A technology company noticed a disturbing increase in malicious activity across their platform. Unknown individuals were selling bots that claimed to automate interactions with their platform and provide those that purchased the app an advantage over other users.
This case study details out how the illegitimate activity was terminated and how the threat actors identified.