Cyber security news for all

More

    The use of bad bots has increased enormously in recent years

    Bad bot traffic has increased again compared to previous years and now accounts for almost a quarter of all web traffic. Financial service providers are most affected.

    Every Industry Has Its Own Bot Problems

    From account takeover attacks to credential stuffing to content and price scraping. The sectors with the most bad bot traffic include financial service providers, the education and government organizations.

    Moderate to demanding bad bots make up almost three quarters of bad bot traffic. Advanced persistent bots often elude recognition. They go through random IP addresses, penetrate through anonymous proxies, change their identity and imitate human behavior.

    Bad Bots Interact With Applications In The Same Way As A Legitimate User

    This makes them more difficult to identify and prevent. They attack websites, mobile applications and APIs at high speed and enable bot operators, hackers, competitors to carry out a variety of malicious attacks. This includes competitive data mining, collecting personal and financial data, spam and much more.

    Released Tuesday, Imperva’s “2020 Bad Bot Report: The Bad Bots Strike Back” looks at how bad bots play a role in website activity and how website owners can protect themselves against these threats.

    Criminals Are Extremely Creative In Spreading Bad Bots

    Simply accessing a website or clicking on a fake or hijacked advertising banner can trigger a drive by download of malware, which takes place unnoticed in the background. Cybercriminals mainly use security gaps in the web browser, often the vulnerabilities are not known to anyone at the time of the attack. Emails are also a common gateway. For example, a link in a phishing email takes you to a prepared page. A hidden download starts automatically. The bot nests unnoticed in the system of a tablet or smartphone and does the job for which it was programmed. In the worst case, further issues follow. A bot can download a keylogger that uses keystrokes. Other spies specialize in screenshots, which they automatically pick up and transmit for evaluation.

    Recent Articles

    Unclear cyber attacks that target Covid-19 vaccine campaign

    Security researchers have discovered some cyber attacks that are targeted against the delivery of vaccine against COVID. The targeted attacks began in 2 months...

    New malware called Egregor is on the rise

    New malware is on the rise. The Egregor malware has only been in active for 2 months, but it is already becoming apparent that...

    Anyone with a smartphone can become a victim of cyber-mobbing

    Cyber-mobbing is becoming a huge risk in the current COVID crisis. According to a study, almost 20 percent of students in Germany are exposed...

    macOS Trojans: Traces lead to Vietnam

    Security researchers have discovered a new macOS Trojans. Behind this could be a well known hacker group that has spied on Vietnamese dissidents in...

    Court forces Tutanota to perform a surveillance function

    Tutanota email only stores its user mails in encrypted form and cannot read them itself. Tutanota is one of the few email providers that...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox