Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:30 AM
Rami Essaid
Rami Essaid
Connect Directly
E-Mail vvv

The Bot Threat For the Rest of Us: Application-Layer Attacks

Bots are getting craftier by the day so you may not even know you have a problem.

DDoS, as we all know, garners unprecedented media attention. And the volume of coverage is a direct correlation to the size of the attack -- the larger, the better. But DDoS attacks are only one manifestation of sophisticated bot attacks that can scrape information, fraudulently fill out forms, and otherwise erode the overall website experience. What is often overlooked by the media are the application-layer bot attacks affecting almost every website on a daily basis.

These bots are capable of competitive data mining, account hijacking, and so much more. They degrade site availability, user experience, and steal competitive information. They often work under the surface, degrading a company’s brand trust, completely undetected.

Let’s face it, more than 99% of business websites are not the target of high profile, massive DDoS attacks. DDoS may receive the sexy headlines but there are more serious threats lurking under the surface. Here are three that businesses face daily.

Bad bots that secretly scan and sniff your data
The real and far more likely bot threat against your business website comes from low-profile, often overlooked bots that secretly scan and test for ways to steal business data, content and intellectual property, or penetrate your defenses. These common attack types don’t come with sexy names and eye-popping figures around Gbps and the number of infected machines. Instead, they are dull and thorough, sniffing all around your website, its forms, content, data, and applications to take whatever value your business will yield. Bot attacks such as these are termed "application-layer" attacks, and they look for vulnerabilities in your web-facing applications. Once they find a way in, they wreak havoc.

Application-layer attacks come in many forms. The most common that we have seen from our database of 30 billion known violators perform price scraping, form fraud, content theft, and database intrusion/account hacking.

Bad bots masquerading as good bots
Bots are getting craftier by the day so you may not know you have a problem. Bots targeting the application layer often mask themselves as normal site users or good bots (e.g., Google and Bing crawlers), sneaking around and grabbing what they can, from passwords and content, to application and Web server vulnerabilities. Once inside your application layer, they may remain stealth and make off with valuable business data. They may even invite in huge volumes of bots for an amplified attack (i.e. stealing millions of users’ account data).

A footnote, not a headline
Sadly, the media doesn’t pay much attention to bots. That is, until someone uses bots to amplify a website breach to produce impressive fraud or theft statistics. But even then, bots often get regulated to a footnote in the story, if at all. Both Edward Snowden and Bradley Manning used bots to perpetuate the two largest data breaches in US history. Why wasn't that ever the story?

Last year’s under-reported attack on domain name registrar Namecheap.com offers another example. In August 2014, Russian hackers assembled a list of 1.2 billion stolen usernames and passwords. Using this list, attackers leveraged bots to penetrate about 30,000 user accounts by emulating the login process of legitimate users. Namecheap.com acted by aggressively blocking IP addresses.

This media’s lack of focus on bots, paired with Namecheap’s reactive approach, resulted in a failed protection of website and customer data. Perhaps if bots made it into the headlines, or at least the stories of these breaches, then more companies would be more aware of the need to bolster their bot defenses.

How to Defend Yourself
There are several purpose-built solutions to help companies prevent bot attacks, but if you want to tackle the problem yourself, here are some steps you can take to bolster your website’s defenses.

  • Rate limit. Make sure you don’t do this based on an IP, but rather unique sessions to avoid blocking users behind a NAT. This will force bot makers to distribute their attacks across multiple machines, changing the economics of their attack.
  • Force users to execute JavaScript to access a page. There are several ways to do this, which makes it significantly harder to run simple bots, though you are still vulnerable to more advanced bot attacks. There are also lots of scripting tools (Ruby, Selenium, etc) that allow you to scrape using a real web browser, but those are more computationally expensive and a little harder to program and scale.
  • Set up strict firewall rules. Use IP blacklists, block proxy servers, TOR, Amazon EC2, etc. This will limit your exposure, but it’s important to be aware that the bad guys are still going to be more dynamic than you will be using these methods.
  • Consider adding two-factor authentication or a CAPTCHA to your username and password screen. This reduces the likelihood of brute-force login attempts. 

While none of these methods are foolproof, it is good security hygiene to be as prepared as possible. After all, just because a burglar can still break down your door, doesn’t mean you shouldn’t bother locking it.

Rami is the Co-founder and CEO of Distil Networks, the global leader in bot detection and mitigation. He began his career as the founder and CEO of Chit Chat Communications. After a successful exit, he consulted in mobile development. With over 11 years in communications, ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...