Top 12 Malicious Botnet Activities

Top 12 Malicious Botnet Activities (2026)

In 2026, botnet activity is focused on identity and API abuse. Here’s a link to my recent March 2026 report on botnet and DDoS activity in New Zealand. This is a technical foray into one aspect of site security. For strategy on mitigation with real-world NZ case studies, see the DDoS Attacks: Real-World New Zealand Case Studies guide. Go here for DDoS protection and mitigation services.

The share of malicious automated traffic across global networks like Cloudflare is as follows: (Source: Deep Research: Gemini AI 9 March 2026)

RankBot Activity Type% of Malicious TrafficPrimary Attack Scenario
1Layer 7: Exploiting broken object-level authorisation.35%Layer 7: Rapid logins via /wp-login.php or API endpoints.
2DDoS (Volumetric)18%Layer 3/4: UDP/ICMP floods to knock the server offline.
3Web Scraping (Aggressive)12%Layer 7: High-frequency GET requests to steal pricing/content.
4Vulnerability Scanning10%Layer 7: Probing for known CVEs (e.g., Log4j, MoveIt).
5Inventory Hoarding6%Layer 7: Holding items in carts (Denial of Inventory).
6Ad Fraud / Click Fraud5%Layer 7: Mimicking humans to drain PPC budgets.
7Spam/Form Submission4%Layer 7: POST requests to contact/comment forms.
8API Abuse3%Layer 7: Exploiting broken object-level authorization.
9Account Takeover (ATO)2.5%Layer 7: Targeted brute force on high-value accounts.
10Carding/Card Stuffing2%Layer 7: Testing stolen CC info on checkout pages.
11SEO Spam1.5%Layer 7: Injecting malicious backlinks into CMS databases.
12Cryptojacking1%Layer 7/Infection: Remote code execution to run miners.

Item added to cart.
0 items - $0.00