Distil’s Bad Bot Report 2018: The Year Bad Bots Went Mainstream

March 26, 2018 Edward Roberts

Today, Distil Networks released its fifth annual Bad Bot Report titled, “Bad Bot Report 2018: The Year Bad Bots Went Mainstream.” It would be difficult for anyone to claim ignorance of the term bots after such a tumultuous twelve months. While much of the discussion around bots has focused on social media, fake news, and influencing political elections, this report goes deeper and examines the most sophisticated automated threats for some of the world’s most attacked websites.

2018 Bad Bot Report

This report is the bot mitigation industry’s leading study and analyzes hundreds of billions of bad bot requests to provide insight into the impact of bad bots on business today.

Key Findings from the Bad Bot Report 2018:

  • Bad bots are up - In 2017, bad bots accounted for 21.8 percent of all website traffic, a 9.5 percent increase over the previous year.
  • Good bots are also up - They increased by 8.7 percent to make up 20.4 percent of all website traffic.
  • For the first time, Russia became the most blocked country - Russia is blocked by one in five companies (20.7%) implementing country-specific IP block requests.
  • Gambling companies and airlines suffer from higher proportions of bad bot traffic - 53.1 percent and 43.9 percent of traffic coming from bad bots, respectively.
  • They identify as the major browsers - 83.2 percent of bad bots report their user agent as web browsers Chrome, Firefox, Safari or Internet Explorer. 10.4 percent claim to come from mobile browsers such as Safari Mobile, Android or Opera.
  • The weaponization of the datacenter continues - 82.7 percent of bad bot traffic emanated from data centers in 2017, compared to 60.1 percent in 2016. The availability and low cost of cloud computing explains the dominance of data center use.
  • 74 percent of bad bot traffic is made up of moderate or sophisticated bots, which evade detection by distributing their attacks over multiple IP addresses, or simulating human behavior such as mouse movements and mobile swipes.
  • Account takeover attacks occur 2-3 times per month on the average website, but immediately following a breach, they are 3x more frequent - bot operators know that people reuse the same credentials across multiple websites.

For additional information and to read the report:

 

About the Author

Edward Roberts

Edward Roberts leads Product Marketing and has over twenty years experience in technology marketing. Previously he worked for Juniper Networks, heading up Product Marketing for the Counter Security team. Before that he ran marketing for Mykonos Software, a web security company.

More Content by Edward Roberts
Previous Article
9 Recommendations to Prevent Bad Bots on Your Website
9 Recommendations to Prevent Bad Bots on Your Website

Bots are on your website every day. Every site is targeted for different reasons, and usually by different ...

Next Article
Anatomy of GiftGhostBot
Anatomy of GiftGhostBot

This infographic shows how the GiftGhostBot works, it's profile, scale and who it effects. Learn about this...