<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Grigoriy Melnikov</title>
    <description>The latest articles on DEV Community by Grigoriy Melnikov (@grigoriy_melnikov_797b700).</description>
    <link>https://dev.to/grigoriy_melnikov_797b700</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2769058%2Fc9036934-2817-4707-904e-67227d8992c1.jpg</url>
      <title>DEV Community: Grigoriy Melnikov</title>
      <link>https://dev.to/grigoriy_melnikov_797b700</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/grigoriy_melnikov_797b700"/>
    <language>en</language>
    <item>
      <title>Russia’s Human-Like Bots Are Too Advanced - And Harder to Detect Than You Think</title>
      <dc:creator>Grigoriy Melnikov</dc:creator>
      <pubDate>Tue, 05 May 2026 05:14:46 +0000</pubDate>
      <link>https://dev.to/grigoriy_melnikov_797b700/russias-human-like-bots-are-too-advanced-and-harder-to-detect-than-you-think-1l1i</link>
      <guid>https://dev.to/grigoriy_melnikov_797b700/russias-human-like-bots-are-too-advanced-and-harder-to-detect-than-you-think-1l1i</guid>
      <description>&lt;p&gt;I’ve spent 10 years building bots that bypass anti-fraud systems. Now I fight them by building anti-bot detection systems - and most defenses don’t work.&lt;/p&gt;

&lt;p&gt;In this article, I’ll break down how human-like bot traffic actually works - and show a simple way to make bots click on hidden links.&lt;/p&gt;

&lt;h2&gt;
  
  
  In Russia, bot traffic is highly industrialized
&lt;/h2&gt;

&lt;p&gt;Almost every website receives large volumes of “direct” and “referral” visits that are not real users. These visits distort analytics and can negatively impact rankings in Yandex (a Russian search engine like Google).&lt;/p&gt;

&lt;p&gt;There is a fundamental difference between bot traffic patterns in Russia and global markets:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;In Russia&lt;/strong&gt;, bots are primarily used to manipulate behavioral signals - pushing &lt;strong&gt;sites higher in search results without paying for ads&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;In global markets&lt;/strong&gt;, bots are optimized for revenue - &lt;strong&gt;ad fraud&lt;/strong&gt;, lead fraud, affiliate abuse.
Same tools. Different goals.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Why Russian-style bots matter
&lt;/h2&gt;

&lt;p&gt;Russian bot operators are highly focused on mimicking real user behavior.&lt;br&gt;
&lt;strong&gt;And you don’t need to be a developer to build these bots.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In Russia, tools like Browser Automation Studio or ZennoPoster allow users to create bots visually - like building a flowchart:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;move the mouse to a specific element&lt;/li&gt;
&lt;li&gt;click elements&lt;/li&gt;
&lt;li&gt;fill out forms&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;An example of a bot created visually in ZennoPoster - no coding required:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Filjg6bewty3skhlsmi7v.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Filjg6bewty3skhlsmi7v.jpg" alt="An example of creating a bot using a block diagram in ZennoPoster." width="459" height="508"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;No coding required. This accessibility is one of the main reasons &lt;strong&gt;why human-like bot traffic has scaled so aggressively&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  There is no visualization of how captchas are solved
&lt;/h2&gt;

&lt;p&gt;You can’t see what actually happens on the captcha page during solving.&lt;/p&gt;

&lt;p&gt;Most solutions, including &lt;strong&gt;Cloudflare, don’t provide visibility into&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;how the captcha was interacted with&lt;/li&gt;
&lt;li&gt;what actions were performed on the captcha page&lt;/li&gt;
&lt;li&gt;whether the behavior looked human&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This creates a major blind spot. Here’s where it gets interesting.&lt;/p&gt;

&lt;h2&gt;
  
  
  Bots clicking hidden links
&lt;/h2&gt;

&lt;p&gt;I’ve built a lot of bots - and analyzed even more. One thing becomes obvious: bot behavior on a website is never perfectly clean.&lt;/p&gt;

&lt;p&gt;If you:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;add invisible (hidden) links to a captcha page&lt;/li&gt;
&lt;li&gt;record user sessions on that page&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;you start seeing very clear patterns:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;bots scrolling over the captcha&lt;/li&gt;
&lt;li&gt;bots clicking hidden links&lt;/li&gt;
&lt;li&gt;bots interacting with elements no real user would ever see&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;This technique is especially effective when analyzing paid traffic&lt;/strong&gt;. It does not matter how the visit is classified: bot or human. &lt;strong&gt;If a user clicks a hidden link&lt;/strong&gt; or scrolls over a captcha - &lt;strong&gt;it’s a strong signal of bot behavior&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Fixed selectors are the real problem with captchas
&lt;/h2&gt;

&lt;p&gt;Most captchas have fixed selectors and a predictable HTML structure.&lt;br&gt;
For tools like BAS or Puppeteer, clicking the “I am not a robot” checkbox is trivial.&lt;br&gt;
But if the captcha page is generated with:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;dynamic HTML paths&lt;/li&gt;
&lt;li&gt;randomized CSS classes
then solving it becomes significantly harder.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Cloudflare captcha has static paths, so it is easy for a human-like bot to click it:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fef0mswkmbz0bdxcwe8tk.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fef0mswkmbz0bdxcwe8tk.jpg" alt="Cloudflare captcha has static paths, so it is easy for a human-like bot to click it." width="705" height="375"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A dynamic captcha is much harder to solve: no text labels, no fixed HTML paths, no fixed CSS classes, no fixed element positions:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F11thfifibpb2j0983km0.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F11thfifibpb2j0983km0.jpg" alt="A dynamic captcha is much harder to solve: no text labels, no fixed HTML paths, no fixed CSS classes, no fixed element positions" width="583" height="668"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Why L7 DDoS bots are easy to filter - and human-like bots are not
&lt;/h2&gt;

&lt;p&gt;In overall traffic, L7 DDoS activity is clearly visible. High-volume attack traffic stands out - you can see it, and you can block it.&lt;/p&gt;

&lt;p&gt;At the moment, the three most common types of L7 attacks are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;repeated or similar IP ranges&lt;/li&gt;
&lt;li&gt;downloading the same resource in parallels (for example, downloading a website image in many threads)&lt;/li&gt;
&lt;li&gt;random URL parameters&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;All of this can be filtered using a WAF provided by a hosting or infrastructure provider&lt;/strong&gt;:&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjs73o3fk3y4afs2zpsgm.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjs73o3fk3y4afs2zpsgm.jpg" alt="the three most common types of L7 attacks." width="800" height="436"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The goal of human-like bots is not to take a site down, but to look like real users.&lt;/strong&gt; Because of that, you can’t detect them using simple signals like IP address, user agent, language, region, screen resolution, or similar parameters.&lt;/p&gt;

&lt;p&gt;Detecting this type of traffic requires a completely different approach.&lt;/p&gt;

&lt;h2&gt;
  
  
  On this approach, I built my own anti-bot system
&lt;/h2&gt;

&lt;p&gt;It focuses not on user parameters, but on what software generates bot traffic. Each bot is created by specific software, and that software produces a unique snapshot. This snapshot does not depend on browser parameters inside the session.&lt;/p&gt;

&lt;p&gt;My snapshot is not a fingerprint. A fingerprint is a set of browser parameters; a snapshot is the bot-generating program identifier.&lt;/p&gt;

&lt;p&gt;Tools like BAS or anti-detect browsers like MoreLogin produce their own snapshots that differ from real browsers - and that’s exactly how human-like bots can be detected.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;For bot visualization, I use Yandex Metrica&lt;/strong&gt; - it’s a free and powerful web analytics tool. It’s especially useful when analyzing traffic quality.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;You can see how the bot clicks a hidden link in the session recording shown in the video attached to this article. The bot thinks it is on a normal website, but it is actually on a captcha page. It first moves the mouse over the captcha, then moves the cursor to the top of the page - where hidden links are placed to look like a navigation menu.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8a2sekb24vjoeihltg84.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8a2sekb24vjoeihltg84.jpg" alt="bot taps ower captcha" width="472" height="793"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you’re curious about how this detection works in practice, I’ve shared more details and examples here: &lt;a href="https://t.me/KillBotEng" rel="noopener noreferrer"&gt;https://t.me/KillBotEng&lt;/a&gt;&lt;br&gt;
You can also test it on your own traffic:&lt;br&gt;
👉 &lt;a href="https://my.kill-bot.net/" rel="noopener noreferrer"&gt;https://my.kill-bot.net/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;From my experience, most analytics and bot detection systems completely miss this type of traffic.&lt;/p&gt;

&lt;h2&gt;
  
  
  In the next post I’ll explain how search rankings in Google are manipulated by bots
&lt;/h2&gt;

&lt;p&gt;Have you ever checked whether bots click elements on your site that real users can’t even see?&lt;/p&gt;

</description>
      <category>security</category>
      <category>marketing</category>
      <category>webdev</category>
      <category>programming</category>
    </item>
  </channel>
</rss>
