Skip to content
Tiatra, LLCTiatra, LLC
Tiatra, LLC
Information Technology Solutions for Washington, DC Government Agencies
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact
 
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact

The AI revolution fueling the bot epidemic

The rise of easily accessible AI technologies has dramatically lowered the bar for cybercriminals, enabling them to create and deploy malicious bots faster and at greater scale than ever before. Generative AI (GenAI) has made it simpler to build and refine bots, accelerating the evolution of automated threats. With AI’s help, these bots are becoming more sophisticated, more numerous, and far better at concealing their activities to evade detection.

Attackers are now using AI not just to launch attacks, but also to analyze failed attempts—learning and adapting in real time. This constant refinement makes AI-powered bots increasingly elusive and dangerous, posing a growing threat to organizations across every sector.

Automated traffic now outpaces human users

As automated activity surges, security teams face an urgent need to rethink their defenses. They are no longer fighting only human adversaries—bots are now a dominant force online.

According to the 2025 Imperva Bad Bot Report from Thales, titled “The Rapid Rise of Bots and The Unseen Risk for Business,” automated traffic surpassed human activity for the first time in a decade, accounting for 51% of all internet traffic in 2024. The explosive adoption of AI and large language models (LLMs) has been the primary driver behind this shift.

This growing wave of AI-driven automation has serious implications. As bots make up more than half of online activity, businesses are facing mounting risks from malicious automation that continues to escalate in both scale and complexity.

The Thales report also found that bad bot traffic increased for the sixth consecutive year, representing 37% of total web traffic, up sharply from just over 30% in 2023.

The growing sophistication of bot attacks

In 2024, “advanced and moderate” bots made up 55% of all attacks, using tactics that closely mimic human behavior and bypass traditional defenses. Detecting and stopping them has become significantly harder as they blend into legitimate traffic.

At the same time, simple, high-volume attacks surged—rising from 40% in 2023 to 45% of all bot activity last year. This trend is largely fueled by the widespread availability of AI automation tools, which allow even less-skilled attackers to execute bot-driven campaigns with minimal effort.

The Thales report also noted that 31% of all attacks it detected and blocked were automated, aligning with the OWASP 21 Automated Threats classification, which targets web applications at scale, exploits vulnerabilities, and evades security measures across industries.

APIs: The new front line against bad bots

APIs are now the backbone of modern digital ecosystems, powering innovation, automation, and seamless integrations across services. But that same ubiquity has made them a favorite target for attackers.

Thales’ data shows that 44% of advanced bot traffic was aimed at APIs in 2024. Malicious actors exploit API endpoints to steal data, commit fraud, or bypass controls.

“APIs are vital to business agility and innovation, but their inherent logic creates unique weaknesses that attackers are quick to exploit,” said Chang. “As companies expand their use of cloud and microservices architectures, it’s critical to understand that these same strengths can introduce new risks.”

Residential proxies: Disguising malicious traffic

Cybercriminals increasingly rely on residential proxies to disguise bot traffic as legitimate human activity. By routing attacks through household IP addresses, they make it far more difficult for security systems to tell friend from foe.

Thales found that 21% of all bot attacks leveraged residential proxies from ISPs, allowing threat actors to blend seamlessly with authentic users and evade detection tools.

AI-driven account takeover on the rise

Account Takeover (ATO) attacks have climbed sharply, up 40% year over year and 54% over the past three years. This surge is linked to the growing use of AI and machine learning to automate credential stuffing and phishing—making attacks faster, smarter, and harder to detect.

The financial services sector bore the brunt of these ATO attempts, accounting for 22% of all incidents, followed by Telecoms and ISPs (18%) and Computing/IT (17%).

The double-edged sword of generative AI

Generative AI platforms such as ChatGPT, ByteSpider Bot, ClaudeBot, Google Gemini, Perplexity AI, Cohere AI, and Apple Bot have transformed how people learn, work, and create. But they have also introduced a new wave of cyber risk.

While these tools enhance productivity, threat actors are exploiting them as powerful new attack vectors. Notably, ByteSpider Bot accounted for a staggering 54% of GenAI-enabled attacks, highlighting how AI’s democratization is reshaping both innovation and cybercrime alike.

Visit us to download your copy of the 2025 Bad Bot Report.


Read More from This Article: The AI revolution fueling the bot epidemic
Source: News

Category: NewsNovember 4, 2025
Tags: art

Post navigation

PreviousPrevious post:“사람의 변화가 성공의 핵심” AI 에이전트를 위한 변화 관리 가이드NextNext post:SAP shakes up its certification process

Related posts

花王の情報システムセンター長が語る「デジタル戦略のやりがいや魅力」とは
November 10, 2025
生成AIの企業導入と活用──現場から見える組織変革のリアルと未来
November 10, 2025
Capgemini’s legacy tech fallout inspires integration blitz
November 10, 2025
Beyond uptime: Why multi-cloud resilience must be designed, not assumed
November 10, 2025
3 unfiltered lessons from reinventing AI risk governance
November 10, 2025
The enterprise IT overhaul: Architecting your stack for the agentic AI era
November 10, 2025
Recent Posts
  • 生成AIの企業導入と活用──現場から見える組織変革のリアルと未来
  • 花王の情報システムセンター長が語る「デジタル戦略のやりがいや魅力」とは
  • Capgemini’s legacy tech fallout inspires integration blitz
  • Beyond uptime: Why multi-cloud resilience must be designed, not assumed
  • 3 unfiltered lessons from reinventing AI risk governance
Recent Comments
    Archives
    • November 2025
    • October 2025
    • September 2025
    • August 2025
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    Categories
    • News
    Meta
    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Tiatra LLC.

    Tiatra, LLC, based in the Washington, DC metropolitan area, proudly serves federal government agencies, organizations that work with the government and other commercial businesses and organizations. Tiatra specializes in a broad range of information technology (IT) development and management services incorporating solid engineering, attention to client needs, and meeting or exceeding any security parameters required. Our small yet innovative company is structured with a full complement of the necessary technical experts, working with hands-on management, to provide a high level of service and competitive pricing for your systems and engineering requirements.

    Find us on:

    FacebookTwitterLinkedin

    Submitclear

    Tiatra, LLC
    Copyright 2016. All rights reserved.