can delay tech purchases in public sector
Tags: bad botsBarracuda NetworksBotsForresterIEEEImpervaSynopsys Software Integrity Group
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR
  • Dataiku brings new AI capabilities to create and control AI agents
  • Microsoft reveals the rise of a new kind of organisation in the AI era
  • St Luke’s ElderCare enhances data security and user experience with Juniper

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe