OWASP Automated Threats Explained - Spamming

December 29, 2016

Spamming is another way your site can be attacked. By targeting areas that accept input or content submission, hackers can use different types of spam to cause brand damage and ruin the customer experience.

Form submission spam occurs when someone fills out a form, such as “contact us,” with fake information. Not only does this waste the time and resources of the staff following up, but they’ll start to question the validity of the leads, eventually following up less, resulting in real leads being ignored.

Another type is comment spam, where inappropriate activities or links to sites are posted in the comments section. No company wants this type of spam polluting their site, so they require moderators who spend hours manually cleaning up the spam. And if a user does click on one of these spam links, it could take them to a site where they’ll start downloading malware from bad links. The result is wasted time and loss of trust in the brand.

Rogue reviews are another damaging type of spam, where negative reviews of products, reviews pointing to competitor sites or products, and comments containing links to malware are posted on review sites, making the hosting site appear untrustworthy. This type of negative spamming deteriorates the image of the brand, as well as creates a bad user experience. Stop the content spam.

Ready for the good news? Distil Networks blocks every OWASP Automated threat.

Previous Video
easyJet’s Journey to Protect Their Booking Engine from Unwanted Traffic
easyJet’s Journey to Protect Their Booking Engine from Unwanted Traffic

Join Anthony Drury, at easyJet, as he takes you their journey to protect their booking engine from unwanted...

Next Video
What is Carding, Card Cracking and Cashing Out?
What is Carding, Card Cracking and Cashing Out?

In order to protect your website, you need to know how you’re being attacked. Carding, Card Cracking and C...