The web is broken, IMHO
So there is a (IMHO) shady market out there that gives app developers on iOS, Android, MacOS and Windows money for including a library that sells users network bandwidth. Infatica [1] is just one example, there are many more.
I am 99% sure that these companies cause what effectively are DDoS attacks that many webmasters have to deal with since months. This business model should simply not exist. Apple, Microsoft and Google should act.
1/8
[1] infatica.io/sdk-monetization/
Infatica SDK: Monetize Extensions, Mobile and Desktop Apps & Games | Infatica
Monetize your mobile and desktop software and Chrome extensions without ads and complex methods. Simply join Infatica SDK to increase your income.Infatica
Dieser Beitrag wurde bearbeitet. (1 Tag her)
teilten dies erneut
Jan Wildeboer 😷
Als Antwort auf Jan Wildeboer 😷 • • •What these companies then sell to *their* customers is network access through the devices/PCs that have an app with this SDK installed. They are proud to tell you how you can funnel your (AI) web scraping etc through millions of rotating, residential and mobile IP addresses. Exactly the pattern we see hitting our servers.
infatica.io/pricing/
2/8
Residential & Mobile Proxies Price - Buy The Cheapest Proxy | Infatica
InfaticaJan Wildeboer 😷
Als Antwort auf Jan Wildeboer 😷 • • •Now, again, this company is just one of many selling similar services. And they all promise that they carefully check what commands their customers send to the (IMHO) infected apps on your phone and PC. Yeah, I am sure they "do no evil". And when they do, they can claim it's not their problem because they are merely the proxy. Again, IMHO, a shady business model.
3/8
Jan Wildeboer 😷
Als Antwort auf Jan Wildeboer 😷 • • •But this explains the explosion of bot traffic that really cripples a lot of smaller services (like my forgejo instance, that I had to make non-public).
So if you include such an SDK in your app to make some money — you are part of the problem and I think you should be punished for that. You are delivering malware to your users, making them botnet members.
Unfortunately it is next to impossible for normal users to detect the inclusion of such shady SDKs and the network traffic they cause.
4/8
Jan Wildeboer 😷
Als Antwort auf Jan Wildeboer 😷 • • •I already blogged about this at jan.wildeboer.net/2025/02/Bloc…
I might rewrite that blog post to make the problem clearer. And to explain why I am now of the opinion that *every* form of web-scraping should be considered abusive. If you think your web-scraping is acceptable behaviour, you can thank these shady companies and the "AI" hype for moving you to the bad corner.
TL;DR certain companies recruit app developers to create botnets. Botnets are malware. Period.
The web is broken, IMHO.
5/8
Those stealthy Botnets
Jan Wildeboer (Jan Wildeboer's Blog)Hazel Brenado
Als Antwort auf Jan Wildeboer 😷 • • •Everything from the "AI" scrapers, that endlessly hammer endpoints which no longer exist, as well as one's that do, to bots trying to hit variations of ".git/config" or "admin.php". There's also been some somewhat more insinuous behavior, which I believe to be looking for endpoints susceptible to ddos attacks. (probing for pages with high server response time and without caching). I very much agree, the "AI" scraping, and all that, has fundamentally broken the internet that I knew.
SciOp - Public Information Preservation
sciop.netJan Wildeboer 😷
Als Antwort auf Jan Wildeboer 😷 • • •Addendum: Trend Micro did some research on these companies back in 2023 and it confirms my suspicions. And I guess with AI scraping this kind of business is booming. For the paranoid:
„There are malicious actors who repacked freeware and shareware written by other people to conduct drive-by downloads of the Infatica peer-to-business (P2B) service“
trendmicro.com/vinfo/ae/securi…
6/8
A Closer Exploration of Residential Proxies and CAPTCHA-Breaking Services | Trend Micro (AE)
Trend Micro - Middle East and North Africa (AE)Jan Wildeboer 😷
Als Antwort auf Jan Wildeboer 😷 • • •Addendum 2: If you want to feel really dirty, go to proxyway.com/reviews?e-filter-… for a collection of reviews on these services. It's a huge market and I am 100% convinced that "AI" web scraping is currently the biggest "growth" driver for these companies.
And when I see that quite some of them rely on injecting SDKs into 3rd party apps to "extend" their "Reach", I would call these "residential proxy providers" malware/botnets. But that's just my personal opinion. I am sure they are all legit.
7/8
Larvitz
Als Antwort auf Jan Wildeboer 😷 • • •Oh my ... For me, that's just another good reason to avoid proprietary software as much as possible.
I had to lockdown multiple of my personal services and put them behind VPNs, because that bot traffic simply got too much during the past year.
Jan Wildeboer 😷
Als Antwort auf Jan Wildeboer 😷 • • •If you've made it to this final post of this thread — thank you for your time and interest! I hope it helps you understand why web crawlers have become a real problem and how this is more and more an attack on the foundation of the Web as it was intended to be. This "residential proxy" business is just one part of this. And we webmasters/admins can only try to block. It is getting more and more difficult to keep up with these waves. Thanks "AI"!
I will convert this thread to a blog post.
8/8
Larvitz
Als Antwort auf Jan Wildeboer 😷 • • •It's a big problem. I run some serious infrastructure (6 really beefy servers, hosted in a Colocation datacenter in my own rack) and had to put some mitigations in place in order to keep up with the increasing computing resource drain:
- Putting services behind VPN gateways
- Moving public repositories from my own Forgejo instance to Codeberg
- Using static site generators like Jekyll instead of CMS systems
But I hate it, that those things are nessecary. My personal code-repo server was openly available on the net since CVS pserver days in the early 2000s and now I basically have to put it on a private network.
Kevin Neely :donor:
Als Antwort auf Jan Wildeboer 😷 • • •Jan Wildeboer 😷
Als Antwort auf Kevin Neely :donor: • • •Kevin Neely :donor:
Als Antwort auf Jan Wildeboer 😷 • • •Jan Wildeboer 😷
Als Antwort auf Jan Wildeboer 😷 • • •The Web is Broken — Botnet Part 2
Jan Wildeboer (Jan Wildeboer's Blog)dusoft
Als Antwort auf Jan Wildeboer 😷 • • •Jan Wildeboer 😷
Als Antwort auf dusoft • • •dusoft
Als Antwort auf Jan Wildeboer 😷 • • •Jan Wildeboer 😷
Als Antwort auf dusoft • • •benjo
Als Antwort auf Jan Wildeboer 😷 • • •not sure it is listed on it but a tool such as @exodus may be able to detect if the Infatica SDK is embedded in an app binary.
Edit: didn't find this specific sdk on reports.exodus-privacy.eu.org/… but I guess detection rules could be added to their detection engine
Pisteurs
εxodusJona Joachim
Als Antwort auf Jan Wildeboer 😷 • • •Lyrial
Als Antwort auf Jan Wildeboer 😷 • • •Jan Wildeboer 😷
Als Antwort auf Lyrial • • •Gina Häußge
Als Antwort auf Lyrial • • •@lyrial They approached me earlier this year (and have since been ghosted and blocked for good), and yes, they tell potential future collaborators to just add their SDK and some lines to the TOS and that's all, nothing to worry about, all fine.
Fscking disgusting.
Lyrial
Als Antwort auf Gina Häußge • • •Jan Wildeboer 😷
Als Antwort auf Lyrial • • •Gina Häußge
Als Antwort auf Jan Wildeboer 😷 • • •Mania Emma
Als Antwort auf Jan Wildeboer 😷 • • •F4GRX Sébastien
Als Antwort auf Jan Wildeboer 😷 • • •Kay Ohtie, Bat-Yote!
Als Antwort auf Jan Wildeboer 😷 • • •AliveDevil
Als Antwort auf Jan Wildeboer 😷 • • •Do you know whether there’s a list of domains for this service, which could be domain blocked?
Jan Wildeboer 😷
Als Antwort auf AliveDevil • • •Christian Sievers
Als Antwort auf Jan Wildeboer 😷 • • •Steve Purcell
Als Antwort auf Jan Wildeboer 😷 • • •Jan Wildeboer 😷
Als Antwort auf Steve Purcell • • •Frehi
Als Antwort auf Jan Wildeboer 😷 • • •Jan Wildeboer 😷
Als Antwort auf Frehi • • •KarmicResonance
Als Antwort auf Jan Wildeboer 😷 • • •Dave Borghuis
Als Antwort auf Jan Wildeboer 😷 • • •mirage iii fan account
Als Antwort auf Jan Wildeboer 😷 • • •Jan Wildeboer 😷
Als Antwort auf mirage iii fan account • • •CBinNYC
Als Antwort auf Jan Wildeboer 😷 • • •peterfisherbooks-> free scify!
Als Antwort auf Jan Wildeboer 😷 • • •i like black boxes e.g. iot things and tv as prime culprits for loading such bandwidth abusing sdk and thanks for being there filling us in letting us know we've all been abused via monitization. again.
Nathan Metzger
Als Antwort auf Jan Wildeboer 😷 • • •ednl 🇪🇺
Als Antwort auf Jan Wildeboer 😷 • • •Tessa
Als Antwort auf Jan Wildeboer 😷 • • •Hazelnoot
Als Antwort auf Jan Wildeboer 😷 • • •Abi
Als Antwort auf Hazelnoot • • •Jan Wildeboer 😷
Als Antwort auf Abi • • •Jeroen Massar
Als Antwort auf Jan Wildeboer 😷 • • •This is why many folks are deploying anubis.techaro.lol -- kernel.org, FFPMEG, FreeBSD, SourceHut, heck /me, and even UNESCO deployed[1] it to lighten that load and get rid of all the AI scrapers but also these botnets through residential IPs.
Yes, constructs with "VPNs" (that share the endpoint of the user that wanted protection) and rackets like libraries, criminals they are, but that is the Advertising&AI world....
[1] = anubis.techaro.lol/docs/user/k…
Anubis: self hostable scraper defense software | Anubis
anubis.techaro.lolargv minus one
Als Antwort auf Jan Wildeboer 😷 • • •Do these scrapers send non-GET requests, by any chance?
I wonder if we should redefine GET as being only for requests that are not only idempotent but also inexpensive.
Jan Wildeboer 😷
Als Antwort auf argv minus one • • •chipiguay - Pablo 😴
Als Antwort auf Jan Wildeboer 😷 • • •