1) Exploit a user’s query for a file (replacing it with a malicious one). 2) Bots are used in DDoS attacks. 3. Bots are used to verify stolen credentials – brute forcing. 4) Bots hold the tickets for checkout and never actually buy them. This holds legitimate users from buying it. 5) Used to post fake reviews on e-comm sites, tarnishing the image of a particular seller. 6) Bots are used to log keystrokes which is then used by cybercriminals to harvest personal info.