Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

11/14/2018
02:30 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Airlines Have a Big Problem with Bad Bots

Bad bots account for 43.9% of all traffic on their websites, APIs, and mobile apps, according to a new analysis of 100 airlines.

As airlines are ramping up in preparation of the holiday travel season, bad bots are ramping up their activity on airlines' websites, mobile apps, and APIs. Analysts in the research arm of Distil Networks today published a study called "How Bots Affect Airlines," in which they analyzed 7.4 billion requests from 180 domains on 100 international airlines. They found malicious bots make up 43.9% of all airline web traffic — about double the 21.8% average for all industries. The highest bad bot percentage for one airline? About 94.6%.

In almost 30% of the domains that analysts studied, bad bots made up more than half of all traffic. Most bots (84.3%) on airline domains are moderate or advanced, and harder to detect. The highest proportion of bad bot traffic stems from the US (25.6%), followed by Singapore (15%).

At the core of the problem are airline websites and mobile apps, which serve as the home for flight data presented to customers: seat availability, pricing, booking processes, discounts. Some airlines use their own booking engines; others use third-party services for booking.

Online travel agencies (OTAs) like Expedia and Booking.com are channels designed to sell flights and process payment on behalf of airlines. Under commercial agreements, OTAs can scrape flight data in exchange for fees. Travel aggregators like Kayak and Skyscanner also display flight information but redirect shoppers to airlines' websites to finalize their booking.

Four attack groups deploy bots against airlines: unauthorized OTAs and travel aggregators avoid fees and scrape flight information and fares, then hold seats to resell them later (a process known as "seat spinning"). Competitor airlines also scrape flight data and fares to gain market intelligence and hold seats to block legitimate purchases. Criminals target loyalty programs with account takeover to steal points, and conduct credit card and loyalty program fraud.

Keeping Up with Competition
Airlines are hot targets because the value of the goods they sell has a finite timeline, says Edward Roberts, director of product marketing at Distil Networks. There's only a certain period of time a flight ticket will be valid, and price changes frequently based on destination and departure. Further, an ecosystem of OTAs and aggregators is constantly collecting data.

"The more competitive the market, the more competitive routes you fly, the more bots are competitive," he explains. Every airline has some combination of authorized and unauthorized data scraping on their sites. Bad bots can result in higher fees for third-party booking engines because they make it appear as though far more people are viewing than booking flights.

It's called a "look-to-book" ratio. Every time someone looks at a flight listing and asks "how much," that's considered a look, Roberts says. There should be one flight booked for every 100 looks, a number all airlines measure their progress against. "If that ratio suddenly spikes, you know that's bot behavior," he continues. "That's not human behavior."

The business implications of bad bots are significant, says Roberts. "Information from airlines states the financial cost and burden of this is getting to that point where they're saying 'we actively need to solve this problem because the cost to business is getting too large,'" he adds.

Loyalty rewards programs are hard hit by cybercriminals looking to monetize account access. If they can brute-force credentials and break in, they can steal and monetize points and miles.

"Anecdotally, airlines have a lot of seven-digit fraud coming through loyalty programs that they're concerned about," Roberts points out. Larger airlines typically have more value in their online loyalty program accounts, so those typically see larger amounts of account takeover attacks.

Attackers targeting the airline industry are becoming more advanced over time. Researchers note only 19.7% of airline bots were sophisticated in 2017; this year, the percentage jumped to 31.4%. At the same time, the percentage of simple bots decreased from 27.4% to 15.7%.

"Airlines are trying to deal with the problem, and they're trying to put mitigation in place so they can prevent the volume of bots from attacking them," says Roberts. "The bot operators are reacting." Some are trying to appear more human by moving their mouse, delaying between clicks, making themselves evasive to try and avoid detection.

Overall, he says, researchers didn't notice trends specific to airline size or location. "It's really unique to that airline — whether it's a flight route they have or the nature of how they created their websites," he explains.

The past few months have been rough on airline cybersecurity. Last month, Hong Kong-based Cathay Airlines suffered the largest breach of any carrier to date when attackers compromised information belonging to 9.4 million passengers. A cyberattack on British Airways exposed the data of 380,000 customers; shortly after, the airline found 185,000 additional victims were hit.

Related Content:

 

Black Hat Europe returns to London Dec. 3-6, 2018, with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13991
PUBLISHED: 2020-09-24
vm/opcodes.c in JerryScript 2.2.0 allows attackers to hijack the flow of control by controlling a register.
CVE-2020-15160
PUBLISHED: 2020-09-24
PrestaShop from version 1.7.5.0 and before version 1.7.6.8 is vulnerable to a blind SQL Injection attack in the Catalog Product edition page with location parameter. The problem is fixed in 1.7.6.8
CVE-2020-15162
PUBLISHED: 2020-09-24
In PrestaShop from version 1.5.0.0 and before version 1.7.6.8, users are allowed to send compromised files. These attachments allowed people to input malicious JavaScript which triggered an XSS payload. The problem is fixed in version 1.7.6.8.
CVE-2020-15843
PUBLISHED: 2020-09-24
ActFax Version 7.10 Build 0335 (2020-05-25) is susceptible to a privilege escalation vulnerability due to insecure folder permissions on %PROGRAMFILES%\ActiveFax\Client\, %PROGRAMFILES%\ActiveFax\Install\ and %PROGRAMFILES%\ActiveFax\Terminal\. The folder permissions allow "Full Control" t...
CVE-2020-17365
PUBLISHED: 2020-09-24
Improper directory permissions in the Hotspot Shield VPN client software for Windows 10.3.0 and earlier may allow an authorized user to potentially enable escalation of privilege via local access. The vulnerability allows a local user to corrupt system files: a local user can create a specially craf...