A sophisticated bot employs OpenAI to bypass filters, inundating more than 80,000 websites with spam
AkiraBot uses OpenAI to spam over 80,000 websites, bypassing filters.

AkiraBot is a Python-based sophisticated spam framework leveraging OpenAI's chat API and BeautifulSoup to scrape and send AI-generated, personalized messages. This approach easily bypasses spam detection filters that typically identify repetitive templates, delivering its payload to over 80,000 websites in just four months. The targeted websites are primarily small and medium-sized businesses, with AkiraBot promoting services related to dubious SEO under the brands 'Akira' and 'ServiceWrap.' Its operational sophistication is evident in the use of Selenium WebDriver to simulate legitimate user browsing alongside scripts like inject.js, which manipulate browser attributes, thus circumventing CAPTCHA systems including hCAPTCHA and reCAPTCHA.
Proxy services like SmartProxy enhance AkiraBot's network evasion capabilities by diversifying its traffic sources, preventing IP-based restrictions from impacting its efforts. Archives uncovered by SentinelLabs date the evolution of AkiraBot back to September 2024 when it was initially called 'Shopbot' and focused mainly on Shopify-based websites. Today, AkiraBot targets various platforms such as Wix, Squarespace, and GoDaddy, all popular among small business owners. Users can monitor the success of campaigns and adjust settings using the framework's graphical interface, enabling concurrent targeting of multiple sites.
The campaign reveals the dual-use nature of large language models; while they enable advancements in communication and automation, they can also empower malicious actors. SentinelLabs reported that AkiraBot failed on approximately 11,000 of the 420,000 unique domains it attempted to target, revealing the bot's tenacity. OpenAI took immediate action when notified, disabling AkiraBot’s API key and reiterating its policy against the unauthorized generation of spam through its services. The company assured that it constantly updates its systems to flag such abuses, highlighting its commitment.
The incident underscores the need for stronger defenses as adversaries gain access to more complex and powerful tools like AkiraBot. SentinelLabs cautions that the bot's operators will likely refine their strategies as they respond to evolving defensive measures. They warned that reliance on CAPTCHA bypass technologies and proxy rotation signifies an advanced understanding and determination on the part of these operators.
This case exemplifies the risks associated with GenAI and LLMs, as demonstrated by AkiraBot’s abuse of OpenAI’s capabilities. Companies facing such threats must adapt and reinforce protective countermeasures to rectify and defend against such sophisticated attacks. SentinelLabs and OpenAI's prompt interventions demonstrate the type of proactive partnerships required to mitigate advanced AI-enhanced cyber threats.
Sources: TechSpot, SentinelLabs