Your resource for web content, online publishing
and the distribution of digital products.
S M T W T F S
1
 
2
 
3
 
4
 
5
 
6
 
7
 
8
 
9
 
 
 
 
 
 
 
 
 
 
 
 
21
 
22
 
23
 
24
 
25
 
26
 
27
 
28
 
29
 
30
 
 
 
 
 
 

Interview With Dan Barahona From APISec University

DATE POSTED:September 20, 2024

Authentication and authorization make up the foundation for modern APIs. However, they’re deceptively complex to implement in practice. Solving this problem is becoming a growing concern for any digital enterprise in 2024, with the rise of API attacks and breaches costing organizations a fortune in fees and a loss of reputation.

Ahead of Platform Summit 2024, we’re syncing with select speakers to learn more about their upcoming sessions and their role in the API community. One such person who needs little introduction is Dan Barahona, who, along with cohort Corey Ball, has pioneered the APISec University, APISec|Con, and other events. He’s also Head of Growth at APIsec, an API security testing company.

It turns out that what Gartner warned us about the rise of API attacks years ago has come to fruition… I checked in with Dan to get his insights on some of the most common vulnerabilities out there and how to respond. Be sure to check out his great responses below, and attend the Platform Summit for more specific insights!

Hey Dan! Tell us a bit about your background in API security and what goes on with APISec University.

I’m an engineer wannabe at heart. I started my career as a crash engineer at General Motors but shifted to cybersecurity after 9/11. I have spent the last 20+ years in this space. I got started in API security back in 2020 when I joined APIsec, a startup focused on automated API security testing. In 2022, I hooked up with Corey Ball, author of Hacking APIs, and we had a crazy idea to start making online courses to teach about API security. We hit a nerve and now have almost 100,000 students enrolled in our free classes. It’s been a ton of fun, and we’ve added a lot to the site, including many more courses, API security workshops, webinars, conferences, and more.

Why do you think APIs are increasingly targeted for cyberattacks in 2024? What breaches particularly sound the alarm?

Gartner’s prediction that API attacks would become the “most frequent attack vector” has turned out to be true. The reason is that organizations have frequently ignored or undersecured their APIs. There are many reasons for this, but it’s primarily due to:

  1. Lack of awareness of the threats to APIs.
  2. The need to secure APIs during the development process.
  3. Lack of solid tooling to detect API vulnerabilities.

In 2024, we’ve seen a number of high-profile API incidents. An attacker found an open API at Trello that allowed them to extract profile data simply by providing an email address. After submitting 500 million email addresses to the API, they harvested 15 million accounts, which they promptly put up for sale on the Dark Web. More recently, the US Federal Communications Commission concluded an investigation of TracFone (owned by Verizon), where they discovered subscriber data had been exposed in a vulnerable API. The FCC handed down a $16 million fine and mandated stringent API security requirements.

Are any new trends emerging regarding vulnerabilities or flaws that are being exploited the most?

First and foremost, APIs are not getting breached in “classic” web application vulnerability techniques. It’s now unheard of to see breaches from common vulnerabilities such as SQL injection, cross-site scripting, or buffer overflow, for instance. We’ve long had vulnerability scanners to find these flaws, which can easily be fixed in code or runtime protections. What attackers are looking for in APIs are uncommon vulnerabilities, such as vulnerabilities that are unique to your API. These often include logic flaws, authorization gaps, and other more difficult-to-detect vulnerabilities.

We analyzed over 100 API breaches and categorized the top attack vectors. The top three attack types were present in 90% of the breaches we studied and map perfectly to the OWASP API Security Top 10. Namely, #1 Broken Object Level Authorization (can User A access User B’s data), #2 Broken Authentication (are APIs left open, with the door unlocked), and #3 Broken Object Property Level Authorization (formerly “Excess Data Exposure” — are APIs revealing sensitive data).

How should the development lifecycle respond to these API threats?

The challenge with logic vulnerabilities is attacked on these are almost impossible to detect in real time. The attacks look like normal traffic to our firewalls and detection systems. So it’s even more important to identify and fix these issues before production, in the development lifecycle. There are two key approaches — the first is education. We need the engineers developing our APIs to understand how they’re being attacked so they can create more resilient code. APIsec University offers free, high-quality courses to help Dev and Ops teams understand how to keep APIs secure. Second is testing. We need to significantly improve API security testing to uncover logic flaws, authorization gaps, data leaks, and other flaws before they reach production. This testing must be automated, continuous, and shift-left.

Also read: Using Hacking APIs GPT For API Security Testing

How do you define shift-left security testing? What are some guidelines for integrating a shift-left mindset and process around API security?

Shift-left testing recognizes the importance of finding flaws as early as possible in the application lifecycle. In the case of APIs, the vast majority of vulnerabilities can only be fixed in the application code itself, not in a monitoring rule. So it’s critical to test APIs pre-production and simulate the types of exploits attackers use to breach APIs. These simulations must cover a wide range of attack types and be tailored to each unique API endpoint. We cannot rely on manual testing to achieve this as it requires too much expertise and time, and we cannot keep up with the pace of Engineering releases. Fortunately, new API security testing tooling exists that can achieve this level of automation, coverage, and continuous assessment.

In Austin earlier this year, you discussed ‘Why You Should Hack Your Own APIs.’ What are the benefits of being a white hat hacker with your own APIs?

We’re big believers in hacking your own APIs here at APIsec University. The first course we launched was API Penetration Testing where Corey Ball, author of Hacking APIs, teaches students exactly how to hack their APIs to find vulnerabilities. This is a crucial exercise for all application security teams, as we cannot assume all attacks will get blocked by the firewall. Attackers are clever and determined to find ways around the defenses. This is why it’s so important to have a hacker mentality and pressure test your APIs (ahead of production) to ensure there are no logic flaws or data leaks.

At Platform Summit 2024, you’ll be speaking about ‘Protecting Your Code: API Security from Development to Deployment,’ without giving away too much else; what can attendees expect to take away from your talk?

In this talk, I will explore specific attack vectors criminals use to exploit gaps in our API defenses. Based on our analysis, there are certain common patterns to attacks, and if we can identify those, we can fix them. Many are fairly easy to address. We’ll also get specific and tactical about not only WHY organizations should shift testing left but also HOW they can get there. With AI advances, API testing has become much smarter and more comprehensive.

Why are you excited about the Platform Summit this year? More to the point, why do you like Nordic APIs events enough to speak at two in one year?!

I always learn so much from the Nordic APIs conferences — it’s now a must-attend event for me. I love this conference because the sessions are so incredibly interesting, educational, and free of vendor pitches. I’m always amazed by the authentication and authorization sessions. It seems like such a basic topic, and yet so very complex. These sessions always have packed audiences, as we all need to start with strong authentication for our applications and APIs. Naturally, I’m interested in AI-related sessions, both as a source of risk and a tool for defense. And I can’t wait to visit my favorite Swedish meatball spot in Stockholm!