Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

12/11/2018
02:30 PM
Julian Waits
Julian Waits
Commentary
Connect Directly
Facebook
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

The Grinch Bot Before Christmas: A Security Story for the Holidays

Once upon a time, buyers purchased products from certified sellers. Today, hoarders use botnets to amass goods at significant markup for a new gray-market economy.

It was Christmas 2017 and I needed one thing: a Fingerlings. There was just one problem: Not a single store had these tiny stuffed animals in stock.

That's when I found Bill from Chicago, who was offering 30 Fingerlings on eBay. The price was 20% higher than it would have been at a toy store, but like so many other consumers I was stuck. I made the purchase, with a slight sense of aggravation at overpaying but also a sense of relief. It was done.

It wasn't until months later that I realized I'd been had — by a Grinch Bot!

This might sound like a page out of the retail Nightmare Before Christmas, but it's a real story about the difficulties of buying a product online and an example of the effect that bots have on the ability of consumers to buy products — and of manufacturers to control their market access, pricing power, and supply chain.

Machine learning-powered bots and algorithmic purchasing are becoming a gray-market economy. Aided by hacker cartels and fronted by online middlemen, the trend is affecting consumers and business buyers as well as manufacturers and brick-and-mortar retailers.

The Sandman Clothing and Sports Company
Another real-life example, this one drawn from a customer engagement, describes the challenge a large US sportswear manufacturer and online retailer faces daily.

The company — we'll call it the Sandman Clothing and Sports Company — manufactures a range of sportswear and associated gear, distributing the products through its own retail outlets and also through agreements with national and local retail channel partners, brick-and-mortar sporting goods stores, and online sales through a network of e-commerce partners. The enterprise has long led its sector with big-splash releases of clothing and other sports items endorsed prior to release by high-profile social media influencers. By the time an item is released, so much buzz has been created that the item is bound to sell out.

Enter the Grinch Bot.

Over the period of a year, the company realized each new product release followed a pattern: The second a new item was made available, it sold out, before sufficient physical stock could be shipped by the company. In an instant, inventory had virtually disappeared from the primary market. Hours later, the item would show up on the secondary market — for example, Craigslist — at significant markup. Retail channel partners were furious — their loyal customers were swarming the stores and venting frustration. Online channel partners watched helplessly as the newest desirable product popped up on other e-commerce sites, offered by sellers with little track record or feedback. The company was losing money not only in its own retail properties but also from channel partners; its supply chain was unable to adapt quickly enough to meet the unprecedented demand.

It quickly became apparent that the company's analytic data, which should have provided a control on orders, was not acting as an early-warning system for suspicious purchasing behavior.

How It Works: Buy, Hoard, Sell
Where once you purchased only from a certified retailer, new markets are now ruled by hoarders who use bots to amass goods. How do retailers fight back? By deploying machine learning and advanced security analytics to quickly detect bots and protect inventory so the downstream brand is not affected.

But wait — not all bots are Grinch Bots.

While it's easy to think all bots are malicious, nothing could be further from the truth. According to the "Automated Threats to Web Applications" project report from the Open Web Application Security Project, more than 73% of bot traffic on the Internet involves, directly or indirectly, humans directing "good" bots to manage processes: search engine crawlers, API access, and system health checks. The remaining 27% represents the activity of "bad" bots and web application risks.

It's unlikely the average consumer would recognize most of the activity generated by bad bots, which puts pressure on businesses to detect, deflect, and defend against the predations of bad bots.

Protecting Your Reputation, Taylor Swift-Style
It's possible to fight bots with a good strategy. Taylor Swift's recent Reputation tour is an example of managing a brand — and the value of a ticket — to maximize value and reduce risk of bot-powered scalping and other threats.

Swift, who lost money to bots and scalpers on her 2015 tour, worked with Ticketmaster to offer her Reputation tickets only through the verified fan program, an AI-driven platform that requires buyers to register for ticket access in advance, then doles out access to tickets after examining a fan's social profile and other data, using breadcrumbs from the fan's web activity. "Verified fans" are sent a code that gives them limited-time access to acquire tickets. Swift sold up to 50% of her tickets via the platform, then released the remainder at market price. According to reporting in the Financial Times, this approach limited the availability of tickets on the secondary scalping market to 5% for the Reputation tour, as opposed to 30% for Swift's earlier tour. Swift came out of the tour with "about $1.4m a show that had been lost to resellers on her previous tour" as measured by a Financial Times analysis — recouping more than $50 million.

Beating bad bots, not only at Christmas but all year long, requires vigilance, real-time access to analytic results, and a laser focus on security. For businesses like the so-called Sandman Clothing and Sports Company, the benefits are clear: more control of products as they move through the retail chain, renewed pricing power, fewer supply chain surprises, and better relationships with retail channel partners and customers. The key to this transformation is data — data the company had in its systems all the time but is hidden by slow analysis that reduces visibility into operations.

Related Content:

Julian Waits has 30-plus years in senior leadership roles at technology companies, specializing in security, risk and threat detection. He services on several industry Boards, including ICMCP and NICE, promoting development of the next generation of cyber security ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Cybersecurity Team Holiday Guide: 2019 Gag Gift Edition
Ericka Chickowski, Contributing Writer,  12/2/2019
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19647
PUBLISHED: 2019-12-09
radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted input.
CVE-2019-19648
PUBLISHED: 2019-12-09
In the macho_parse_file functionality in macho/macho.c of YARA 3.11.0, command_size may be inconsistent with the real size. A specially crafted MachO file can cause an out-of-bounds memory access, resulting in Denial of Service (application crash) or potential code execution.
CVE-2019-19642
PUBLISHED: 2019-12-08
On SuperMicro X8STi-F motherboards with IPMI firmware 2.06 and BIOS 02.68, the Virtual Media feature allows OS Command Injection by authenticated attackers who can send HTTP requests to the IPMI IP address. This requires a POST to /rpc/setvmdrive.asp with shell metacharacters in ShareHost or ShareNa...
CVE-2019-19637
PUBLISHED: 2019-12-08
An issue was discovered in libsixel 1.8.2. There is an integer overflow in the function sixel_decode_raw_impl at fromsixel.c.
CVE-2019-19638
PUBLISHED: 2019-12-08
An issue was discovered in libsixel 1.8.2. There is a heap-based buffer overflow in the function load_pnm at frompnm.c, due to an integer overflow.