Risk

11/14/2018
02:30 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Airlines Have a Big Problem with Bad Bots

Bad bots account for 43.9% of all traffic on their websites, APIs, and mobile apps, according to a new analysis of 100 airlines.

(Image: profit_image, via stock.adobe.com)
(Image: profit_image, via stock.adobe.com)

As airlines are ramping up in preparation of the holiday travel season, bad bots are ramping up their activity on airlines' websites, mobile apps, and APIs. Analysts in the research arm of Distil Networks today published a study called "How Bots Affect Airlines," in which they analyzed 7.4 billion requests from 180 domains on 100 international airlines. They found malicious bots make up 43.9% of all airline web traffic — about double the 21.8% average for all industries. The highest bad bot percentage for one airline? About 94.6%.

In almost 30% of the domains that analysts studied, bad bots made up more than half of all traffic. Most bots (84.3%) on airline domains are moderate or advanced, and harder to detect. The highest proportion of bad bot traffic stems from the US (25.6%), followed by Singapore (15%).

At the core of the problem are airline websites and mobile apps, which serve as the home for flight data presented to customers: seat availability, pricing, booking processes, discounts. Some airlines use their own booking engines; others use third-party services for booking.

Online travel agencies (OTAs) like Expedia and Booking.com are channels designed to sell flights and process payment on behalf of airlines. Under commercial agreements, OTAs can scrape flight data in exchange for fees. Travel aggregators like Kayak and Skyscanner also display flight information but redirect shoppers to airlines' websites to finalize their booking.

Four attack groups deploy bots against airlines: unauthorized OTAs and travel aggregators avoid fees and scrape flight information and fares, then hold seats to resell them later (a process known as "seat spinning"). Competitor airlines also scrape flight data and fares to gain market intelligence and hold seats to block legitimate purchases. Criminals target loyalty programs with account takeover to steal points, and conduct credit card and loyalty program fraud.

Keeping Up with Competition
Airlines are hot targets because the value of the goods they sell has a finite timeline, says Edward Roberts, director of product marketing at Distil Networks. There's only a certain period of time a flight ticket will be valid, and price changes frequently based on destination and departure. Further, an ecosystem of OTAs and aggregators is constantly collecting data.

"The more competitive the market, the more competitive routes you fly, the more bots are competitive," he explains. Every airline has some combination of authorized and unauthorized data scraping on their sites. Bad bots can result in higher fees for third-party booking engines because they make it appear as though far more people are viewing than booking flights.

It's called a "look-to-book" ratio. Every time someone looks at a flight listing and asks "how much," that's considered a look, Roberts says. There should be one flight booked for every 100 looks, a number all airlines measure their progress against. "If that ratio suddenly spikes, you know that's bot behavior," he continues. "That's not human behavior."

The business implications of bad bots are significant, says Roberts. "Information from airlines states the financial cost and burden of this is getting to that point where they're saying 'we actively need to solve this problem because the cost to business is getting too large,'" he adds.

Loyalty rewards programs are hard hit by cybercriminals looking to monetize account access. If they can brute-force credentials and break in, they can steal and monetize points and miles.

"Anecdotally, airlines have a lot of seven-digit fraud coming through loyalty programs that they're concerned about," Roberts points out. Larger airlines typically have more value in their online loyalty program accounts, so those typically see larger amounts of account takeover attacks.

Attackers targeting the airline industry are becoming more advanced over time. Researchers note only 19.7% of airline bots were sophisticated in 2017; this year, the percentage jumped to 31.4%. At the same time, the percentage of simple bots decreased from 27.4% to 15.7%.

"Airlines are trying to deal with the problem, and they're trying to put mitigation in place so they can prevent the volume of bots from attacking them," says Roberts. "The bot operators are reacting." Some are trying to appear more human by moving their mouse, delaying between clicks, making themselves evasive to try and avoid detection.

Overall, he says, researchers didn't notice trends specific to airline size or location. "It's really unique to that airline — whether it's a flight route they have or the nature of how they created their websites," he explains.

The past few months have been rough on airline cybersecurity. Last month, Hong Kong-based Cathay Airlines suffered the largest breach of any carrier to date when attackers compromised information belonging to 9.4 million passengers. A cyberattack on British Airways exposed the data of 380,000 customers; shortly after, the airline found 185,000 additional victims were hit.

Related Content:

 

Black Hat Europe returns to London Dec. 3-6, 2018, with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How the US Chooses Which Zero-Day Vulnerabilities to Stockpile
Ricardo Arroyo, Senior Technical Product Manager, Watchguard Technologies,  1/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3906
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 contains hardcoded credentials in the WCF service on port 9003. An authenticated remote attacker can use these credentials to access the badge system database and modify its contents.
CVE-2019-3907
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores user credentials and other sensitive information with a known weak encryption method (MD5 hash of a salt and password).
CVE-2019-3908
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores backup files as encrypted zip files. The password to the zip is hard-coded and unchangeable. An attacker with access to these backups can decrypt them and obtain sensitive data.
CVE-2019-3909
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 database uses default credentials. Users are unable to change the credentials without vendor intervention.
CVE-2019-3910
PUBLISHED: 2019-01-18
Crestron AM-100 before firmware version 1.6.0.2 contains an authentication bypass in the web interface's return.cgi script. Unauthenticated remote users can use the bypass to access some administrator functionality such as configuring update sources and rebooting the device.