Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

11/14/2018
02:30 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Airlines Have a Big Problem with Bad Bots

Bad bots account for 43.9% of all traffic on their websites, APIs, and mobile apps, according to a new analysis of 100 airlines.

(Image: profit_image, via stock.adobe.com)
(Image: profit_image, via stock.adobe.com)

As airlines are ramping up in preparation of the holiday travel season, bad bots are ramping up their activity on airlines' websites, mobile apps, and APIs. Analysts in the research arm of Distil Networks today published a study called "How Bots Affect Airlines," in which they analyzed 7.4 billion requests from 180 domains on 100 international airlines. They found malicious bots make up 43.9% of all airline web traffic — about double the 21.8% average for all industries. The highest bad bot percentage for one airline? About 94.6%.

In almost 30% of the domains that analysts studied, bad bots made up more than half of all traffic. Most bots (84.3%) on airline domains are moderate or advanced, and harder to detect. The highest proportion of bad bot traffic stems from the US (25.6%), followed by Singapore (15%).

At the core of the problem are airline websites and mobile apps, which serve as the home for flight data presented to customers: seat availability, pricing, booking processes, discounts. Some airlines use their own booking engines; others use third-party services for booking.

Online travel agencies (OTAs) like Expedia and Booking.com are channels designed to sell flights and process payment on behalf of airlines. Under commercial agreements, OTAs can scrape flight data in exchange for fees. Travel aggregators like Kayak and Skyscanner also display flight information but redirect shoppers to airlines' websites to finalize their booking.

Four attack groups deploy bots against airlines: unauthorized OTAs and travel aggregators avoid fees and scrape flight information and fares, then hold seats to resell them later (a process known as "seat spinning"). Competitor airlines also scrape flight data and fares to gain market intelligence and hold seats to block legitimate purchases. Criminals target loyalty programs with account takeover to steal points, and conduct credit card and loyalty program fraud.

Keeping Up with Competition
Airlines are hot targets because the value of the goods they sell has a finite timeline, says Edward Roberts, director of product marketing at Distil Networks. There's only a certain period of time a flight ticket will be valid, and price changes frequently based on destination and departure. Further, an ecosystem of OTAs and aggregators is constantly collecting data.

"The more competitive the market, the more competitive routes you fly, the more bots are competitive," he explains. Every airline has some combination of authorized and unauthorized data scraping on their sites. Bad bots can result in higher fees for third-party booking engines because they make it appear as though far more people are viewing than booking flights.

It's called a "look-to-book" ratio. Every time someone looks at a flight listing and asks "how much," that's considered a look, Roberts says. There should be one flight booked for every 100 looks, a number all airlines measure their progress against. "If that ratio suddenly spikes, you know that's bot behavior," he continues. "That's not human behavior."

The business implications of bad bots are significant, says Roberts. "Information from airlines states the financial cost and burden of this is getting to that point where they're saying 'we actively need to solve this problem because the cost to business is getting too large,'" he adds.

Loyalty rewards programs are hard hit by cybercriminals looking to monetize account access. If they can brute-force credentials and break in, they can steal and monetize points and miles.

"Anecdotally, airlines have a lot of seven-digit fraud coming through loyalty programs that they're concerned about," Roberts points out. Larger airlines typically have more value in their online loyalty program accounts, so those typically see larger amounts of account takeover attacks.

Attackers targeting the airline industry are becoming more advanced over time. Researchers note only 19.7% of airline bots were sophisticated in 2017; this year, the percentage jumped to 31.4%. At the same time, the percentage of simple bots decreased from 27.4% to 15.7%.

"Airlines are trying to deal with the problem, and they're trying to put mitigation in place so they can prevent the volume of bots from attacking them," says Roberts. "The bot operators are reacting." Some are trying to appear more human by moving their mouse, delaying between clicks, making themselves evasive to try and avoid detection.

Overall, he says, researchers didn't notice trends specific to airline size or location. "It's really unique to that airline — whether it's a flight route they have or the nature of how they created their websites," he explains.

The past few months have been rough on airline cybersecurity. Last month, Hong Kong-based Cathay Airlines suffered the largest breach of any carrier to date when attackers compromised information belonging to 9.4 million passengers. A cyberattack on British Airways exposed the data of 380,000 customers; shortly after, the airline found 185,000 additional victims were hit.

Related Content:

 

Black Hat Europe returns to London Dec. 3-6, 2018, with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned
Nicole Sette, Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps,  11/19/2019
6 Top Nontechnical Degrees for Cybersecurity
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/21/2019
Anatomy of a BEC Scam
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/21/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15593
PUBLISHED: 2019-11-22
GitLab 12.2.3 contains a security vulnerability that allows a user to affect the availability of the service through a Denial of Service attack in Issue Comments.
CVE-2019-16285
PUBLISHED: 2019-11-22
If a local user has been configured and logged in, an unauthenticated attacker with physical access may be able to extract sensitive information onto a local drive.
CVE-2019-16286
PUBLISHED: 2019-11-22
An attacker may be able to bypass the OS application filter meant to restrict applications that can be executed by changing browser preferences to launch a separate process that in turn can execute arbitrary commands.
CVE-2019-16287
PUBLISHED: 2019-11-22
An attacker may be able to leverage the application filter bypass vulnerability to gain privileged access to create a file on the local file system whose presence puts the device in Administrative Mode, which will allow the attacker to executed commands with elevated privileges.
CVE-2019-18909
PUBLISHED: 2019-11-22
The VPN software within HP ThinPro does not safely handle user supplied input, which may be leveraged by an attacker to inject commands that will execute with root privileges.