AkiraBot: An AI-Powered Web Spam Tool

Summary

CRIL reviewed a blog post by SentinelOne describing AkiraBot, a new tool for sending spam through website contact forms and chat widgets, mostly targeting small and mid-sized businesses. It uses AI to create custom messages that promote a shady SEO service, making each message look different to avoid spam filters. The tool also rotates the websites it links to, which helps it stay under the radar.

AkiraBot is designed to bypass CAPTCHA protection and hide its traffic using proxy services often used by advertisers but also misused by cybercriminals. Although the name might suggest otherwise, AkiraBot has no connection to the Akira ransomware group—it just uses "Akira" as part of its fake SEO brand.

Technical Analysis

AkiraBot, active since at least September 2024, is a Python-based spam tool originally known as "Shopbot" for targeting Shopify websites. It later expanded to target platforms like GoDaddy, Wix, and Squarespace, primarily used by small to medium-sized businesses.

AI-Generated Spam Content

The bot uses GPT-4o-mini via OpenAI’s API to generate unique, context-aware messages by scraping content from target sites using BeautifulSoup. These messages are posted to contact forms and live chat widgets (e.g., Reamaze) to promote shady SEO services under the names “Akira” and “ServiceWrap.”

CAPTCHA Evasion

AkiraBot includes advanced CAPTCHA bypass techniques using headless Chrome, Selenium, and injected JavaScript. It modifies browser fingerprints to mimic real users and defeats reCAPTCHA, hCAPTCHA, and Cloudflare protection using services like Capsolver and NextCaptcha.

Proxy Usage and Network Evasion

The tool routes its traffic through SmartProxy, helping it hide its origin and rotate IP addresses to avoid detection. All versions analyzed use the same proxy credentials, indicating a single actor behind the operation.

Logging and Monitoring

Spam attempts and outcomes are logged in CSV and TXT files. Telegram bots are used to report metrics, manage proxy rotations, and update CAPTCHA bypass statuses in real time using monitor.py scripts and JavaScript injections.

Scale of Operations

As of January 2025, logs showed over 420,000 targeted domains, with more than 80,000 successful spam submissions. Only about 11,000 failed attempts were recorded.

Infrastructure and Domain Analysis

Spam domains are frequently rotated. Older domains like akirateam[.]com and goservicewrap[.]com were tied to known malicious infrastructure, including malvertising campaigns and banking trojans. There are suspicious connections to unj[.]digital, a digital marketing firm.

Fake Reviews and SEO Branding

Trustpilot reviews for “Akira” and “ServiceWrap” suggest review manipulation. Many 5-star reviews follow a consistent style, likely AI-generated, to build legitimacy. Some 1-star reviews accuse the services of spamming or being fraudulent.

Key Technical Details of the AkiraBot Campaign

CategoryDetails
Target PlatformsShopify, GoDaddy, Wix, Squarespace, general contact forms
Primary TargetsSmall and medium-sized business websites
Spam MethodWebsite contact forms and Reamaze chat widgets
Message GenerationUses OpenAI GPT-4o-mini with scraped site content via BeautifulSoup
CAPTCHA EvasionHeadless Chrome, Selenium, inject.js, CAPTCHA-solving services like Capsolver, etc.
Proxy UsageUses SmartProxy with the same credentials across all versions
Spam LoggingLogs to CSV/TXT files; over 420,000 domains targeted, ~80,000 successful submissions
Monitoring ToolsTelegram bots for tracking, proxy rotation via iproxyonline
GUI FeaturesSupports multi-threading, target selection, and result tracking
Domain InfrastructureUses rotating domains like akirateam[.]com, linked to known spam/malvertising hosts
Review ManipulationLikely fake Trustpilot reviews for Akira/ServiceWrap to boost legitimacy
Detected ArchivesMultiple versions with varied names (e.g., shopbotpyv2, wixbot, NextCaptchaBot-v6)
Operating SystemLikely Windows Server (based on admin path usage)

Recommendations

  • Deploy content filtering systems enhanced with AI/ML to flag unusual or synthetic message patterns. Combine this with monitoring tools that alert on form/chat misuse or sudden spikes in message volume.

  • Update blocklists regularly with domains associated with Akira and ServiceWrap SEO spam campaigns. Use domain reputation services and threat intelligence feeds to flag suspicious links.

  • Apply strict rate-limiting on contact forms and chat widgets and deploy bot detection tools that can identify abnormal behaviors such as rapid submissions or unusual browser fingerprints.

  • Use advanced and adaptive CAPTCHA solutions like reCAPTCHA Enterprise or hCAPTCHA Pro and regularly update configurations to detect headless browser traffic and automation frameworks like Selenium.

Conclusion

AkiraBot is a rapidly evolving spam framework that continues to adapt to new website platforms and defenses. Its advanced CAPTCHA bypass techniques show the operator’s strong intent to exploit online services at scale. The use of AI-generated spam messages makes detection harder, as each message is unique. The most consistent indicators for blocking remain the rotating domains linked to the Akira and ServiceWrap SEO scams.

0
Subscribe to my newsletter

Read articles from FPT Metrodata Indonesia directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

FPT Metrodata Indonesia
FPT Metrodata Indonesia