Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

12/11/2018
02:30 PM
Julian Waits
Julian Waits
Commentary
Connect Directly
Facebook
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

The Grinch Bot Before Christmas: A Security Story for the Holidays

Once upon a time, buyers purchased products from certified sellers. Today, hoarders use botnets to amass goods at significant markup for a new gray-market economy.

It was Christmas 2017 and I needed one thing: a Fingerlings. There was just one problem: Not a single store had these tiny stuffed animals in stock.

That's when I found Bill from Chicago, who was offering 30 Fingerlings on eBay. The price was 20% higher than it would have been at a toy store, but like so many other consumers I was stuck. I made the purchase, with a slight sense of aggravation at overpaying but also a sense of relief. It was done.

It wasn't until months later that I realized I'd been had — by a Grinch Bot!

This might sound like a page out of the retail Nightmare Before Christmas, but it's a real story about the difficulties of buying a product online and an example of the effect that bots have on the ability of consumers to buy products — and of manufacturers to control their market access, pricing power, and supply chain.

Machine learning-powered bots and algorithmic purchasing are becoming a gray-market economy. Aided by hacker cartels and fronted by online middlemen, the trend is affecting consumers and business buyers as well as manufacturers and brick-and-mortar retailers.

The Sandman Clothing and Sports Company
Another real-life example, this one drawn from a customer engagement, describes the challenge a large US sportswear manufacturer and online retailer faces daily.

The company — we'll call it the Sandman Clothing and Sports Company — manufactures a range of sportswear and associated gear, distributing the products through its own retail outlets and also through agreements with national and local retail channel partners, brick-and-mortar sporting goods stores, and online sales through a network of e-commerce partners. The enterprise has long led its sector with big-splash releases of clothing and other sports items endorsed prior to release by high-profile social media influencers. By the time an item is released, so much buzz has been created that the item is bound to sell out.

Enter the Grinch Bot.

Over the period of a year, the company realized each new product release followed a pattern: The second a new item was made available, it sold out, before sufficient physical stock could be shipped by the company. In an instant, inventory had virtually disappeared from the primary market. Hours later, the item would show up on the secondary market — for example, Craigslist — at significant markup. Retail channel partners were furious — their loyal customers were swarming the stores and venting frustration. Online channel partners watched helplessly as the newest desirable product popped up on other e-commerce sites, offered by sellers with little track record or feedback. The company was losing money not only in its own retail properties but also from channel partners; its supply chain was unable to adapt quickly enough to meet the unprecedented demand.

It quickly became apparent that the company's analytic data, which should have provided a control on orders, was not acting as an early-warning system for suspicious purchasing behavior.

How It Works: Buy, Hoard, Sell
Where once you purchased only from a certified retailer, new markets are now ruled by hoarders who use bots to amass goods. How do retailers fight back? By deploying machine learning and advanced security analytics to quickly detect bots and protect inventory so the downstream brand is not affected.

But wait — not all bots are Grinch Bots.

While it's easy to think all bots are malicious, nothing could be further from the truth. According to the "Automated Threats to Web Applications" project report from the Open Web Application Security Project, more than 73% of bot traffic on the Internet involves, directly or indirectly, humans directing "good" bots to manage processes: search engine crawlers, API access, and system health checks. The remaining 27% represents the activity of "bad" bots and web application risks.

It's unlikely the average consumer would recognize most of the activity generated by bad bots, which puts pressure on businesses to detect, deflect, and defend against the predations of bad bots.

Protecting Your Reputation, Taylor Swift-Style
It's possible to fight bots with a good strategy. Taylor Swift's recent Reputation tour is an example of managing a brand — and the value of a ticket — to maximize value and reduce risk of bot-powered scalping and other threats.

Swift, who lost money to bots and scalpers on her 2015 tour, worked with Ticketmaster to offer her Reputation tickets only through the verified fan program, an AI-driven platform that requires buyers to register for ticket access in advance, then doles out access to tickets after examining a fan's social profile and other data, using breadcrumbs from the fan's web activity. "Verified fans" are sent a code that gives them limited-time access to acquire tickets. Swift sold up to 50% of her tickets via the platform, then released the remainder at market price. According to reporting in the Financial Times, this approach limited the availability of tickets on the secondary scalping market to 5% for the Reputation tour, as opposed to 30% for Swift's earlier tour. Swift came out of the tour with "about $1.4m a show that had been lost to resellers on her previous tour" as measured by a Financial Times analysis — recouping more than $50 million.

Beating bad bots, not only at Christmas but all year long, requires vigilance, real-time access to analytic results, and a laser focus on security. For businesses like the so-called Sandman Clothing and Sports Company, the benefits are clear: more control of products as they move through the retail chain, renewed pricing power, fewer supply chain surprises, and better relationships with retail channel partners and customers. The key to this transformation is data — data the company had in its systems all the time but is hidden by slow analysis that reduces visibility into operations.

Related Content:

Julian Waits has 30-plus years in senior leadership roles at technology companies, specializing in security, risk and threat detection. He services on several industry Boards, including ICMCP and NICE, promoting development of the next generation of cyber security ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31664
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-33185
PUBLISHED: 2021-06-18
SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
CVE-2021-33186
PUBLISHED: 2021-06-18
SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-31272
PUBLISHED: 2021-06-18
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.
CVE-2021-31660
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 85da504d2dc30188b89f44c3276fc5a25b31251f contains a buffer overflow which could allow attackers to obtain sensitive information.