Most businesses aren’t equipped to thwart attacks by sophisticated bots

Bad Bots
(Image credit: Gonin / Shutterstock)

Internet-borne attacks conducted with malicious bots continue to pose a challenge to most organizations, and put a dent in their revenues, according to a new report.

Kasada conducted research showing that 83% of the companies it surveyed admitted experiencing at least one bot attack within the past year.

Furthermore, despite spending millions of dollars on anti-bot systems, 77% reported that the attacks cost them at least 6% of their revenue, with 39% losing 10% or more. On top of that, 63% claimed that it usually takes over a week to remediate a successful bot attack.

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> Click here to start the survey in a new window <<

In absolute figures, 44% of the respondents say that on average a single bot attack costs their organizations at least $250,000, with a quarter reported losses totaling $500,000 or more.

Evolving bots

The report also shows that companies spent some serious chunk of change to mitigate bot attacks, with 27% spending in excess of $1 million to ensure their operations aren’t disrupted by bots.

However, despite their best efforts, an overwhelming majority of the respondents (80%) agreed that bots were becoming more sophisticated and difficult for their security tools to detect. 

In fact, less than a third (31%) exhibited confidence in their ability to detect new, never seen before bots, with an even smaller group (15%) reporting that their anti-bot solutions remained effective for more than a year after initial deployment.

Respondents indicate that the most difficult types of bot attacks to stop are credential stuffing, account takeover, web scraping, denial of inventory, CAPTCHA defeat, application DDoS, fake account creation, carding, and cracking. 

“More has changed in the bot ecosystem over the past two years than the prior decade. Today’s organizations need a different approach, one that is proactive and constantly adapting alongside attackers,” asserts Sam Crowther, CEO and founder, Kasada.

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Read more
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
IoT’s botnet problem is up 500% – three things admins must do now
Robotic hand clicking on captcha &#039;I am not a robot&#039;.
"A tracking cookie farm for profit" - report claims reCAPTCHA has caused 819 million hours of wasted human time, and billions in Google profits
Best email services: image of email with one unread message alert
Over 400 million unwanted and malicious emails were received by businesses in 2024
Security padlock in circuit board, digital encryption concept
Rising cost of breaches forces organizations to rethink cybersecurity
Android phone malware
Over 25 new malware variants created every single hour as smart device cyberattacks more than double in 2024
security
The true cost of a security breach
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)