Basic ways to protect yourself from AI bot attacks

Basic ways to protect yourself from AI bot attacks


Disclaimer

I’ve been a software developer for almost 12 years. If I include the time before I started working professionally, I easily reach 15–16 years of experience. During this time, I’ve worked on various products and different stacks. That said, the goal of this post is not to alarm anyone, but to share a real experience and some security practices I consider important, especially in the current context where AI-powered automated attacks are becoming increasingly sophisticated, adaptive, and difficult to distinguish from legitimate behavior.

What happened

On Friday, around 9:20 PM, I was reviewing some notes for the next day before going to bed. Meanwhile, some acquaintances started sharing a link to a site called moltbot chuck, apparently created or operated by bots.

Out of technical curiosity (and with caution), I opened an isolated VM to analyze the site’s behavior. As soon as I accessed it, I noticed it was abnormally slow. Opening the browser’s Network tab was enough to spot something strange: numerous attempts to access the browser’s password manager.

These attempts failed — fortunately, I use a dedicated password manager (NordPass, in this case), which added an important layer of protection. After failing to succeed, the site’s behavior changed: it started aggressively trying to interact with any text field available on the page (email inputs, password fields, generic forms, etc.).

At that point, I decided to shut everything down. Although the VM was isolated, with well-defined ports and some active security controls, I preferred not to underestimate the risk. I restarted and completely reset my computer.

Checking via AI
Checking via AI
Via VM
Via VM

Why take such a drastic measure?

Simple: security. I strongly believe we should never underestimate an attacker’s capabilities, especially when dealing with automations, scripts, and agents potentially powered by AI models.

Even with backups, protocols, and layers of defense in place, I chose the more conservative path. In the process, I even identified areas for improvement in my own backup strategy — something every incident ends up revealing.

Below are some practical recommendations. None of this is a silver bullet, but combining these measures significantly reduces the attack surface and helps mitigate risks.


Layer 1 – Basic (the bare minimum)


Layer 2 – Intermediate (for those who already work with technology)


Layer 3 – Advanced (defense in depth)


Final thoughts

Automated attacks are nothing new, but the level of sophistication has increased significantly with the use of AI. Today, bots don’t just execute static scripts: they learn patterns, adapt strategies, simulate human behavior, and adjust attacks almost in real time.

It’s not about paranoia, it’s about a defensive posture. Security is not a product, it’s an ongoing process. The sooner you adopt good practices, the smaller the impact when something unexpected happens.

If this post makes at least one person rethink how they access random links or how they organize their layers of protection, then it has already served its purpose.

References