Introduction
This is the second of a series of articles tracking the amount of unwanted automation observed against F5 Bot Defense customers in different industries. Data used in this review is from F5 Bot Defense customers around the world but is heavily skewed towards North American customers. This review is meant to provide an overview of the amount of credential stuffing and other unwanted automation targeting various industries.
This review also tracks long-term automation trends for each of these industries. Such long-term trend data is helpful for security teams in various industries as they protect their applications. Security practitioners can tell whether their experience is in line with peers in their industry, as well as identify ways in which they can improve their security posture to make their organizations less attractive targets for unwanted automation.
The initial article was focused on the first half of 2023 with deep dives into particular industries and flows. A flow is defined as an application or API function e.g. Login, Sign Up, Search, Shop etc. These are functions that a given endpoint allows users to perform. This article covers the full year 2023 and dives deeply into the same topics. These reviews are not meant to be comprehensive reviews of all flows across all industries but aim to cover the most common industries and flows. Over time the list of industries and flows may be adjusted in response to audience feedback, so please feel free to reach out should you like to see specific data added to this review.
Automation Overview
Below we will look at unwanted automation from the standpoint of industry targeting, platform targeting (web vs mobile), and function (or flow) targeting, such as login or checkout.
Automation by Industry
Figure 1 below gives an overview of the average proportion of unwanted Web and Mobile API automation observed for calendar year 2023 across 13 industry verticals. Overall, automation levels ranged from 0.2% Mobile API automation on Insurance companies to 42.6% against the Healthcare industry’s Web applications. Insurance Mobile API and Healthcare Web applications were also the least and most attacked applications in the H1 2023 Bad Bot Review.
Over 2023, we observed consistently higher levels of automation against Web applications than against Mobile APIs. This is consistent with the findings in the 2023 Identity Threat Report: The Unpatchables. Figure 2 and Figure 3 below are extracted for this review.
After analyzing traffic from 159 bot defense customers, this review found that in the absence of a bot defense solution, Mobile APIs experience significantly more automation than Web applications. However, once a bot defense solution is deployed in mitigation/blocking mode, we see a reversal, with Web having higher levels of persistent attacks despite consistent mitigation. Figure 2 shows that pre-mitigation, Mobile APIs experience on average 21.0% automation compared to 17.4% for Web applications. Post-mitigation, the percentage automation falls drastically for both Web and Mobile as attackers give up and others try to retool past mitigation. Automation levels of 3.9% for Mobile APIs, compared to 6.0% for Web applications were observed.
A hypothesis for why this is the case is that Mobile APIs tend to be more homogenous than Web applications. As a result, attack tools designed for attacks against one company’s Mobile APIs can easily be pointed at a different company with minimal customizations. As a result, the barrier to entry for attacks against Mobile APIs is low, resulting in higher levels of automation pre-mitigation compared to Web. Once mitigation/blocking is enabled, Mobile attackers find it easier to simply point their attack tools towards an unprotected target rather than retool, as the effort of such retargeting is minimal. On the other hand, Web attackers invest a lot of effort to customize their tools for each website and hence are unwilling to abandon all their hard work once they are mitigated. They therefore tend to persist a bit more despite mitigation as the effort of moving to another target is significant. This results in post mitigation automation being higher on Web than on Mobile. This is our working theory that explains this phenomenon. It is, however, difficult to know for sure what causes this observation.
Because the majority of Bot defense customers are in mitigation/blocking mode, it therefore makes sense that Figure 1 shows higher levels of automated attacks against Web applications compared to Mobile APIs.
Industry Trend Analysis
Our analysis showed that there are fluctuations in the level of automated attacks for each industry from month to month (as shown in Figure 4 and Figure 5 below). There are, however, some strong patterns in the proportion of unwanted automation by industry. There are several factors that affect how much automation we see on a given enterprise and by aggregation in each industry:
- Value – What is the payout of using automation against the given enterprise? What kinds of money, stored credit cards, gift cards, miles, points, discounts, services, etc., can be stolen from hacked accounts? What is the payout of success?
- Security – How well defended are enterprises in this sector? Do they have large security budgets and teams? How long will it take for fraudulent activities to be detected — in short, what is the probability of success?
- Risk – What is the probability of being identified and what are the consequences if identified?
- Deterrence (length of protection) – How long have strong defenses been in place? Have existing anti-bot defenses successfully mitigated and deterred attackers? (New Bot Defense customers tend to have higher automation percentages than those that have been protected for longer. The mix of new and old customers in each industry may also impact the industry automation overview in Figure 1, though this impact will decrease over time.)
Using this factor list, we can explain why the Airline industry, for example, is one of the most attacked. The demand for airline miles is huge and attackers that take over large numbers of airline accounts can accumulate large amounts of miles that can be used to purchase flights and first-class upgrades that have a ready market. The value of the attacks against the airline industry is very high, leading to high attack volumes. Airline flight ticket pricing is often opaque, which creates a large market for flight comparison and flight ticket hacking companies that try to game the system to get travelers the cheapest possible tickets. These companies are well resourced, highly motivated, and send a lot of automated traffic against the Airline’s flight search, seat map, and other flows.
On the other end of the percentage automation spectrum are insurance companies. The value to be gained from taking over a person’s insurance login is minimal. This low value and high risk associated with prosecution for insurance fraud makes this an unattractive industry for attackers. Insurance companies employ teams of investigators to analyze and go after fraud which makes this a risky undertaking for a very limited payout.
Web
Figure 4 below gives the 2023 trend in Web automation (%) for the 13 industries highlighted in Figure 1 above. The image legend is sorted from highest to lowest automation (%) based on December 2023 numbers for ease of reference.
Throughout 2023, we observed several interesting industry trends in Web automated attacks. These trends can be gleaned through a thorough analysis of Figure 4 above and the corresponding table of values (Table 1). It is hard to explain a lot of these trends as they are often influenced by large events like sales or major marketing events (e.g., Black Friday, Cyber Monday, back-to-school, Memorial Day), summer holiday travel, mergers and acquisitions, changes in applications and security posture, breaches, and credential leaks. They can also be influenced by less obvious factors, such as a new advanced persistent threat actor targeting a specific industry, a new automation tool or technique, or an increase or decrease in the underlying enterprise base for that industry. This data is therefore meant to be directional, and to allow security teams to see if their experience is indicative of wider industry factors or is unique to their own enterprise.
We will, however, highlight the top 4 trends observed over the year in Web automation:
- Healthcare had the highest levels of unwanted Web automation (except for a dip in May). Automation against Healthcare Web applications continued to rise, peaking at 54.0% in December 2023. Most of this automation, as we shall reveal later, was primarily web scrapers targeting healthcare provider search pages.
- The Hospitality industry has seen a steady increase in automation, starting off as the eighth most targeted industry in January 2023 with 11.7% automation. Attacks against customers in this industry started to rise markedly in April, coinciding with the beginning of bookings for summer holiday travel. Attacks against hospitality companies peaked at 41.8% in September.
- A similar trend to the hospitality industry was observed in the Airline industry which started off with 19.7% automation in January, peaking at 33.1% also in September 2023, in line with the summer holiday travel trend.
- Credit unions, despite being one of the least targeted industries throughout the first half of 2023, saw a marked rise in attacks between June and July 2023, increasing from 1.2% automation in May to 6.8% in June and 6.3% in July, before going back down to 0.9% in August.
Tables 1 and 2 below give the raw numbers used to create Figure 4.