Recently, as a professional manufacturer in the field of Bots automated attack protection and an innovator of China's dynamic security technology, Ruishu Information recently released the "2021 Bots Automated Threat Report". Based on Ruishu Information's thousands of protection cases in government affairs, finance, telecommunications, education, healthcare, Internet and other industries over the years and third-party public data, the report analyzes the detailed data of Bots automated attacks in 2020 from the perspectives of attack targets, attack sources, Bots client analysis, mobile terminal analysis, etc., providing an important reference for enterprises to deeply understand the threat of Bots attacks and improve their corresponding security defense capabilities. Analysis 1: Government affairs, publishing, and healthcare are hot spots for bot attacks From an industry perspective, in 2020, public disclosure systems and service provision systems are still the top targets of bot attacks, and the proportion of malicious robots has increased from 40.97% in 2019 to 43.76% in 2020. The top five threat scenarios include vulnerability detection and exploitation, resource grabbing, data scraping, brute force cracking, and denial of service attacks. At the same time, affected by the COVID-19 pandemic, the publishing and healthcare industries have become hot spots for Bots attacks. Free e-books, paper libraries and other resources that are open to the public for online learning have attracted a large number of malicious crawlers to crawl information. The healthcare industry has also become a key target of attacks because of the "high value" of medical data, especially in terms of system vulnerability scanning, DDoS, and high-frequency crawling of public information.
As corporate businesses develop, access methods have merged into multiple methods such as the Web, APP, and mini-programs, and APIs, which serve as the basic support for integrated access, have also become a key target for attackers. It is expected that by 2022, API abuse will become the most common attack method that causes data leaks in corporate Web applications. Through monitoring and analysis of access types, Ruishu Information observed that the proportion of API requests has exceeded 65%.
In order to break through the protection mechanism of the target system, more than 90% of Bots will choose to use IP proxy to hide themselves. As Bot attacks escalate, the way IP proxy is provided has also evolved from local proxy to the more efficient HTTP tunnel mode. The number of IP addresses has greatly increased, the sources have become more extensive, and the concealment has reached a new level. From the perspective of the geographical location of bot attacks, the sources of domestic bot attacks are quite scattered, but they are mainly from the economically developed southern regions. Guangdong accounts for more than 10%, making it the top source of domestic bot attacks, followed by Anhui, Zhejiang, Jiangsu, and Beijing. Among attacks from abroad, the United States still ranks first, accounting for nearly 60% of attacks, followed by Germany and Singapore. In addition, the report pointed out that public cloud is still one of the main sources of bot attacks, and a large number of bots use the resources of IDC computer rooms to attack. Among them, more than 50% of bot attacks use Alibaba Cloud, followed by a significant increase in attacks from Huawei Cloud and Tencent Cloud, and the three together account for more than 80%.
To improve attack efficiency, Bot attackers are constantly trying to bypass detection measures by various means, such as hiding their real identity information by modifying the User Agent. According to Ruishu Information's analysis, more than half of Bots will choose Windows, followed by Mac and Linux. In addition, up to 66% of Bot attackers prefer Chrome as their "disguise". Whether it is to improve efficiency or bypass existing protection mechanisms, many bots are based on automation frameworks. Compared with 2019, there is no obvious change in the choice of automation frameworks for bots, and the mainstream technologies still use Webdriver, Headless, PhantomJS, and NodeJS.
As more and more business systems of enterprises migrate to mobile terminals, attack platforms must also shift to mobile terminals. As a result, a variety of attack methods have emerged one after another, such as various machine modification tools, cracking frameworks, simulators, root, group control, cloud control, IMEI forgery, GPS forgery, etc. In terms of tool selection, the techniques used by attackers in 2020 did not change much, but there were some updates in the tools. The most commonly used tool was Multiple Avatars, followed by the modification tool Weiba.
In terms of city distribution, the largest source city of mobile platform bots is Guangzhou, followed by Shanghai. Bots attacks on Xiaomi ranked first, followed by Huawei and OPPO. Summarize Overall, as Bots robot attacks have become the mainstream of attacks today, with the strengthening of AI technology and platform trends, increasingly complex and advanced Bots robot attacks have brought more severe challenges to the cybersecurity industry. As a domestic company that has innovatively proposed the concept of "dynamic security", Ruishu Information's Bots automated threat defense capability is its signature skill. Its robot firewall product Botgate has become a very effective solution on the market for dealing with Bots robot attacks. In the future, as more companies change their security thinking, Ruisu Information will use this security weapon to achieve a higher level of security defense, help more companies keep Bots attacks out, and build a responsive and well-defended network security system. |
<<: Cabling technology continues to evolve to meet rapidly growing network needs
The arrival of the 5G era not only brings develop...
As a product of the deep integration and applicat...
V5.NET mainly provides independent server rental ...
Although Apple held a press conference recently, ...
A recent analysis by Frost & Sullivan shows ...
Due to its huge address space, IPv6 has a natural...
The past of Apple’s industrial chain may very wel...
Earlier this month, we shared information about H...
Sockets are endpoints for communication between n...
Entering 2021, with the continuous acceleration o...
Preface: From telegraph to 5G communication, it i...
Recently, discussions about 5G have been everywhe...
The Internet of Everything, cloud computing, and ...
IPv6 is the abbreviation of Internet Protocol Ver...
[[319142]] Recently, in order to accelerate the i...