Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

How to shut down bad bots once and for all

By Sam Crowther
bots
January 27, 2021

The 2020 holiday season’s hottest gifts were the Sony Playstation 5 (PS5) and Microsoft’s Xbox Series X. Thanks to scalper bots, most people weren’t able to get them in time for the holidays, and despite many efforts, some still don’t have their hands on these popular consoles.

Just because Christmas is over, it doesn’t mean that scalper bots are going away anytime soon. We are seeing an upward trend of retailers launching VIP products with limited quantities year-round – including sneakers, winter coats, and other in-demand merchandise – which means that the bot problem will continue to get a lot worse. Bot operators are also well compensated for their efforts, with a low cost of doing business and a high return. It’s even becoming more popular for them to be paid commissions through a profit-sharing model.

With most major online retailers using bot mitigation solutions for many years now, why are we still talking about scalper bots? And what can be done to shut down bad bots once and for all? The short answer is: a fundamentally new approach is needed.

Most bot mitigation solutions rely on rules and risk scores, which use information from the past, even when paired with advanced machine learning or AI capabilities. Since bot operators are continually inventing new ways to evade detection, using historical data fails to detect and stop bots never seen before. As a result, retailers and e-commerce companies can’t keep up with the evolving nature of bot operators’ techniques, tools, and tactics. This is evidenced by the record volume of “Grinch” bots that we saw over the holidays.

 

It’s time to approach the bot problem differently

Bot creators and operators work tirelessly to ensure that their technology gets around enterprise defenses. What if we looked for the presence of automation itself, rather than designing a solution to rely on rules, behaviors, heuristics, or intent? That way, we can detect bots never seen before, and therefore, we can protect applications and APIs from what adversaries may do tomorrow or in a years’ time.

To further future-proof bot defense, modern solutions must also:

  • Apply a zero-trust philosophy to assume that all requests are guilty until proven innocent, ensuring bad bots are never let in prior to determining their intentions;
  • Target the economics of running bots by fighting back, making it more expensive to conduct attacks using a CPU-taxing cryptographic challenge;
  • Leverage better obfuscation techniques to frustrate bot operators when attempting to reverse engineer

Many bot mitigation vendors are hyper-focused on specific manifestations or behaviors of bots, which can be useful in the short-term; however, it doesn’t benefit their customers in the long-term. If an organization faces a new or different type of bot attack that no other company faces, the behavioral or intent-based technology may not pick it up fast enough. However, if the architecture looks for automation as the common denominator - such as use of a headless browser and automated DevTools - the bot mitigation solution will accurately identify that a bot is carrying out the attack.

 

Zero-trust philosophy

A zero-trust philosophy also prevents bots never seen before by not automatically trusting any connecting clients. This allows you to detect zero-day bots from the first request without giving attackers a window of opportunity to be successful. Not trusting any traffic also means that you don’t need to re-learn what’s good and what’s bad, which is extremely maintenance-intensive. As a result, the bots’ behavior becomes irrelevant.

 

Collapse the economics

Due to the low barrier to entry and low cost of obtaining sophisticated bots, inventory hoarding can be extremely lucrative. If you can target the economics of bots requesting info from your applications and APIs by taxing them, then you can significantly disincentivize them from continuing their operations. This is a sustainable long-term solution because you’ve made the attack unviable to conduct, and adversaries will move on elsewhere to other online businesses where it is easier to gain a profit.

 

Deter reverse engineering

Finally, your solution quickly falls down if bot operators can reverse engineer your bot mitigation technology. This is an area many people take for granted, but the reality is that knowledgeable adversaries can quickly work around some of the “leading” and expensive bot mitigation services that use open-source obfuscation tools and can be bypassed in a matter of minutes. The battlefield can be changed by using custom, dynamic obfuscation – that also shifts the skillset required from JavaScript to bytecode – making it many degrees more difficult for bot operators to retool against your defenses.

A bot mitigation solution that enables you to adapt as quickly as bot operators is absolutely key to short-term success and long-term success against scalper bots and other malicious bots. Implementing all these little things simultaneously is the only way to stop bad bots for good. It doesn’t matter how high your walls are. If there’s a brick out of place, there’s a way for them to get in. Cheers to helping retailers approach the bot management problem differently before Grinch bots ruin holiday wish lists.

KEYWORDS: bots cyber security information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sam crowther headshot

Sam Crowther is CEO and founder of Kasada, an innovative web traffic integrity company that accurately detects and defends against bot attacks across web, mobile and API channels. He is passionate about creating simple technical solutions to complex problems and is motivated by challenging preconceived ideas and beliefs in order to have a positive impact on the world. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • privacy-security-freepik5872.jpg

    An unfortunate side effect: How privacy trends are weakening website security

    See More
  • Locked data

    Being proactive creates a future-proof security strategy

    See More
  • Technology in the talent gap

    How security leaders can close the tech talent gap — once and for all

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing