Bad bots account for almost 40% of internet traffic

These bots include bad basic web scrapers, attack scripts, and advanced persistent bots, according to Barracuda

Almost 40% of all traffic on the internet is “bad bot” activity, according to the latest industry data. 

Automated bots, including those from search engines and social media networks, make up 64% of all internet traffic, the Barracuda Networks report found. 

“The Bot attacks: Top Threats and Trends” report found that only a quarter of this was “good bot” activity. Nearly two-fifths (39%) were from “bad bots.” The report said these bad bots included basic web scrapers, attack scripts, and advanced persistent bots. 

“These advanced bots try their best to evade standard defenses and attempt to perform their malicious activities under the radar. In our dataset, the most common of these persistent bots were ones that went after e-commerce applications and login portals,” the report said.

North America had the dubious distinction of accounting for the largest portion of bad bot traffic, and most of it originates from data centers, according to the report. North America accounted for 67% of bad bot traffic, followed by Europe and then Asia. The report said European bot traffic is more likely to come in from hosting services (VPS) or residential IPs than the North American traffic.  

While the bots were automated, bad bots were designed to function during working hours, the report found. 

Related Resource

The state of ransomware in retail 2021

Insights into the current state of ransomware in the retail sector

Whitepaper front coverFree download

“The attackers running these bad bots prefer to hide within the normal human traffic stream to avoid raising alarm bells. The common stereotype of a ‘hacker’ performing their attacks late into the night in a dark room with green fonts on a black screen has been replaced by people who set up their bots to carry out the automated attacks while they go about their day,” the report said.

Barracuda Networks gave some examples of bad bot activity, including pretending to be a known vulnerability scanner. This bot attempted to perform reconnaissance and probe for vulnerabilities using some basic attacks. As such, the bot was using a standard browser user agent but had additional custom HTTP headers that spoofed the headers of a scanner the victim organization used. 

"While some bots like search engine crawlers are good, our research shows that over 60% of bots are dedicated to carrying out malicious activities at scale," said Nitzan Miron, VP of Product Management, Application Security, Barracuda. 

"When left unchecked, these bad bots can steal data, affect site performance, and even lead to a breach. That's why it's critically important to detect and effectively block bot traffic."

Featured Resources

The challenge of securing the remote working employee

The IT Pro Guide to Sase and successful digital transformation

Free Download

VMware Cloud workload migration tools

Cloud migration types, phases, and strategies

Free download

Practices for maximising the business value of digital infrastructure Consumption-as- a-Service subscriptions

IDC PeerScape

Free Download

Container network security guide for dummies

Enforcing Kubernetes best practices

Free download

Recommended

Equinix to help DISH build out its 5G network
5G

Equinix to help DISH build out its 5G network

18 Nov 2021
What are cookies
Security

What are cookies

17 Nov 2021
Firefox available on Microsoft Store for first time
web browser

Firefox available on Microsoft Store for first time

9 Nov 2021
Boeing gets green light for satellite internet
Network & Internet

Boeing gets green light for satellite internet

4 Nov 2021

Most Popular

How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

4 Jan 2022
Microsoft Exchange servers break thanks to 'Y2K22' bug
email delivery

Microsoft Exchange servers break thanks to 'Y2K22' bug

4 Jan 2022
Solving cyber security's diversity problem
Careers & training

Solving cyber security's diversity problem

5 Jan 2022