Website Hackers Slip Under The Radar With Impersonator Bots


Image Credits: ValentinT (opens in a new window) / Shutterstock (opens in a new window)

Ofer Gayer


Editor’s note: Ofer Gayer is a security researcher at Incapsula.

It was late December when we were contacted by a financial service provider who began noticing a spike in online registration requests. Rather than resulting from end-of-the-year sales efforts, this spike was caused by a targeted spam attack that flooded the organization with fake registration forms, most of which looked reputable enough not be discarded on sight.

The reason for concern was that this company, for internal reasons, needed to perform a manual background check of each new registration form before it was passed over to the sales department. So when the small background check team began to collapse under the deluge of seemingly legitimate online forms, all online sales operations were brought to a halt. After a quick examination of the company’s website traffic, it quickly became clear that what the customer was actually experiencing was malicious bot activity.

In this case, the bot operator knew enough about the organization to identify the manual background check process as a “soft spot,” which could be used to monkey-wrench the company’s entire sales funnel.

To exploit that weak spot, the perpetrator hand-crafted a spam bot whose sole purpose was to attack that one specific registration form with details that wouldn’t fit any easily identifiable pattern. Most concerning, these bots were disguising themselves as regular human users, with browser-like HTTP fingerprints and several capabilities that enabled them to circumvent the website’s challenge-based, access-control mechanism.

This is not the first time we’ve come across such sophisticated bots that are purpose-built to mimic human behavior and operate under the cover of a browser-like identity. Collectively, we like to refer to them as “impersonator bots.” Created for stealth and preferred for their ability to bypass commonplace security measures, such automated tools are used by hackers not only for spam attacks, but also to steal data, hijack servers and execute DDoS attacks, among other nefarious activities.

Who are these Impersonator bots?

Many types of bad bots roam the Internet, from scrapers and spammers to the more sophisticated vulnerability scanners and DDoS bots. If other bad bots can be compared to well-trained soldiers carrying out the orders of their commander, impersonator bots are the Special Ops unit. These “commandos” carry out the same malicious activities, but they do so covertly and typically use much more advanced attack techniques.

Often, they’re based on existing malware tools, modified to create a browser-like HTTP fingerprint. This lets them bypass security challenges that would stop a lesser/generic version. Impersonator bots cause significant damage to companies’ websites and web applications, resulting in downtime, financial losses and reputation damage. 

Between 2013 and 2014, we saw overall bot traffic volumes decrease from 61.5 to 56 percent of all web visits — a reversal of the upward trend observed the prior two years. Still, despite the dip in total bot traffic, the number of impersonator bots continues to grow.

In fact, over the past three years, impersonators are the only bad bot type to display consistent growth, which does not bode well for most website owners.

Cybersecurity is often described as an arms race, and for a good reason. Hackers and white hats are continually trying to stay one step ahead of each other. When one side finds a better method of defense, the other side usually develops a smarter type of offense. Impersonator bots are a byproduct of this escalation – they are the hacker’s response to an increased use of anti-bot solutions by website owners. 

Impersonator bots are the go-to tool for hackers 

One way impersonator bots are used is for vulnerability scanning and automated hacking attempts. Such “hacker bots” are proprietary tools and scripts are used to systematically scan sites for vulnerabilities and exploit them at will and in bulk. As soon as a vulnerability is published, the scavenger hunt for an un-patched system is on.

We saw an excellent example of this dynamic following the discovery of the Shellshock mega-vulnerability in September 2014.

Soon after Shellshock’s discovery and the release of a patch, we saw an explosion in scanner traffic. Some of these were legitimate scanning attempts by concerned Internet citizens. However, more than 90 percent of the bots were malicious scanners and other malicious automated tools (e.g. DDoS malware) probing for the Shellshock vulnerability.

For hackers, launching such vulnerability-scanning campaigns is just “another day in the office.” We’ve seen this same dynamic following other major vulnerabilities in 2014, such as Heartbleed, and vulnerabilities in popular WordPress plug-ins like Slider Revolution and FancyBox.

This genre of impersonator bots also covers DDoS bots coming from anonymous proxies, which are simply another way for attackers to mask their true identities. This is the same MO used by impersonator bots. In fact, over the past few months, we’ve seen a significant increase in bots using TOR and other publicly available anonymous proxies to perform application-layer DDoS attacks (e.g. HTTP floods). These proxies were created to enable anonymous web browsing — substituting a users’ IP address with that of an untraceable proxy.

The use of anonymous proxies (most of which are free) holds many benefits for DDoS attackers. This enables them to mask their bot IPs, letting them bypass security solutions based on blacklisting. Rather than using a single address for each bot request, anonymous proxies spread requests among multiple IPs, permitting them to fly under the radar of rate-limiting mechanisms.

In addition to hiding IPs, anonymous proxies also obfuscate header information, enabling them to evade security measures based solely on HTTP fingerprinting. Utilizing these inherent benefits, perpetrators are able to create a large botnet-style impact with minimal effort.

As malicious bots evolve and become more stealthy, it’s no longer enough to know who the visitor is (i.e., block by signature). Security solutions also need to assess why any bot is there in the first place. The use of reputation and behavioral analysis can help examine the context of bot visits, which is an important factor in identifying Impersonators, anonymous proxies and other new types of bot threats.

Looking ahead

Bots are an essential part of the Internet ecosystem. However, they are now more than tools; whether they are used for good or malicious purposes depends entirely on the owner’s intentions and motivation.

When it comes to web threats, bad bots are the preferred tool of today’s cyber criminals; more than 90 percent of all cyber attacks (e.g. DDoS attacks, web application threats) that our researchers identified are executed by them and impersonator bots are the elite commando unit of bad bots.

In terms of lost revenues and remediation efforts, the cost of such assaults can easily reach hundreds of thousands — even millions — of dollars. As we have seen in major data breaches such as the Sony hack, the worst case scenario really depends on an attacker’s intentions and the magnitude of the target.

More TechCrunch


Companies are always looking for an edge, and searching for ways to encourage their employees to innovate. One way to do that is by running an internal hackathon around a…

Why companies are turning to internal hackathons

Featured Article

I’m rooting for Melinda French Gates to fix tech’s broken ‘brilliant jerk’ culture

Women in tech still face a shocking level of mistreatment at work. Melinda French Gates is one of the few working to change that.

3 hours ago
I’m rooting for Melinda French Gates to fix tech’s  broken ‘brilliant jerk’ culture

Blue Origin has successfully completed its NS-25 mission, resuming crewed flights for the first time in nearly two years. The mission brought six tourist crew members to the edge of…

Blue Origin successfully launches its first crewed mission since 2022

Creative Artists Agency (CAA), one of the top entertainment and sports talent agencies, is hoping to be at the forefront of AI protection services for celebrities in Hollywood. With many…

Hollywood agency CAA aims to help stars manage their own AI likenesses

Expedia says Rathi Murthy and Sreenivas Rachamadugu, respectively its CTO and senior vice president of core services product & engineering, are no longer employed at the travel booking company. In…

Expedia says two execs dismissed after ‘violation of company policy’

Welcome back to TechCrunch’s Week in Review. This week had two major events from OpenAI and Google. OpenAI’s spring update event saw the reveal of its new model, GPT-4o, which…

OpenAI and Google lay out their competing AI visions

When Jeffrey Wang posted to X asking if anyone wanted to go in on an order of fancy-but-affordable office nap pods, he didn’t expect the post to go viral.

With AI startups booming, nap pods and Silicon Valley hustle culture are back

OpenAI’s Superalignment team, responsible for developing ways to govern and steer “superintelligent” AI systems, was promised 20% of the company’s compute resources, according to a person from that team. But…

OpenAI created a team to control ‘superintelligent’ AI — then let it wither, source says

A new crop of early-stage startups — along with some recent VC investments — illustrates a niche emerging in the autonomous vehicle technology sector. Unlike the companies bringing robotaxis to…

VCs and the military are fueling self-driving startups that don’t need roads

When the founders of Sagetap, Sahil Khanna and Kevin Hughes, started working at early-stage enterprise software startups, they were surprised to find that the companies they worked at were trying…

Deal Dive: Sagetap looks to bring enterprise software sales into the 21st century

Keeping up with an industry as fast-moving as AI is a tall order. So until an AI can do it for you, here’s a handy roundup of recent stories in the world…

This Week in AI: OpenAI moves away from safety

After Apple loosened its App Store guidelines to permit game emulators, the retro game emulator Delta — an app 10 years in the making — hit the top of the…

Adobe comes after indie game emulator Delta for copying its logo

Meta is once again taking on its competitors by developing a feature that borrows concepts from others — in this case, BeReal and Snapchat. The company is developing a feature…

Meta’s latest experiment borrows from BeReal’s and Snapchat’s core ideas

Welcome to Startups Weekly! We’ve been drowning in AI news this week, with Google’s I/O setting the pace. And Elon Musk rages against the machine.

Startups Weekly: It’s the dawning of the age of AI — plus,  Musk is raging against the machine

IndieBio’s Bay Area incubator is about to debut its 15th cohort of biotech startups. We took special note of a few, which were making some major, bordering on ludicrous, claims…

IndieBio’s SF incubator lineup is making some wild biotech promises

YouTube TV has announced that its multiview feature for watching four streams at once is now available on Android phones and tablets. The Android launch comes two months after YouTube…

YouTube TV’s ‘multiview’ feature is now available on Android phones and tablets

Featured Article

Two Santa Cruz students uncover security bug that could let millions do their laundry for free

CSC ServiceWorks provides laundry machines to thousands of residential homes and universities, but the company ignored requests to fix a security bug.

2 days ago
Two Santa Cruz students uncover security bug that could let millions do their laundry for free

TechCrunch Disrupt 2024 is just around the corner, and the buzz is palpable. But what if we told you there’s a chance for you to not just attend, but also…

Harness the TechCrunch Effect: Host a Side Event at Disrupt 2024

Decks are all about telling a compelling story and Goodcarbon does a good job on that front. But there’s important information missing too.

Pitch Deck Teardown: Goodcarbon’s $5.5M seed deck

Slack is making it difficult for its customers if they want the company to stop using its data for model training.

Slack under attack over sneaky AI training policy

A Texas-based company that provides health insurance and benefit plans disclosed a data breach affecting almost 2.5 million people, some of whom had their Social Security number stolen. WebTPA said…

Healthcare company WebTPA discloses breach affecting 2.5 million people

Featured Article

Microsoft dodges UK antitrust scrutiny over its Mistral AI stake

Microsoft won’t be facing antitrust scrutiny in the U.K. over its recent investment into French AI startup Mistral AI.

2 days ago
Microsoft dodges UK antitrust scrutiny over its Mistral AI stake

Ember has partnered with HSBC in the U.K. so that the bank’s business customers can access Ember’s services from their online accounts.

Embedded finance is still trendy as accounting automation startup Ember partners with HSBC UK

Kudos uses AI to figure out consumer spending habits so it can then provide more personalized financial advice, like maximizing rewards and utilizing credit effectively.

Kudos lands $10M for an AI smart wallet that picks the best credit card for purchases

The EU’s warning comes after Microsoft failed to respond to a legally binding request for information that focused on its generative AI tools.

EU warns Microsoft it could be fined billions over missing GenAI risk info

The prospects for troubled banking-as-a-service startup Synapse have gone from bad to worse this week after a United States Trustee filed an emergency motion on Wednesday.  The trustee is asking…

A US Trustee wants troubled fintech Synapse to be liquidated via Chapter 7 bankruptcy, cites ‘gross mismanagement’

U.K.-based Seraphim Space is spinning up its 13th accelerator program, with nine participating companies working on a range of tech from propulsion to in-space manufacturing and space situational awareness. The…

Seraphim’s latest space accelerator welcomes nine companies

OpenAI has reached a deal with Reddit to use the social news site’s data for training AI models. In a blog post on OpenAI’s press relations site, the company said…

OpenAI inks deal to train AI on Reddit data

X users will now be able to discover posts from new Communities that are trending directly from an Explore tab within the section.

X pushes more users to Communities

For Mark Zuckerberg’s 40th birthday, his wife got him a photoshoot. Zuckerberg gives the camera a sly smile as he sits amid a carefully crafted re-creation of his childhood bedroom.…

Mark Zuckerberg’s makeover: Midlife crisis or carefully crafted rebrand?