What can we learn from #sneakerbots and sneaker culture, as practitioners of security?
The overlap between what is considered security and what is considered not-security is getting blurrier every day, and the line is shifting all of the time in the consumer or product oriented space. It's easy to say "that's a security problem" when your database is breached. It's a bit different when the problem is "some guy in Ohio is buying hundreds of our product and reselling them with markup".
Sneakerbots are just the latest evolution in this type of problem, and many of the best bots in the world right now have overlap in problem space and in some cases methodologies too.
As I mentioned in my part 2 post, bots are getting significantly more advanced in the last 3-5 years. They are now able to replicate actual consumer device behavior by using statistical models to simulate what a real consumer holding their phone looks like to the app/website. A normal person doesn't buy shoes with a 0px screen size or a completely stationary gyroscope, so we'll just simulate an iPhone screen size and generate some random-ish gyro noise that passes the test.
That gets you past the "are you a human" barrier, but what about the "is your account in good standing" barrier? HIBP lists ~645 breaches in their API (thanks Troy!) and I bring that up because it's an indicator of just how many accounts are viable. As the #security industry is well aware, password sharing is common among consumers. Credential stuffing, or the process of pushing compromised credentials from Target A's breach into Target B's website to find hits, will yield a high enough success rate that it can be used for mass purchases. 1% success rate is enough when you have 100m rows to smash against a login page. Even if you bring that down to .1% of successful logins, that's still thousands of accounts that are in good enough standing to make an online purchase. And if they have a gift card balance or stored credit card, well now you're in business for free.
This type of behavior has heavy overlap with gift card fraud/abuse, as well as credit card fraud. If an attacker finds a good account and a website that is poorly designed, they might be able to shove some CC numbers against that verification API to see which ones are still working for their other theft schemes.
But where are they getting these accounts and CC numbers? The same place your average profit-driven ransomware operator is. It's all the same accounts, the same places, the same methodology. The only difference is the tool they're using to get the $$$. Many #sneakerbot operators maintain a very similar approach to modern #malware operators too, using Discord servers and intermediary sellers with control panels that put some enterprise software to shame. Bots that actually work are hoarded and kept secret, sold only to the highest bidder or to trusted individuals, while the lower rungs of the sneakerbot ladder are left with lower-tier bots or are forced into the old-fashioned way of trying to backdoor product out of physical stores. Why bother with a bot when you can pay the manager at FootLocker to sneaker 8 pairs out for you. Oh and they're probably 2 decades younger than you.
I'm not entirely sure where I'm going with this, I might wax on it a bit longer in other posts, but what I wanted to highlight here really was that we in #cybersecurity need to pay attention to product more. And that doesn't mean just AppSec. Many of us work for tech-focused companies that have inherently different risk models than a retail company. Take a moment and consider what you would do if you were selling a product that had a guaranteed 10% profit for anyone who resold it. How would you make that fair? Do you even care if it's fair? What decisions are you making? What types of users are you concerned about? What are their markers (age, activity, location, IP, etc)?
Despite that thought experiment as a retail company, certain fundamentals stay the same. Auth is becoming increasingly important. The trustworthiness of any particular user matters. People will, if given an opportunity for profit, abuse your system. Plan for it. Expect it.
Part 3 of ???
That's all for now, I think I've rambled a bit too long already. Hit me up for questions or comments on this type of topic.
#security #infosec #cybersecurity #bots #sneakers #sneakerbots #productsecurity