Upgrade to PRO for Only $50/Year—Limited-Time Offer! 🔥

Digital Cat-and-Mouse: Strategies to Outsmart S...

Avatar for Paul Conroy Paul Conroy
November 24, 2025

Digital Cat-and-Mouse: Strategies to Outsmart Scrapers, Phishers, and Thieves

As app developers, defending our digital assets goes far beyond firewalls and passwords. With scrapers, phishers, and content thieves at every turn, creative defences are often our best tool. Whether it’s trying to sell 10 Downing Street or spotting the Eiffel Tower in Dublin, this talk will explore inventive techniques to outsmart threats in real-world scenarios.

We'll share stories from the trenches and discuss technical strategies to stay one step ahead of competitors and bad actors alike. As with all good stories, plenty of mistakes were made along the way! You’ll leave with actionable tactics to protect your assets, outwit your competition, and stay ahead in this ever-evolving landscape.

Avatar for Paul Conroy

Paul Conroy

November 24, 2025
Tweet

More Decks by Paul Conroy

Other Decks in Technology

Transcript

  1. From Dublin, Ireland Started playing with the web 30+ years

    ago (Notepad, Frontpage & Geocities!) CTO at Square1 conroyp.com / @conroyp Paul Conroy 👴 🌍 🇮🇪
  2. Boom Time • Popular property site in Ireland • 2

    main players in the market, we recently became #1 • Height of property boom - lots of new competitors • Most fail - difficult to get agents to upload to new site!
  3. What are our options? 🙏 Ask them nicely to stop

    🧑⚖ Go to court… ⏳💰💰💰
  4. What are our options? 🙏 Ask them nicely to stop

    🧑⚖ Go to court… ⏳💰💰💰 👩💻 Technical countermeasures
  5. The Result? 🌅 Results updated next morning 🗑 Filled with

    obvious nonsense 🤣 Relentlessly mocked on social media
  6. The Result? 🌅 Results updated next morning 🗑 Filled with

    obvious nonsense 🤣 Relentlessly mocked on social media ✋ Stopped scraping us - flawless victory!
  7. The Result? 🌅 Results updated next morning 🗑 Filled with

    obvious nonsense 🤣 Relentlessly mocked on social media ✋ Stopped scraping us - flawless victory! 🥳 🎉 🎊
  8. 🦾 Developer doing local testing 🙈 Weak (non-existent..) code review

    🙊 FTP to production 😳 Noticed internally (mid-victory lap) 🤬 Rapid change in dev processes Flawless Victory! (almost)
  9. 🦾 Developer doing local testing 🙈 Weak (non-existent..) code review

    🙊 FTP to production 😳 Noticed internally (mid-victory lap) 🤬 Rapid change in dev processes Flawless Victory! (almost)
  10. • Property websites need to be attractive - strong imagery

    • Images make up about 60% of a site’s payload • Bandwidth is expensive!
  11. • Watermarking each image • Aggressive - visible, central •

    Obvious on other sites that the original lives elsewhere
  12. • Watermarking each image • Aggressive - visible, central •

    Obvious on other sites that the original lives elsewhere
  13. • Watermarking each image • Aggressive - visible, central •

    Obvious on other sites that the original lives elsewhere • Estate agents hated it - lots of complaints! • Needed to be more subtle
  14. • Watermarking each image • Aggressive - visible, central •

    Obvious on other sites that the original lives elsewhere • Estate agents hated it - lots of complaints! • Needed to be more subtle
  15. • Watermarking each image • Aggressive - visible, central •

    Obvious on other sites that the original lives elsewhere • Estate agents hated it - lots of complaints! • Needed to be more subtle
  16. • Watermarking each image • Aggressive - visible, central •

    Obvious on other sites that the original lives elsewhere • Estate agents hated it - lots of complaints! • Needed to be more subtle
  17. • Watermarking each image • Aggressive - visible, central •

    Obvious on other sites that the original lives elsewhere • Estate agents hated it - lots of complaints! • Needed to be more subtle
  18. • Watermarking each image • Aggressive - visible, central •

    Obvious on other sites that the original lives elsewhere • Estate agents hated it - lots of complaints! • Needed to be more subtle
  19. • Watermarking each image • Aggressive - visible, central •

    Obvious on other sites that the original lives elsewhere • Estate agents hated it - lots of complaints! • Needed to be more subtle
  20. • Watermarking each image • Aggressive - visible, central •

    Obvious on other sites that the original lives elsewhere • Estate agents hated it - lots of complaints! • Needed to be more subtle
  21. • Watermarking each image • Aggressive - visible, central •

    Obvious on other sites that the original lives elsewhere • Estate agents hated it - lots of complaints! • Needed to be more subtle
  22. • Competitors quickly got frustrated • Poor user experience •

    Stopped hotlinking us • They targeted other competitors
  23. • Competitors quickly got frustrated • Poor user experience •

    Stopped hotlinking us • They targeted other competitors 🏃🧍🦁
  24. Signed URLs • More browser restrictions on sharing of referral

    URLs • Application generates URL with signature • Typically includes timestamp and a shared secret • Server validates it
  25. Signed URLs • More browser restrictions on sharing of referral

    URLs • Application generates URL with signature • Typically includes timestamp and a shared secret • Server validates it
  26. 🧑💻 Image is in cache already? Retrieve image from cache

    Nginx + LUA scripting Decode sig Extract timestamp Check vs shared secret Return image Yes No Request: /img/house.jpg?sig=abc1234 Shared secret Valid sig? Add cache headers to image Yes No Error image
  27. IP Restrictions • Mobile network in Ireland grouping user IPs

    • Threat detection was counting IPs per account • Think again about rate limiting strategies • 1 IP != 1 Person
  28. IP Restrictions • Mobile network in Ireland grouping user IPs

    • Threat detection was counting IPs per account • Think again about rate limiting strategies • 1 IP != 1 Person
  29. Real Estate scams, very popular Beautiful photos, low price Owner

    “not available right now” Wire the money now, it’s yours!
  30. Real Estate scams, very popular Beautiful photos, low price Owner

    “not available right now” Wire the money now, it’s yours!
  31. Real Estate scams, very popular Beautiful photos, low price Owner

    “not available right now” Wire the money now, it’s yours!
  32. Real Estate scams, very popular Beautiful photos, low price Owner

    “not available right now” Wire the money now, it’s yours!
  33. Real Estate scams, very popular Beautiful photos, low price Owner

    “not available right now” Wire the money now, it’s yours! Let your users help you out!
  34. • Got smarter over time • Copy css and js

    files - no more hotlinking • Didn’t get them all…
  35. • Got smarter over time • Copy css and js

    files - no more hotlinking • Didn’t get them all…
  36. Honeypot • Tempting to nuke the site immediately • Set

    up a honeypot • Seemingly-real credentials • Track when they are used to log in • Check for other logins from the same device
  37. • User education - checking URLs • Two Factor Authentication

    • HaveIBeenPwned.com • Ugly emails 😬 https://www.haveibeenpwned.com/
  38. • 1990s US, Pay TV taking off - sports &

    movies • More expensive for bars - charge $20 entry to customers for events • Card encryption cracked - thriving black market in cloned decoders
  39. • Critical bit of the process to copy • Odd

    updates - not breaking pirated cards • No obvious functionality • Pirates copied them faithfully 📺 👨💼
  40. Pieces combined to make programme that could run on the

    card! Overwrote part of internal card memory, sending machines into boot loop
  41. Pieces combined to make programme that could run on the

    card! 98% of pirate cards effectively bricked overnight Overwrote part of internal card memory, sending machines into boot loop
  42. Pieces combined to make programme that could run on the

    card! 98% of pirate cards effectively bricked overnight Overwrote part of internal card memory, sending machines into boot loop
  43. Pieces combined to make programme that could run on the

    card! 98% of pirate cards effectively bricked overnight Overwrote part of internal card memory, sending machines into boot loop Developers took a small victory lap…
  44. Pieces combined to make programme that could run on the

    card! 98% of pirate cards effectively bricked overnight Overwrote part of internal card memory, sending machines into boot loop Developers took a small victory lap…
  45. Strategies • Tarpit - slow your adversary down, slow-responding code.

    • Honeypot - give them credentials that seem legit, but can be used to trace them. • Fake data - share data that looks good to machines, but needs a lot of human effort to clean up. • Swiss cheese defence - one layer is rarely enough. • Patience can be a virtue when building a counter-attack.
  46. Takeaways 🥷 Know your adversary - what are they trying

    to do? 🕵 Monitoring - how are they trying to do it? ⏰ Immediate block vs longer-term counter-attack 👮 Know the law! Counter-hacking can get you in trouble in some areas
  47. Takeaways 🥷 Know your adversary - what are they trying

    to do? 🕵 Monitoring - how are they trying to do it? ⏰ Immediate block vs longer-term counter-attack 👮 Know the law! Counter-hacking can get you in trouble in some areas 🦁 Lace up your running shoes!
  48. • Revisting the Black Sunday Hack https://blog.codinghorror.com/revisiting-the-black-sunday-hack/ • Dublin Coastal

    Development Launch Site (Irish state broadcaster news coverage) http://dublincoastaldevelopment.com/
 https://www.rte.ie/archives/2016/0925/818719-artificial-islands-for-dublin-bay/ • Cloudflare AI Labyrinth https://blog.cloudflare.com/ai-labyrinth/ • HaveIBeenPwned.com https://www.haveibeenpwned.com Further Reading