Skip to Content Facebook Feature Image

Artificial Intelligence Fuels Rise of Hard-to-Detect Bots That Now Make up More Than Half of Global Internet Traffic, According to the 2025 Imperva Bad Bot Report

News

Artificial Intelligence Fuels Rise of Hard-to-Detect Bots That Now Make up More Than Half of Global Internet Traffic, According to the 2025 Imperva Bad Bot Report
News

News

Artificial Intelligence Fuels Rise of Hard-to-Detect Bots That Now Make up More Than Half of Global Internet Traffic, According to the 2025 Imperva Bad Bot Report

2025-04-15 15:00 Last Updated At:15:11

MEUDON, France--(BUSINESS WIRE)--Apr 15, 2025--

Thales, the leading global technology and security provider, today announced the release of the2025 Imperva Bad Bot Report, a global analysis of automated bot traffic across the internet. This year’s report, the 12 th annual research study, reveals that generative artificial intelligence (AI) is revolutionizing the development of bots, allowing less sophisticated actors to launch a higher volume of bot attacks with increased frequency. Today’s attackers are also leveraging AI to scrutinize their unsuccessful attempts and refine techniques to evade security measures with heightened efficiency, amidst a growing Bots-As-A-Service (BaaS) ecosystem of commercialized bot services.

This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20250415432215/en/

Automated bot traffic surpassed human-generated traffic for the first time in a decade, constituting 51% of all web traffic in 2024. This shift is largely attributed to the rise of AI and Large Language Models (LLMs), which have simplified the creation and scaling of bots for malicious purposes. As AI tools become more accessible, cyber criminals are increasingly leveraging these technologies to create and deploy malicious bots which now account for 37% of all internet traffic – a significant increase from 32% in 2023. This is the sixth consecutive year of growth in bad bot activity, posing security challenges for organizations striving to safeguard their digital assets.

Both the Travel and the Retail sectors face an advanced bot problem, with bad bots making up 41% and 59% of their traffic respectively. In 2024, the travel industry became the most attacked sector, accounting for 27% of all bot attacks, up from 21% in 2023. The most notable shift in 2024 is the decline in advanced bot attacks targeting the travel industry (41%, down from 61% in 2023) and the sharp increase in simple bot attacks (52%, up from 34%). This shift indicates that AI-powered automation tools have lowered the barriers to entry for attackers, allowing less sophisticated actors to initiate more basic bot attacks. Rather than relying exclusively on sophisticated techniques, cybercriminals are increasingly utilizing high volumes of simpler bots to inundate travel sites, resulting in more frequent and widespread attacks.

The Rise of AI-Driven Bots: A New Era of Cybersecurity Challenges

The emergence of advanced AI tools, including ChatGPT, ByteSpider Bot, ClaudeBot, Google Gemini, Perplexity AI, and Cohere AI, are transforming not just user interactions but also the methods by which attackers execute cyber threats. According to the Imperva Threat Research team, widely used AI tools are being leveraged for cyberattacks, with ByteSpider Bot alone responsible for 54% of all AI-enabled attacks. Other significant contributors include AppleBot at 26%, ClaudeBot at 13%, and ChatGPT User Bot at 6%.

“The surge in AI-driven bot creation has serious implications for businesses worldwide,” said Tim Chang, General Manager of Application Security at Thales. “As automated traffic accounts for more than half of all web activity, organizations face heightened risks from bad bots, which are becoming more prolific every day.”

As attackers become more adept at utilizing AI, they can execute a variety of cyber threats—ranging from DDoS attacks to custom rules exploitation and API violations. While bot-driven attacks have become increasingly sophisticated, they pose significant challenges for detection efforts.

“This year’s report sheds light on the evolving tactics and techniques utilized by bot attackers. What were once deemed advanced evasion methods have now become standard practice for many malicious bots,” Chang said. “In this rapidly changing environment, businesses must evolve their strategies. It's crucial to adopt an adaptive and proactive approach, leveraging sophisticated bot detection tools and comprehensive cybersecurity management solutions to build a resilient defense against the ever-shifting landscape of bot-related threats.”

Bad Bots Targeting API Business Logic Pose Increased Threat to Modern Enterprises

Recent findings from the Imperva Threat Research team reveal a significant surge in API-directed attacks, with 44% of advanced bot traffic targeting APIs. These attacks aren't just limited to overwhelming API endpoints; rather, they target the intricate business logic that defines how APIs operate. Attackers deploy bots specifically designed to exploit vulnerabilities in API workflows, engaging in automated payment fraud, account hijacking, and data exfiltration.

Analysis in the report reveals a deliberate strategy by cyber attackers to exploit API endpoints that manage sensitive and high-value data. Implications of this trend are especially impactful for industries that rely on APIs for their critical operations and transactions. Financial services, healthcare, and e-commerce sectors are bearing the brunt of these sophisticated bot attacks, making them prime targets for malicious actors seeking to breach sensitive information.

APIs serve as the backbone of modern applications, enabling connectivity across services, streamlining operations, and delivering personalized customer experiences at scale. They underpin essential functions such as payment processing, supply chain management, and AI-driven analytics, making them indispensable for enhancing efficiency, accelerating product development, and unlocking new revenue streams.

“The business logic inherent to APIs is powerful, but it also creates unique vulnerabilities that malicious actors are eager to exploit,” Chang said. “As organizations embrace cloud-based services and microservices architectures, it’s vital to understand that the very features that make APIs essential can also leave them susceptible to risk of fraud and data breaches.”

Financial Services, Healthcare, and E-commerce Industries Face Heightened Risk

The 2025 Imperva Bad Bot Report provides an in-depth analysis highlighting the industries most at risk. Financial services, healthcare, and e-commerce are the most affected sectors, industries that rely on APIs for critical operations and sensitive transactions, making them attractive targets for sophisticated bot attacks.

The financial services sector was the most targeted industry for account takeover (ATO) attacks, accounting for 22% of all incidents, followed by Telecoms and ISPs with 18%, and Computing & IT with 17%. Financial Services has long been a prime target for ATO attacks due to the high value of accounts and the sensitive nature of the data at stake. Banks, credit card companies, and fintech platforms possess vast amounts of Personally Identifiable Information (PII), including credit card and bank account details, which can be profitably sold on the dark web. Additionally, the growing proliferation of APIs within the industry has broadened the attack surface, allowing cyber criminals to exploit vulnerabilities such as weak authentication and authorization methods, thereby facilitating account takeovers and data theft.

About the Research

The 12th Annual Imperva Bad Bot Report is based on insights from our Threat Research and Security Analyst Services (SAS) teams. Our analysis draws from data collected from across the Imperva global network in 2024, including the blocking of 13 trillion bad bot requests across thousands of domains and industries. This dataset provides key insights into bot activity to help organizations understand and address the growing risks of automated attacks.

About Thales

Thales (Euronext Paris: HO) is a global leader in advanced technologies for the Defence, Aerospace, and Cyber & Digital sectors. Its portfolio of innovative products and services addresses several major challenges: sovereignty, security, sustainability and inclusion.

The Group invests more than €4 billion per year in Research & Development in key areas, particularly for critical environments, such as Artificial Intelligence, cybersecurity, quantum and cloud technologies.

Thales has more than 83,000 employees in 68 countries. In 2024, the Group generated sales of €20.6 billion.

PLEASE VISIT
Thales Group
Cybersecurity Products
Cybersecurity Solutions

©Thales

©Thales

LONDON (AP) — British police said Sunday they are investigating whether a string of arson attacks on Jewish sites in London are the work of Iranian proxies.

The Metropolitan Police force says counterterror officers are probing the attacks on synagogues and other sites linked to the Jewish community, as well as an attack on a Persian-language media company.

No one has been injured in the blazes, the latest of which caused minor damage to a north London synagogue on Saturday night.

Deputy Assistant Commissioner Vicki Evans said the attacks had been claimed online by a group calling itself Harakat Ashab al-Yamin al-Islamia.

“We are aware of public reporting that suggests this group may have links to Iran. As you would expect, we will continue to explore that question as our investigation evolves," she said.

“I’ve spoken previously about the Iranian regime’s use of criminal proxies, and we’re considering whether this tactic is being used here in London," she added.

Israel’s government has described Harakat Ashab al-Yamin al-Islamia, whose name means the Islamic Movement of the Companions of the Right, as a recently founded group with suspected links to “an Iranian proxy” that has also claimed responsibility for synagogue attacks in Belgium and the Netherlands.

The police force has extra uniformed and plainclothes officers to northwest London after attacks in the past month on synagogues, Jewish charity ambulances and a Persian-language media organization critical of Iran’s government.

A blaze that damaged Kenton United Synagogue on Saturday night follows a series of fires targeting Jewish-linked premises and an Iranian opposition outlet that are being investigated by counterterror police. In the most serious incident, four ambulances belonging to a Jewish charity were torched on March 23 in the Golders Green neighborhood,

No one has been injured in any of the incidents, which all happened within a few miles of each other. Several people, ranging in age from teens to people in their 40s, have been arrested and charged.

Chief Rabbi Ephraim Mirvis said on X that “a sustained campaign of violence and intimidation against the Jewish community of the UK is gathering momentum.

“Thank God, no lives have been lost, but we cannot, and must not, wait for that to change before we understand just how dangerous this moment is for all of our society,” he added.

Prime Minister Keir Starmer said he was “appalled” by the attacks, and pledged that "those responsible will be found and brought to justice.”

Harakat Ashab al-Yamin al-Islamia also posted a video claiming Israel’s London embassy was going to be attacked with drones carrying dangerous substances. Police said the embassy was not attacked, but the force shut the nearby Kensington Gardens park on Friday as officers examined discarded items including two jars containing powder. Police said nothing harmful was found.

The U.K. has accused Iran of using criminal proxies to conduct attacks on European soil targeting opposition media outlets and the Jewish community. Britain’s MI5 domestic intelligence service says that more than 20 “potentially lethal” Iran-backed plots were disrupted in the year to October.

Some security experts say Harakat Ashab al-Yamin al-Islamia is likely a flag of convenience rather than a coherent group, and its claims should be treated with caution.

Metropolitan Police Deputy Commissioner Matt Jukes said any “thugs for hire” who carried out such attacks would face justice.

“Let’s be really clear — it’s a mug’s game,” he said. “That’s what people who are now serving long prison sentences have found out, and the same fate awaits those responsible for these recent crimes.”

FILE - A sign stands in front of the New Scotland Yard, the headquarters of the London Metropolitan Police, in London, Sept. 25, 2023. (AP Photo/Kin Cheung, File)

FILE - A sign stands in front of the New Scotland Yard, the headquarters of the London Metropolitan Police, in London, Sept. 25, 2023. (AP Photo/Kin Cheung, File)

Police officers patrol at a cordon near Kenton United Synagogue in Harrow, a suburb of London, Sunday, April 19, 2026. (Jamie Lashmar/PA via AP)

Police officers patrol at a cordon near Kenton United Synagogue in Harrow, a suburb of London, Sunday, April 19, 2026. (Jamie Lashmar/PA via AP)

Recommended Articles