Memory scalpers hunt scarce DRAM with bot blitz
(2026/03/02)
- Reference: 1772460006
- News link: https://www.theregister.co.uk/2026/03/02/memory_scalpers_hunt_scarce_dram/
- Source link:
Web scraping bots are increasing the pressure on the tech supply chain by scouring sites for DRAM, so their minders can snap up increasingly scarce inventory and resell it for a quick profit.
DataDome, an online security biz, [1]reports that its Galileo threat team spotted a large-scale data gathering operation that has submitted more than 10 million web scraping requests in an effort to find sellers carrying desirable DRAM stock.
The bots have been hitting select sites every 6.5 seconds to query inventories of DRAM and raw hardware components like DIMM sockets. And the people behind the crawlers appear to be using AI tools to enhance the effectiveness of their scraping runs.
[2]
"Fraudsters will combine various tooling and commodities to perform fraud at scale, but it's not always obvious what they are using, or for which purpose," said Jérôme Segura, VP of threat research at DataDome, in an email to The Register .
[3]
[4]
"Having said that, we have observed threat actors discuss the use of AI to reverse-engineer anti-bot protection or to automate scripting tasks. AI is unique in that it gives leverage from script kiddies all the way to professional scrapers."
According to DataDome, the inquisitive bots have been hitting DRAM product pages on e-commerce sites at a rate almost 6x more often than legitimate users and friendly crawlers. And these memory sniffers have been relying on a technique known as cache busting to ensure they get the most up-to-date information.
[5]
Cache busting involves appending parameters to page requests so they appear different from prior requests. This ensures that the server loads the latest product information instead of serving cached data that may not reflect current product availability. The bots are also tuned to throttle their requests to an acceptable rate – presumably tested in advance – so they don't get rate limited.
[6]AI models suck slightly less at math than they did last year
[7]Oak Ridge spawns institute to curb AI datacenter power surge
[8]Lovable-hosted app littered with basic flaws exposed 18K users, researcher claims
[9]Anthropic to Pentagon: Autonomous weapons could hurt US troops and civilians
The bot campaign appears to be focused on identifying available DRAM, and doesn't involve automated purchasing of memory. But acquiring memory for resale is the plan.
"By rapidly snapping up the limited DDR5 memory inventory for profitable resale, these bots further deplete the consumer supply, effectively boxing out legitimate customers and driving market prices even higher," the DataDome report says.
DRAM, specifically DDR5 memory, has been in short supply [10]since last November , as accelerating infrastructure deployment from hyperscalers and AI giants has increased demand for memory.
The resulting memory drought is expected to [11]double the price of DRAM in Q1 2026, and to increase the cost of NAND too. With so much supply spoken for by large cloud providers, mid-tier and smaller cloud vendors have been forced to raise their prices, as [12]Hetzner recently did . The starved supply chain is also expected to [13]limit entry-level PC and phone shipments . ®
Get our [14]Tech Resources
[1] https://datadome.co/threat-research/scarcity-ddr5-ram-fueled-by-ai-demand-scalping-surge
[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aaXCN6OPCtJEJXhiBJ6bIAAAAkU&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aaXCN6OPCtJEJXhiBJ6bIAAAAkU&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aaXCN6OPCtJEJXhiBJ6bIAAAAkU&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aaXCN6OPCtJEJXhiBJ6bIAAAAkU&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[6] https://www.theregister.com/2026/02/26/ai_models_get_better_at/
[7] https://www.theregister.com/2026/02/27/oak_ridge_datacenter_power/
[8] https://www.theregister.com/2026/02/27/lovable_app_vulnerabilities/
[9] https://www.theregister.com/2026/02/27/anthropic_pentagon_response/
[10] https://pcpartpicker.com/trends/price/memory/#ram.ddr5.4800.2x16384
[11] https://www.theregister.com/2026/02/02/dram_prices_expected_to_double/
[12] https://www.theregister.com/2026/02/24/ai_isnt_done_yet_memoryrelated/
[13] https://www.theregister.com/2026/02/26/memory_price_hikes/
[14] https://whitepapers.theregister.com/
DataDome, an online security biz, [1]reports that its Galileo threat team spotted a large-scale data gathering operation that has submitted more than 10 million web scraping requests in an effort to find sellers carrying desirable DRAM stock.
The bots have been hitting select sites every 6.5 seconds to query inventories of DRAM and raw hardware components like DIMM sockets. And the people behind the crawlers appear to be using AI tools to enhance the effectiveness of their scraping runs.
[2]
"Fraudsters will combine various tooling and commodities to perform fraud at scale, but it's not always obvious what they are using, or for which purpose," said Jérôme Segura, VP of threat research at DataDome, in an email to The Register .
[3]
[4]
"Having said that, we have observed threat actors discuss the use of AI to reverse-engineer anti-bot protection or to automate scripting tasks. AI is unique in that it gives leverage from script kiddies all the way to professional scrapers."
According to DataDome, the inquisitive bots have been hitting DRAM product pages on e-commerce sites at a rate almost 6x more often than legitimate users and friendly crawlers. And these memory sniffers have been relying on a technique known as cache busting to ensure they get the most up-to-date information.
[5]
Cache busting involves appending parameters to page requests so they appear different from prior requests. This ensures that the server loads the latest product information instead of serving cached data that may not reflect current product availability. The bots are also tuned to throttle their requests to an acceptable rate – presumably tested in advance – so they don't get rate limited.
[6]AI models suck slightly less at math than they did last year
[7]Oak Ridge spawns institute to curb AI datacenter power surge
[8]Lovable-hosted app littered with basic flaws exposed 18K users, researcher claims
[9]Anthropic to Pentagon: Autonomous weapons could hurt US troops and civilians
The bot campaign appears to be focused on identifying available DRAM, and doesn't involve automated purchasing of memory. But acquiring memory for resale is the plan.
"By rapidly snapping up the limited DDR5 memory inventory for profitable resale, these bots further deplete the consumer supply, effectively boxing out legitimate customers and driving market prices even higher," the DataDome report says.
DRAM, specifically DDR5 memory, has been in short supply [10]since last November , as accelerating infrastructure deployment from hyperscalers and AI giants has increased demand for memory.
The resulting memory drought is expected to [11]double the price of DRAM in Q1 2026, and to increase the cost of NAND too. With so much supply spoken for by large cloud providers, mid-tier and smaller cloud vendors have been forced to raise their prices, as [12]Hetzner recently did . The starved supply chain is also expected to [13]limit entry-level PC and phone shipments . ®
Get our [14]Tech Resources
[1] https://datadome.co/threat-research/scarcity-ddr5-ram-fueled-by-ai-demand-scalping-surge
[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aaXCN6OPCtJEJXhiBJ6bIAAAAkU&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aaXCN6OPCtJEJXhiBJ6bIAAAAkU&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aaXCN6OPCtJEJXhiBJ6bIAAAAkU&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aaXCN6OPCtJEJXhiBJ6bIAAAAkU&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[6] https://www.theregister.com/2026/02/26/ai_models_get_better_at/
[7] https://www.theregister.com/2026/02/27/oak_ridge_datacenter_power/
[8] https://www.theregister.com/2026/02/27/lovable_app_vulnerabilities/
[9] https://www.theregister.com/2026/02/27/anthropic_pentagon_response/
[10] https://pcpartpicker.com/trends/price/memory/#ram.ddr5.4800.2x16384
[11] https://www.theregister.com/2026/02/02/dram_prices_expected_to_double/
[12] https://www.theregister.com/2026/02/24/ai_isnt_done_yet_memoryrelated/
[13] https://www.theregister.com/2026/02/26/memory_price_hikes/
[14] https://whitepapers.theregister.com/
"DRAMnyet launched on Feb 26, 2026..."
CapeCarl
Perhaps Cyberdyne Systems needs more memory for its PC ecosystem terminators.
OK they are bastards, but
PCScreenOnly
"Fraudsters will combine various tooling and commodities to perform fraud at scale, but it's not always obvious what they are using, or for which purpose," said Jérôme Segura, VP of threat research at DataDome, in an email to The Register.
I do not see how they are fraudsters. Bastards - yes, but they are seeing an area and exploiting. Not fraud
If they got some dodgy 1GB RAM and fudged it to say it was a 16GB stick - fair enough, but using a tool to buy low so you can sell high,
Wherever there's a scheme ....
.... there's scum .... I mean a schemer!