Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireArenas / Stadiums / Leagues / Entertainment

A summer of cybercrime reveals evolving bot threats

bots surrounding sporting events
August 12, 2021

Fans around the world clamored online, and even in-person, over the past several weeks to enjoy the thrill of competition. From the Tour De France and EURO 2020 tournament in June to the recent Summer Olympic Games in Tokyo, fans were eager to cheer on their nations and make a little money in the process, too.

As fans placed their wagers on individual matches through online betting sites, Imperva Research Labs noticed a suspicious rise in bot activity on both sporting and betting sites, coinciding with these global sporting events. In addition to bot-driven comment spamming and content scraping, Imperva also monitored a rise in account takeover (ATO) attacks — designed to break into accounts and gain access to gamblers’ digital wallets — in the weeks leading up to and during these events.

Tour De France

In June, bot activity on sporting and gambling sites spiked 52% as the race was scheduled to begin. Bot comment spammers were pervasive, with traffic increasing 62%. The spammers took advantage of the interest in the event to post comments in Russian about an array of topics including: adult sites, crypto, coupons/discounts, casino sites and loans and investment opportunities.

EURO 2020

In the weeks leading up to the start of the EURO 2020 tournament in June, Imperva Research Labs monitored a 96% year-on-year increase in bot traffic on global sporting sites. In particular, UK gambling sites were heavily targeted by bot operators in the week before England and Scotland kicked off their respective campaigns. Compared to other days during the tournament, days when the English national team played were particularly high risk, as Account Takeover attacks spiked by 2 or 3 times the daily average. The UK wasn’t the only target: bot traffic on gambling sites in Germany spiked 41% in the week following the country’s defeat of Portugal and leading up to their match with Hungary on June 23. Imperva Research Labs also monitored a pattern of attacks getting larger as the tournament progressed with a notable peak occurring at the start of the Round of 16. 

Tokyo 2020 Summer Olympics

During the first week of the Olympic Games, Imperva Research Labs monitored a significant spike in search engine impersonators. Incoming traffic to sporting sites saw an unusual 48% increase in Yahoo impersonators, 66% increase in Baidu impersonators and 88% increase in Google impersonators. As the Olympics rounded into week two of competition, the volume of browser impersonators grew by 103% above average. Bad bots typically masquerade as legitimate users by reporting their user agent as a web browser or mobile device to avoid being detected. The increase may be related to bots either crawling or scraping sites for real-time information.

More alarming was the large increase in web traffic throughout Japan before and during the first week of the Olympic Games, coming from IPs known to perform account takeover attacks. ATO attacks grew 43% the week prior to the start of the Olympic Games, and spiked 74% during the first week of competition.

The Risk for Fans: Fraud

The rise in Account Takeover activity monitored during the EURO 2020 tournament and Summer Olympics is of particular importance and should be a warning signal for any fan that participates in online betting or gambling.

Account takeover is a form of fraud where a cybercriminal uses a botnet to gain illegal access to accounts belonging to someone else. This is usually achieved using brute force login techniques such as credential stuffing, credential cracking or a dictionary attack. Gambling sites are a lucrative target for account takeover attacks because user profiles often have financial information or even funds stored.

A successful account takeover can result in financial fraud, theft of personal data or sensitive business information. On average, websites face an account takeover attack 16% of the time, according to the Imperva Bad Bot Report 2021. Further, Imperva Research Labs finds that a third of all login attempts in 2020 were malicious.

A Growing Bot Problem

The spikes in bot activity seen during some of the world’s largest sporting events in 2021 is evidence of an evolving security threat that continues to pervade daily life. Last year, 33.7% of web traffic to sporting sites was made up of bad bots and 27.7% of all web traffic on gaming and gambling sites was associated with advanced persistent bots (APBs) — traffic that closely mimics human behavior and is harder to detect and stop.

However, this isn’t just a problem for sports and gambling sites. Bots are disrupting industries around the globe, and the bot activity Imperva Research Labs monitored around these sporting events mirrors the disruptions bots are causing in e-commerce and healthcare -- revealed earlier this year in the Imperva Bad Bot Report 2021.

With the UK Premier League and other elite football leagues in Europe set to begin playing matches, and the Beijing 2022 Winter Olympics and World Cup in Qatar on the horizon, the threat of bad bots targeting fans during these global sporting events is likely to grow. 

Putting a Stop to Bots

The bad bot problem is increasingly complex as automated web activity accounted for more than a quarter of all web traffic in 2020. This trend is likely to grow as fans spend more time online searching for scores, placing bets and engaging in sport community forums. To mitigate automated threats across web, mobile and APIs, companies must take proactive steps to keep their users’ data secure:

  1. Block or CAPTCHA outdated user agents/browsers: The default configurations for many tools and scripts contain user-agent string lists that are largely outdated. This won’t stop more advanced attackers, but it might catch and discourage some. The risk in blocking outdated user agents/browsers is very low; most modern browsers force auto-updates on users, making it more difficult to surf the internet using an outdated version.
  2. Block known hosting providers and proxy services: Even if the most advanced attackers move to other, more difficult-to-block networks, many less sophisticated perpetrators use easily accessible hosting and proxy services like Digital Ocean, Gigenet, OVH Hosting and Choopa. Disallowing access from these sources can discourage attackers.
  3. Monitor for failed login attempts: Define a failed login attempt baseline, then monitor for anomalies or spikes -- indicators of an attack takeover attempt. Set up alerts so the security team can be automatically notified if any anomalies occur. Advanced “low and slow” attacks don’t trigger user or session-level alerts, so be sure to set global thresholds.
  4. Evaluate a bot protection solution: Bots are increasingly sophisticated and can even mimic human behavior, making it harder to detect and stop the autonomous activity. Only a bot management solution that is integrated within web application and API protection (WAAP) can deliver holistic protection for an organization's website and digital assets. This approach offers protection from the OWASP automated threats that happen around-the-clock without disrupting or impacting legitimate users.
KEYWORDS: cyber security cyber security investigation cybercrime cybersecurity and business

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Many thumbs up emojis with one thumb down

    Leveraging device intelligence to outsmart evolving bot threats

    See More
  • hacker-in-hoodie.jpg

    New data reveals the states at highest risk of cybercrime

    See More
  • Cybersecurity Leadership Images

    45% of Consumers Have Been a Victim of Cybercrime

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security book.jpg

    Security Investigations: A Professional’s Guide

See More Products

Events

View AllSubmit An Event
  • December 11, 2025

    Responding to Evolving Threats in Retail Environments

    Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing