Application Security

[Case Study] Preventing Automated Abuse with Arkose Labs and Jscrambler

November 6th, 2018 | By Jscrambler | 4 min read

Today, more and more security verification needs to be on the client-side.

Jscrambler's resilient client-side protection solution unlocks new technological breakthroughs for several businesses across different sectors.

In this article, we'll explore how Arkose Labs have been leveraging Jscrambler's technology to deliver the most advanced automated abuse prevention solution that is itself resilient to abuse and tampering.

The Importance of Bot Detection

The distinction between human and bot actors has been a concern since the Internet's early days.

Since its inception in 1997, CAPTCHA has become a widespread technology for helping to prevent automated online abuse by hackers and spammers.

In the modern digital landscape, new and highly sophisticated security problems arise, given the prevalence of automated attacks. The most frequent forms of automated abuse include:

  • Account Takeovers: automated injection of breached credential pairs to fraudulently access user accounts;

  • Fake Users: bulk account creation by misusing and automating sign-up processes;

  • Spam: automated distribution of malicious/untrustworthy information in public content, databases or private messages;

  • Carding: multiple payment authorization attempts that verify the validity of stolen gift card data and exploit their value.

  • Blocking Transactions: automated product stock reduction techniques without transactions, to deny inventory for other users;

  • Fake Ratings: artificial inflation of public endorsements and skewing credibility to influence users or undermine reputation;

  • Scraping: automatic extraction of valuable content from websites and unauthorized distribution for financial gain.

Enterprise companies have become appealing targets for these automated attacks. With this need for increased security, Arkose Labs brings a leading bot mitigation technology.

Arkose Labs' Technology

Mitigation-focused strategies that use threat scoring and behavioral analysis are not enough to overcome automated abuse.

Arkose Labs use a bilateral approach that combines their global telemetry with a patent-pending enforcement challenge.

The global telemetry recognizes users across their entire network with an anonymous alphanumeric identifier, which builds a dynamic score that qualifies their risk profile and reputational integrity.

Unrecognized suspicious users go through an enforcement challenge to authenticate their identity and validate the telemetry. The patent-pending enforcement challenge draws upon millions of security images, orchestrated in real-time from three-dimensional models, to present interactive visual subjects that are generated uniquely to that user. This forces attackers to engage expensive counsel on machine vision and machine learning in order to bypass the challenge at scale — rendering attacks uneconomical.

Arkose Labs SchematicThis bilateral approach trains the Arkose Labs telemetry against serving enforcement to legitimate human users — which means no false positives, and zero friction to users. Most importantly, it removes the economic window necessary to commercialize fraud through Brute Force, Sweatshop, Machine Vision, and Single Request Attacks.

Single Request Attacks are specifically relevant, as they facilitate the most advanced automated abuse seen today. Each request is commonly made by a headless browser, executes JavaScript like a legitimate human user, and presents a dynamic client/network fingerprint to conceal the origin. This systematic approach is able to decouple tell tales and obscure critical security breaches. While it bypasses all other bot mitigation products, Arkose Labs’ patent-pending solution successfully stops them.

Jscrambler for a Tamper-Proof Solution

In recent years, we've seen cases of automated abuse technologies being reverse engineered with malicious purposes. Reverse engineering grants attackers a way to circumvent security systems and perform devastating automated attacks.

This is precisely what happened to Google's reCAPTCHA in 2014. Its code was obfuscated by Google's own obfuscation techniques but, because it was static and followed a certain obfuscation pattern, it was reverse-engineered a few days after release, opening the door to automated bypass.

Arkose Labs leverage Jscrambler's leading code protection solution to obfuscate and conceal the logic of their own technology. As so, its technology becomes tamper-proof with the highest level of resilience.

On top of this, Arkose Labs also leverage more advanced protection features that are employed as needed. These advanced features include code locks (preventing the code from running outside a set of allowlisted domains, browsers, dates, and OS'es) and self-defending capabilities.

"We have keys that we encrypt into the client and then the API itself changes. So, when we turn this mode on, if you don't correctly render our JavaScript and can't correctly go through and render our technology in a real browser on one of our customers' websites, the API will deny the input. This is what we can achieve with Jscrambler." — Kevin Gosschalk, Arkose Labs' CEO

With these advanced Jscrambler protection features, Arkose Labs prevent attackers from using simplistic headless browsers such as cURL to bypass their enforcement technology. By closing these client-side doors to exploits, the cost of attacks is driven up to a point where attackers are more likely to give up.

Jscrambler's client-side protections are then able to increase the security of Arkose Labs' technology without changing it or resulting in harder enforcement challenges. Instead, it enforces a secure environment where Arkose Labs' technology is run.

Arkose Labs also gives their code a unique distinction: polymorphic behavior.

By running Jscrambler in their build process, each new Arkose Labs build presents an entirely different code, while keeping the same functionality. As a result, the keys also change — once again driving up the cost of attacks and rendering them uneconomical.

Bottom-line Results

After nearly two years of using Jscrambler's technology, no attacker has been able to reverse-engineer Arkose Labs' code, even in highly sophisticated attack scenarios.

In the recent joint Webinar with Jscrambler and Arkose Labs, Arkose Labs' CEO Kevin Gosschalk shared his thoughts on the importance of leveraging client-side security:

"Using Jscrambler in your defense playbook is highly effective".

Be sure to consider Arkose Labs to prevent automated fraud and abuse in your business. If you're interested in learning how Jscrambler can protect your Web applications, request a demo or get in touch with us.**


The leader in client-side Web security. With Jscrambler, JavaScript applications become self-defensive and capable of detecting and blocking client-side attacks like Magecart.

View All Articles

Subscribe to Our Newsletter