{"id":599721,"date":"2023-01-21T06:49:41","date_gmt":"2023-01-21T12:49:41","guid":{"rendered":"https:\/\/news.sellorbuyhomefast.com\/index.php\/2023\/01\/21\/t-mobile-data-breach-shows-api-security-cant-be-ignored\/"},"modified":"2023-01-21T06:49:41","modified_gmt":"2023-01-21T12:49:41","slug":"t-mobile-data-breach-shows-api-security-cant-be-ignored","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2023\/01\/21\/t-mobile-data-breach-shows-api-security-cant-be-ignored\/","title":{"rendered":"T-Mobile data breach shows API security can\u2019t be ignored"},"content":{"rendered":"<p>Enterprise security isn\u2019t easy. Small oversights around systems and vulnerabilities can result in data breaches that impact millions of users. Unfortunately, one of the most common oversights is in the realm of <a href=\"https:\/\/venturebeat.com\/2022\/06\/11\/apis-create-digital-empathy\/\">APIs<\/a>.\u00a0<\/p>\n<p>Just yesterday, <a href=\"https:\/\/www.t-mobile.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">T-Mobile<\/a> revealed that a threat actor stole the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/t-mobile-hacked-to-steal-data-of-37-million-accounts-in-api-data-breach\/\" target=\"_blank\" rel=\"noreferrer noopener\">personal information<\/a> of 37 million postpaid and prepaid customer accounts via an exposed API (which they exploited between November 25, 2022 and January 5, 2023). The vendor didn\u2019t share how the hackers exploited the API.\u00a0<\/p>\n<p>This incident highlights that API security should be at the top of the agenda for CISOs and organizations if they want to safeguard customer data from falling into the wrong hands.\u00a0<\/p>\n<p>With <a href=\"https:\/\/venturebeat.com\/data-infrastructure\/report-cloud-adoption-success-depends-on-its-relationship-with-business\/\">cloud adoption<\/a> increasing dramatically over the past few years, analysts have long warned enterprises that a tidal wave of API exploitation has been brewing. Back in 2021, <a href=\"https:\/\/www.gartner.com\/en\/documents\/4009103\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner<\/a> predicted that in 2023, API abuse would move from infrequent to the most frequent attack vector.\u00a0<\/p>\n<div><body><\/p>\n<div id=\"boilerplate_2803147\">\n<h3>Event<\/h3>\n<div>\n<p><span>Intelligent Security Summit On-Demand<\/span><\/p>\n<p><span>Learn the critical role of AI &#038; ML in cybersecurity and industry specific case studies. Watch on-demand sessions today.<\/span><\/p>\n<\/div>\n<p><a href=\"https:\/\/avolio.swapcard.com\/intelligentsecuritysummit2022\/registrations\/Start?utm_source=vb&#038;utm_medium=incontent&#038;utm_content=ondemand&#038;utm_campaign=IS22_InContent\"><br \/>\n                Watch Here            <\/a>\n                        <\/p>\n<\/div>\n<p><\/body><\/p>\n<p>These predictions appear to be accurate, with <a href=\"https:\/\/venturebeat.com\/security\/data-breaches-api\/\">research<\/a> showing that 53% of security and engineering professionals reported their organizations experienced a <a href=\"https:\/\/venturebeat.com\/security\/gemini-uber-data-breaches\/\">data breach<\/a> of a network or app due to compromised API tokens.\u00a0<\/p>\n<p>In addition, just a month ago, hackers <a href=\"https:\/\/venturebeat.com\/security\/twitter-social-engineering\/\">exposed<\/a> the account and email addresses of 235 million <a href=\"https:\/\/twitter.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Twitter<\/a> users after exploiting an API vulnerability originally shipped in June 2021, which was later patched.\u00a0<\/p>\n<p>As threat actors look to exploit APIs more often, organizations can\u2019t afford to rely on legacy <a href=\"https:\/\/venturebeat.com\/security\/what-is-cybersecurity-definition-importance-threats-and-best-practices\/\">cybersecurity<\/a> solutions to protect this vast attack surface. Unfortunately, upgrading to up-to-date solutions is easier said than done.\u00a0<\/p>\n<p>\u201cUnauthorized API access can be extremely difficult for organizations to monitor and investigate \u2014 especially for enterprise companies \u2014 due to the sheer volume of them,\u201d said Chris Doman, CTO and cofounder of <a href=\"https:\/\/www.cadosecurity.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cado Security<\/a>.\u00a0<\/p>\n<p>\u201cAs more organizations are moving data to the cloud, API security becomes even more pertinent with distributed systems,\u201d Doman said.\u00a0<\/p>\n<p>Doman notes that organizations looking to insulate themselves from incidents like T-Mobile experienced need to have \u201cproper visibility\u201d into API access and activity beyond traditional logging.\u00a0<\/p>\n<p>This is important because logging can be sidestepped \u2014 as was the case with a <a href=\"https:\/\/securitylabs.datadoghq.com\/articles\/iamadmin-cloudtrail-bypass\/\" target=\"_blank\" rel=\"noreferrer noopener\">vulnerability<\/a> in AWS\u2019 APIs that allowed attackers to bypass CloudTrail logging.\u00a0<\/p>\n<h2 id=\"h-how-bad-is-the-t-mobile-api-data-breach\">How bad is the T-Mobile API data breach?\u00a0<\/h2>\n<p>While T-Mobile has claimed that the attackers weren\u2019t able to access users\u2019 payment card information, passwords, driver\u2019s licenses, government IDs or social security numbers, the information that was harvested provides ample material to conduct social engineering attacks.\u00a0<\/p>\n<p>\u201cAlthough T-Mobile has publicly disclosed the severity of the incident, alongside its response \u2014 cutting off threat-actor access via the API exploit \u2014 the breach still compromised billing addresses, emails, phone numbers, birth dates and more,\u201d said Cliff Steinhauer, director of information security and engagement at <a href=\"https:\/\/staysafeonline.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">NCA<\/a>.\u00a0<\/p>\n<p>\u201cIt\u2019s basic information, but just enough to map out and execute a convincing enough social engineering campaign that can strengthen bad actors\u2019 capacity for new attacks,\u201d Steinhauer said.\u00a0<\/p>\n<p>These attacks include <a href=\"https:\/\/venturebeat.com\/security\/report-phishing-attacks-jump-61-in-2022-with-255m-attacks-detected\/\">phishing attacks<\/a>, <a href=\"https:\/\/venturebeat.com\/datadecisionmakers\/what-you-need-to-know-about-online-identity-theft\/\">identity theft<\/a>, <a href=\"https:\/\/venturebeat.com\/security\/fbi-business-email-compromise\/\">business email compromise<\/a> (BEC) and <a href=\"https:\/\/venturebeat.com\/security\/report-90-of-companies-affected-by-ransomware-in-2022\/\">ransomware<\/a>.<\/p>\n<h2 id=\"h-why-do-api-breaches-happen\">Why do API breaches happen?<\/h2>\n<p>APIs are a prime target for threat actors because they facilitate communication between different apps and services. Each API sets out a mechanism for sharing data with third-party services. If an attacker discovers a vulnerability in one of these services, they can gain access to the underlying data as part of a man-in-the-middle attack.\u00a0<\/p>\n<p>There is an increase in API-based attacks \u2014 not because these elements are necessarily insecure, but because many security teams don\u2019t have the processes in place to identify and classify APIs at scale, let alone remediate vulnerabilities.<\/p>\n<p>\u201cAPIs are designed to provide ready access to applications and data. This is a great benefit to developers, but also a boon for attackers,\u201d said Mark O\u2019Neill, VP analyst at Gartner. \u201cProtecting APIs starts with discovering and categorizing your APIs. You can\u2019t secure what you don\u2019t know.\u201d \u00a0<\/p>\n<p>Of course, inventorying APIs is just the tip of the iceberg; security teams also need a strategy to secure them.\u00a0<\/p>\n<p>\u201cThen it involves the use of API gateways, web application and API protection (WAAP), and application security testing. A key problem is that API security falls into two groups: engineering teams, who lack security skills, and security teams, who lack API skills.\u201d\u00a0<\/p>\n<p>Thus, organizations need to implement a DevSecOps-style approach to better assess the security of applications in use (or in development) within the environment, and develop a strategy to secure them.\u00a0<\/p>\n<h2 id=\"h-identifying-and-mitigating-api-vulnerabilities\">Identifying and mitigating API vulnerabilities\u00a0<\/h2>\n<p>One way organizations can start to identify vulnerabilities in APIs is to implement penetration testing. Conducting an internal or third party-led penetration test can help security teams see how vulnerable to exploitation an API is, and provide actionable steps on how they can improve their cloud security posture over time.<\/p>\n<p>\u201cFor all types of software, it\u2019s vital that companies use updated code and check the security of their systems, e.g., by arranging penetration testing \u2014 a security assessment that simulates various types of intruders \u2026 the goal of which is to elevate the current privileges and access the environment,\u201d said David Emm, principal security researcher at <a href=\"https:\/\/usa.kaspersky.com\/\">Kaspersky<\/a>.<\/p>\n<p>In addition, it\u2019s a good idea for organizations to invest in incident response, so if an API is exploited, they can respond quickly to limit the impact of the breach.<\/p>\n<p>\u201cTo be on the safe side when a company is faced with an incident, incident response services can help minimize the consequences, in particular by identifying compromised nodes and protecting the infrastructure from similar attacks in the future,\u201d Emm said.<\/p>\n<h2 id=\"h-the-role-of-zero-trust\">The role of zero trust\u00a0<\/h2>\n<p>Unauthenticated, public-facing APIs are susceptible to malicious API calls, where an attacker will attempt to connect to the entity and exfiltrate all the data it has access to. In the same way that you wouldn\u2019t implicitly trust a user to access PII, you shouldn\u2019t automatically trust an API either.\u00a0\u00a0<\/p>\n<p>That\u2019s why it\u2019s essential to implement a <a href=\"https:\/\/venturebeat.com\/security\/zero-trust-is-critical-as-more-enterprises-sacrifice-security-for-speed\/\">zero trust<\/a> strategy, and deploy an authentication and authorization mechanism for each individual API to prevent unauthorized individuals from accessing your data.\u00a0<\/p>\n<p>\u201cWhen you have sensitive data (in this case customer phone numbers, billing and email addresses, etc.) sprawled across databases, mixed with other data, and access to that data not properly managed, these types of breaches are hard to avoid,\u201d said Anushu Sharma, co-founder and CEO of <a href=\"https:\/\/www.skyflow.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Skyflow<\/a>.\u00a0<\/p>\n<p>\u201cThe best-run companies with the most sensitive data know that they must adopt new zero-trust architectures. Bad actors are getting smarter. Adopting new privacy technology isn\u2019t an option anymore, it\u2019s table stakes,\u201d Sharma said.<\/p>\n<p>Combining access control frameworks like OAuth2 with authentication measures such as username and password and API keys, can help enforce the principle of least privilege and ensure that users have access only to the information they need to perform their role.<\/p>\n<p><strong>VentureBeat&#8217;s mission<\/strong> is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. <a href=\"https:\/\/info.venturebeat.com\/website-preference-center.html?utm_source=VBsite&#038;utm_medium=bottomBoilerplate\" data-type=\"URL\" data-id=\"https:\/\/info.venturebeat.com\/website-preference-center.html\">Discover our Briefings.<\/a><\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/venturebeat.com\/security\/t-mobile-data-breach-shows-api-security-cant-be-ignored\/\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Tim Keary<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Enterprise security isn\u2019t easy. Small oversights around systems and vulnerabilities can result in data breaches that impact millions of users. Unfortunately, one of the most common oversights is in the realm of APIs.\u00a0Just yesterday, T-Mobile revealed that a threat actor stole the personal information of 37 million postpaid and prepaid customer accounts via an exposed<\/p>\n","protected":false},"author":1,"featured_media":599722,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[252,22286,46],"tags":[],"class_list":{"0":"post-599721","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-breach","8":"category-t-mobile","9":"category-technology"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/599721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=599721"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/599721\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/599722"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=599721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=599721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=599721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}