AkiraBot Exploits AI to Spam Over 420,000 Websites, Circumventing CAPTCHA Protections

In a significant development within the cybersecurity landscape, researchers have uncovered an artificial intelligence-driven platform named AkiraBot. This sophisticated tool has been systematically spamming website chats, comment sections, and contact forms to promote dubious search engine optimization (SEO) services, notably Akira and ServicewrapGO.

Since its inception in September 2024, AkiraBot has targeted over 420,000 websites, successfully infiltrating at least 80,000 of them. The bot leverages OpenAI’s large language models (LLMs) to generate customized outreach messages tailored to the specific content and purpose of each targeted website. This approach not only enhances the relevance of the spam messages but also increases the likelihood of evading traditional spam filters.

Targeted Platforms and Evolution

Initially dubbed Shopbot, AkiraBot began by focusing on websites utilizing the Shopify platform. Over time, its scope expanded to include sites developed with GoDaddy, Wix, Squarespace, and those featuring generic contact forms and live chat widgets, such as those built using Reamaze. This broad targeting indicates a strategic effort to exploit a wide range of small to medium-sized business websites.

Operational Mechanics

At the core of AkiraBot’s operation is its ability to generate spam content through the OpenAI API. The tool provides a graphical user interface (GUI) that allows operators to select target websites and determine the number of concurrent targets. By processing templates containing generic message outlines, AkiraBot crafts customized outreach messages based on the specific content of each website. This process involves sending prompts to the OpenAI chat API, which utilizes the gpt-4o-mini model, designated as a helpful assistant that generates marketing messages.

Bypassing CAPTCHA and Evasion Techniques

A notable feature of AkiraBot is its capability to circumvent CAPTCHA protections, including hCAPTCHA, reCAPTCHA, and Cloudflare Turnstile. The bot achieves this by mimicking legitimate user behavior and employing various proxy hosts from services like SmartProxy to obscure the origin of its traffic. This sophisticated evasion strategy enables AkiraBot to spam websites at scale while avoiding detection by network-based security measures.

Logging and Metrics

AkiraBot maintains detailed logs of its activities in a file named submissions.csv, recording both successful and failed spam attempts. Analysis of these logs has revealed the extensive reach of the bot, with over 420,000 unique domains targeted to date. Additionally, the bot collects success metrics related to CAPTCHA bypass and proxy rotation, which are then posted to a Telegram channel via API.

Response and Implications

In response to these findings, OpenAI has disabled the API key and other associated assets used by the threat actors behind AkiraBot. This action underscores the ongoing challenges posed by AI-driven tools in the realm of cybersecurity. The significant effort invested in AkiraBot’s ability to bypass commonly used CAPTCHA technologies demonstrates the operators’ motivation to violate service provider protections.

The emergence of AkiraBot highlights the evolving threats that artificial intelligence poses to website security. As AI technologies become more accessible, malicious actors are increasingly leveraging them to automate and enhance their attacks. This development calls for a reevaluation of existing security measures and the implementation of more robust defenses against AI-powered threats.