• Latest
  • Trending
  • All
  • News
  • Business
  • Politics
  • Science
  • World
  • Lifestyle
  • Tech
T-Mobile data breach shows API security can’t be ignored

T-Mobile data breach shows API security can’t be ignored

January 20, 2023
Joey Lawrence approves of brother Matthew’s relationship with TLC singer Chilli

Joey Lawrence approves of brother Matthew’s relationship with TLC singer Chilli

February 4, 2023
Giant panda named Le Le dies after 20 years at Memphis Zoo

Giant panda named Le Le dies after 20 years at Memphis Zoo

February 4, 2023
Maybe We Should Convince Men That Paid Leave Is Their Idea

Maybe We Should Convince Men That Paid Leave Is Their Idea

February 4, 2023
Get the best television deals in time for the Super Bowl

Get the best television deals in time for the Super Bowl

February 4, 2023
Biden to brief top members of Congress on Chinese spy balloon

Biden to brief top members of Congress on Chinese spy balloon

February 4, 2023
How Netflix Aims to Deliver the Next ‘Squid Game’

How Netflix Aims to Deliver the Next ‘Squid Game’

February 4, 2023
Americans are tipping more often, even if they don’t want to

Americans are tipping more often, even if they don’t want to

February 4, 2023
George Santos Plays Hide-out

George Santos Plays Hide-out

February 4, 2023
Attacks on Electrical Substations Raise Alarm

Attacks on Electrical Substations Raise Alarm

February 4, 2023
Erasing Black History Is Not the Role of the College Board

Erasing Black History Is Not the Role of the College Board

February 4, 2023
U.S. Presses Partners to Weed Out Illicit Trade With Russia

U.S. Presses Partners to Weed Out Illicit Trade With Russia

February 4, 2023
Beloved Star of ‘A Christmas Story’ Has Died at Age 83

Beloved Star of ‘A Christmas Story’ Has Died at Age 83

February 4, 2023
DNYUZ
  • Home
  • News
    • U.S.
    • World
    • Politics
    • Opinion
    • Business
    • Crime
    • Education
    • Environment
    • Science
  • Entertainment
    • Culture
    • Music
    • Movie
    • Television
    • Theater
    • Gaming
    • Sports
  • Tech
    • Apps
    • Autos
    • Gear
    • Mobile
    • Startup
  • Lifestyle
    • Arts
    • Fashion
    • Food
    • Health
    • Travel
No Result
View All Result
DNYUZ
No Result
View All Result
Home Tech Mobile

T-Mobile data breach shows API security can’t be ignored

January 20, 2023
in Mobile, News
T-Mobile data breach shows API security can’t be ignored
540
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter

Enterprise security isn’t easy. Small oversights around systems and vulnerabilities can result in data breaches that impact millions of users. Unfortunately, one of the most common oversights is in the realm of APIs. 

Just yesterday, T-Mobile revealed that a threat actor stole the personal information of 37 million postpaid and prepaid customer accounts via an exposed API (which they exploited between November 25, 2022 and January 5, 2023). The vendor didn’t share how the hackers exploited the API. 

This incident highlights that API security should be at the top of the agenda for CISOs and organizations if they want to safeguard customer data from falling into the wrong hands. 

The trend of API exploitation 

With cloud adoption increasing dramatically over the past few years, analysts have long warned enterprises that a tidal wave of API exploitation has been brewing. Back in 2021, Gartner predicted that in 2023, API abuse would move from infrequent to the most frequent attack vector. 

These predictions appear to be accurate, with research showing that 53% of security and engineering professionals reported their organizations experienced a data breach of a network or app due to compromised API tokens. 

In addition, just a month ago, hackers exposed the account and email addresses of 235 million Twitter users after exploiting an API vulnerability originally shipped in June 2021, which was later patched. 

As threat actors look to exploit APIs more often, organizations can’t afford to rely on legacy cybersecurity solutions to protect this vast attack surface. Unfortunately, upgrading to up-to-date solutions is easier said than done. 

“Unauthorized API access can be extremely difficult for organizations to monitor and investigate — especially for enterprise companies — due to the sheer volume of them,” said Chris Doman, CTO and cofounder of Cado Security. 

“As more organizations are moving data to the cloud, API security becomes even more pertinent with distributed systems,” Doman said. 

Doman notes that organizations looking to insulate themselves from incidents like T-Mobile experienced need to have “proper visibility” into API access and activity beyond traditional logging. 

This is important because logging can be sidestepped — as was the case with a vulnerability in AWS’ APIs that allowed attackers to bypass CloudTrail logging. 

How bad is the T-Mobile API data breach? 

While T-Mobile has claimed that the attackers weren’t able to access users’ payment card information, passwords, driver’s licenses, government IDs or social security numbers, the information that was harvested provides ample material to conduct social engineering attacks. 

“Although T-Mobile has publicly disclosed the severity of the incident, alongside its response — cutting off threat-actor access via the API exploit — the breach still compromised billing addresses, emails, phone numbers, birth dates and more,” said Cliff Steinhauer, director of information security and engagement at NCA. 

“It’s basic information, but just enough to map out and execute a convincing enough social engineering campaign that can strengthen bad actors’ capacity for new attacks,” Steinhauer said. 

These attacks include phishing attacks, identity theft, business email compromise (BEC) and ransomware.

Why do API breaches happen?

APIs are a prime target for threat actors because they facilitate communication between different apps and services. Each API sets out a mechanism for sharing data with third-party services. If an attacker discovers a vulnerability in one of these services, they can gain access to the underlying data as part of a man-in-the-middle attack. 

There is an increase in API-based attacks — not because these elements are necessarily insecure, but because many security teams don’t have the processes in place to identify and classify APIs at scale, let alone remediate vulnerabilities.

“APIs are designed to provide ready access to applications and data. This is a great benefit to developers, but also a boon for attackers,” said Mark O’Neill, VP analyst at Gartner. “Protecting APIs starts with discovering and categorizing your APIs. You can’t secure what you don’t know.”  

Of course, inventorying APIs is just the tip of the iceberg; security teams also need a strategy to secure them. 

“Then it involves the use of API gateways, web application and API protection (WAAP), and application security testing. A key problem is that API security falls into two groups: engineering teams, who lack security skills, and security teams, who lack API skills.” 

Thus, organizations need to implement a DevSecOps-style approach to better assess the security of applications in use (or in development) within the environment, and develop a strategy to secure them. 

Identifying and mitigating API vulnerabilities 

One way organizations can start to identify vulnerabilities in APIs is to implement penetration testing. Conducting an internal or third party-led penetration test can help security teams see how vulnerable to exploitation an API is, and provide actionable steps on how they can improve their cloud security posture over time.

“For all types of software, it’s vital that companies use updated code and check the security of their systems, e.g., by arranging penetration testing — a security assessment that simulates various types of intruders … the goal of which is to elevate the current privileges and access the environment,” said David Emm, principal security researcher at Kaspersky.

In addition, it’s a good idea for organizations to invest in incident response, so if an API is exploited, they can respond quickly to limit the impact of the breach.

“To be on the safe side when a company is faced with an incident, incident response services can help minimize the consequences, in particular by identifying compromised nodes and protecting the infrastructure from similar attacks in the future,” Emm said.

The role of zero trust 

Unauthenticated, public-facing APIs are susceptible to malicious API calls, where an attacker will attempt to connect to the entity and exfiltrate all the data it has access to. In the same way that you wouldn’t implicitly trust a user to access PII, you shouldn’t automatically trust an API either.  

That’s why it’s essential to implement a zero trust strategy, and deploy an authentication and authorization mechanism for each individual API to prevent unauthorized individuals from accessing your data. 

“When you have sensitive data (in this case customer phone numbers, billing and email addresses, etc.) sprawled across databases, mixed with other data, and access to that data not properly managed, these types of breaches are hard to avoid,” said Anushu Sharma, co-founder and CEO of Skyflow. 

“The best-run companies with the most sensitive data know that they must adopt new zero-trust architectures. Bad actors are getting smarter. Adopting new privacy technology isn’t an option anymore, it’s table stakes,” Sharma said.

Combining access control frameworks like OAuth2 with authentication measures such as username and password and API keys, can help enforce the principle of least privilege and ensure that users have access only to the information they need to perform their role.

The post T-Mobile data breach shows API security can’t be ignored appeared first on Venture Beat.

Share216Tweet135Share

Trending Posts

Their American Dream Is Being Washed Away

Their American Dream Is Being Washed Away

February 4, 2023
New Jersey councilman charged with selling cocaine, meth to undercover cop

New Jersey councilman charged with selling cocaine, meth to undercover cop

February 4, 2023
Top 5 stories of the week: One word: ChatGPT

Top 5 stories of the week: One word: ChatGPT

February 4, 2023
Amateurs Flocked to Pickleball. But Will They Watch the Pros?

Will Pickleball Be as Fun to Watch As It Is to Play?

February 4, 2023
What Is The Gas App? Discord Bought The Compliments-Based Platform

What Is The Gas App? Discord Bought The Compliments-Based Platform

February 4, 2023

Copyright © 2023.

Site Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Follow Us

No Result
View All Result
  • Home
  • News
    • U.S.
    • World
    • Politics
    • Opinion
    • Business
    • Crime
    • Education
    • Environment
    • Science
  • Entertainment
    • Culture
    • Gaming
    • Music
    • Movie
    • Sports
    • Television
    • Theater
  • Tech
    • Apps
    • Autos
    • Gear
    • Mobile
    • Startup
  • Lifestyle
    • Arts
    • Fashion
    • Food
    • Health
    • Travel

Copyright © 2023.

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT