SlideShare a Scribd company logo
Data Breaches:
How API’s have become the key
attack vector
Sudeep Padiyar
Founding Member, Product Management
Traceable AI
Tim Davis
Director of Risk, Move Money Products
Chime
Agenda
● Latest Data breach Statistics
● Evolution of Fraud with modern apps and API’s
● Data exfiltration protection at the API layer
● Key tenets of API Abuse Prevention
● Product Demo
● Q&A
Data Breaches Verizon DBIR Statistics
Abuse Patterns in Data
breaches
Data Breach
Categories
Sensitive Data Exposure by Type
Data breaches consequences
Customer Information is Exfiltrated:
● Data sold on dark web to
fraudulent end users
● User information used to
create new account in
customer name at other
businesses
● Customer financial accounts
monetized
● New credit accounts opened in
customers’ names
Customer Credentials Are Stolen
● Fraudulent Actors are able to access
customer accounts
● Additional customer data is
extracted through customer user
interface
● Purchases made in customer name
● Customer financial accounts
monetized
● Rewards and/or incentive accounts
monetized
APIs Control Everything
Online Travel
Digital Payments
e-Commerce
Online Brokerage
API Abuse outside of data breaches
With Access to APIs, Malicious Users Can:
- Increase reward program balances
- Lower merchandise pricing
- Manipulate inventory availability
- Gift Card and Referral frauds
- Bypass policies and controls
Modern cloud native architectures
K8s
LB, Proxy,
Gateway
Edge
VM
Serverl
ess
Browser
Mobile
3rd Party
API’s are the attack surface for data breaches
K8s
LB, Proxy,
Gateway
Edge
VM
Serverl
ess
MicroService
MicroService
MicroService
MicroService
MicroService
MicroService
Using Tracing and API patterns for anomaly detection
Behavioral Baseline
1. Digital Fingerprint: User agent, GeLocation, IP category etc
2. User ID: JWT/Basic Auth, Request header etc
3. Access pattern of Sensitive data per and across sessions
4. API sequence, Inter-API time interval
5. Sensitive Data flow between API’s
11
Data Exfiltration Prevention
● Track volumes of Sensitive
data traversing between API’s
over time
● Highlight anomaly if sensitive
data volume increases
significantly over baseline for
same user or across users
● Customizable Data Sets - PCI,
PII, HIPAA or custom sets
● API Centric Data exfiltration
view
● Sensitive data exposure to
External API’s
● Categorize users accessing
data through API’s -
○ Partners
○ Data Owners
○ Threat Actors
● Sensors to improve detection
accuracy -
○ GeoLocation
○ IP reputation
○ Cloud/Hosted/Reside
ntial IP
○ Tor/Botnet/Proxy
● Co-relate with increases in
ATO/Excessive login
attempts
PCI
HIPAA
GDPR
CCPA API
12
API Fraud
● Watch Materially sensitive data
(account balance, price, game
score etc)
● Data usage patterns via API’s by
users/groups will be learnt for
watched data over time
● Use User Attribution and
Digital Fingerprint to
correlate user behavior
across API’s
● Account for Tokenization for
credit cards, crypto
currencies and other
materially significant data.
● Sensors to bump up fraud risk -
○ GeoLocation
○ IP reputation
○ Cloud/Hosted/Residen
tial IP
○ Tor/Botnet/Proxy
● Co-relate with increases in
ATO/Excessive login
attempts
13
Data Exfiltration Dashboard
14
Data Exfiltration Services View
15
Data Exfiltration User View
16
➔ Sensitive data flow predominantly through API’s given cloud native app design
➔ Baselining behavior based on User, Device, API and sensitive data types are key
➔ Anomaly detection can solve a good fraction of Business logic abuse attacks
➔ Data flow and risk drives modern application security
➔ Data breaches and Fraud via API’s are on the rise and need to be stopped
Recap
Sudeep Padiyar
Founding Member, Product Management
Traceable AI
Thank you.
Tim Davis
Director of Risk, Move Money Products
Chime

More Related Content

PPTX
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
PDF
Privacera Databricks CCPA Webinar Feb 2020
PPTX
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
PDF
Single Sign On IDM Value
PPTX
Chanchal ODSC-fraud-2017
PDF
Applying Innovative Tools for GDPR Success
PDF
ForMotiv - InsurTech Innovation Award 2022
PPTX
Big Data as Competitive Advantage in Financial Services
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
Privacera Databricks CCPA Webinar Feb 2020
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
Single Sign On IDM Value
Chanchal ODSC-fraud-2017
Applying Innovative Tools for GDPR Success
ForMotiv - InsurTech Innovation Award 2022
Big Data as Competitive Advantage in Financial Services

Similar to 2022 APIsecure_API Abuse - How data breaches now and in the future will use API's as the attack vector (20)

PDF
Understanding Identity Management and Security.
PDF
Digital banking Account Take Over
PDF
Security Requirements for Fantasy App Development in 2024.pdf
PPTX
Ping Identity: Corporate Overview Financial Services
PDF
What is Web Scraping? – A Guide On Website Data Scraping
PDF
APIsecure 2023 - Discovery is the Starting Point for Defending APIs, Giora En...
PPTX
Hadoop and Financial Services
PPTX
Relying on Data for Strategic Decision-Making--Financial Services Experience
PDF
Super data-charging your corruption reviews with integrated analytics
PPTX
The digital transformation of retail
PDF
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
PPTX
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
PDF
Unraveling the GDPR Compliance
PDF
Understanding the impact of your fraud strategy
PDF
MSME NEO Banking Platform
PPTX
APIdays Open Banking & Fintech: Workshop - Financial Services Use Cases for APIs
PDF
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
PDF
Reach targeted audience segments with top-quality 3rd party data.
PDF
Increase online growth: In 4 steps optimal data orchestration
PPTX
Managing Sensitive Information in an API and Microservices World
Understanding Identity Management and Security.
Digital banking Account Take Over
Security Requirements for Fantasy App Development in 2024.pdf
Ping Identity: Corporate Overview Financial Services
What is Web Scraping? – A Guide On Website Data Scraping
APIsecure 2023 - Discovery is the Starting Point for Defending APIs, Giora En...
Hadoop and Financial Services
Relying on Data for Strategic Decision-Making--Financial Services Experience
Super data-charging your corruption reviews with integrated analytics
The digital transformation of retail
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
Unraveling the GDPR Compliance
Understanding the impact of your fraud strategy
MSME NEO Banking Platform
APIdays Open Banking & Fintech: Workshop - Financial Services Use Cases for APIs
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Reach targeted audience segments with top-quality 3rd party data.
Increase online growth: In 4 steps optimal data orchestration
Managing Sensitive Information in an API and Microservices World
Ad

More from APIsecure_ Official (20)

PPTX
2022 APIsecure_The Real World, API Security Edition
PDF
2022 APIsecure_Learn from the Past, Secure the Present, Plan for the Future: ...
PDF
2022 APIsecure_Shift Left API Security - The Right Way
PDF
2022 APIsecure_A day in the life of an API; Fighting the odds
PDF
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
PDF
2022 APIsecure_Securing Large API Ecosystems
PDF
2022 APIsecure_Quarterly Review of API Vulnerabilities
PPTX
2022 APIsecure_Top Ten Security Tips for APIs
PPTX
2022 APIsecure_Are your APIs Rugged Enough?
PPTX
2022 APIsecure_Making webhook APIs secure for enterprise
PDF
2022 APIsecure_API Security & Fraud Detection - Are you ready?
PPTX
2022 APIsecure_Monitoring and Responding to API Breaches
PDF
2022 APIsecure_Exploiting multi-step business logic vulnerabilities in APIs
PPTX
2022 APIsecure_API Security Testing: The Next Step in Modernizing AppSec
PPTX
2022 APIsecure_Realizing the Full Cloud Native Potential With a Multi-Layered...
PPTX
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
PPTX
2022 APIsecure_Hackers with Valid Credentials
PDF
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
PDF
2022 APIsecure_Harnessing the Speed of Innovation
PDF
2022 APIsecure_API Discovery: First step towards API Security
2022 APIsecure_The Real World, API Security Edition
2022 APIsecure_Learn from the Past, Secure the Present, Plan for the Future: ...
2022 APIsecure_Shift Left API Security - The Right Way
2022 APIsecure_A day in the life of an API; Fighting the odds
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
2022 APIsecure_Securing Large API Ecosystems
2022 APIsecure_Quarterly Review of API Vulnerabilities
2022 APIsecure_Top Ten Security Tips for APIs
2022 APIsecure_Are your APIs Rugged Enough?
2022 APIsecure_Making webhook APIs secure for enterprise
2022 APIsecure_API Security & Fraud Detection - Are you ready?
2022 APIsecure_Monitoring and Responding to API Breaches
2022 APIsecure_Exploiting multi-step business logic vulnerabilities in APIs
2022 APIsecure_API Security Testing: The Next Step in Modernizing AppSec
2022 APIsecure_Realizing the Full Cloud Native Potential With a Multi-Layered...
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
2022 APIsecure_Hackers with Valid Credentials
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
2022 APIsecure_Harnessing the Speed of Innovation
2022 APIsecure_API Discovery: First step towards API Security
Ad

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Cloud computing and distributed systems.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
Teaching material agriculture food technology
PDF
Modernizing your data center with Dell and AMD
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
cuic standard and advanced reporting.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Big Data Technologies - Introduction.pptx
PDF
Encapsulation theory and applications.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Machine learning based COVID-19 study performance prediction
Spectral efficient network and resource selection model in 5G networks
The AUB Centre for AI in Media Proposal.docx
Cloud computing and distributed systems.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Teaching material agriculture food technology
Modernizing your data center with Dell and AMD
Understanding_Digital_Forensics_Presentation.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
cuic standard and advanced reporting.pdf
Chapter 3 Spatial Domain Image Processing.pdf
MYSQL Presentation for SQL database connectivity
Big Data Technologies - Introduction.pptx
Encapsulation theory and applications.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Machine learning based COVID-19 study performance prediction

2022 APIsecure_API Abuse - How data breaches now and in the future will use API's as the attack vector

  • 1. Data Breaches: How API’s have become the key attack vector Sudeep Padiyar Founding Member, Product Management Traceable AI Tim Davis Director of Risk, Move Money Products Chime
  • 2. Agenda ● Latest Data breach Statistics ● Evolution of Fraud with modern apps and API’s ● Data exfiltration protection at the API layer ● Key tenets of API Abuse Prevention ● Product Demo ● Q&A
  • 3. Data Breaches Verizon DBIR Statistics Abuse Patterns in Data breaches Data Breach Categories
  • 5. Data breaches consequences Customer Information is Exfiltrated: ● Data sold on dark web to fraudulent end users ● User information used to create new account in customer name at other businesses ● Customer financial accounts monetized ● New credit accounts opened in customers’ names Customer Credentials Are Stolen ● Fraudulent Actors are able to access customer accounts ● Additional customer data is extracted through customer user interface ● Purchases made in customer name ● Customer financial accounts monetized ● Rewards and/or incentive accounts monetized
  • 6. APIs Control Everything Online Travel Digital Payments e-Commerce Online Brokerage
  • 7. API Abuse outside of data breaches With Access to APIs, Malicious Users Can: - Increase reward program balances - Lower merchandise pricing - Manipulate inventory availability - Gift Card and Referral frauds - Bypass policies and controls
  • 8. Modern cloud native architectures K8s LB, Proxy, Gateway Edge VM Serverl ess Browser Mobile 3rd Party
  • 9. API’s are the attack surface for data breaches K8s LB, Proxy, Gateway Edge VM Serverl ess MicroService MicroService MicroService MicroService MicroService MicroService
  • 10. Using Tracing and API patterns for anomaly detection Behavioral Baseline 1. Digital Fingerprint: User agent, GeLocation, IP category etc 2. User ID: JWT/Basic Auth, Request header etc 3. Access pattern of Sensitive data per and across sessions 4. API sequence, Inter-API time interval 5. Sensitive Data flow between API’s
  • 11. 11 Data Exfiltration Prevention ● Track volumes of Sensitive data traversing between API’s over time ● Highlight anomaly if sensitive data volume increases significantly over baseline for same user or across users ● Customizable Data Sets - PCI, PII, HIPAA or custom sets ● API Centric Data exfiltration view ● Sensitive data exposure to External API’s ● Categorize users accessing data through API’s - ○ Partners ○ Data Owners ○ Threat Actors ● Sensors to improve detection accuracy - ○ GeoLocation ○ IP reputation ○ Cloud/Hosted/Reside ntial IP ○ Tor/Botnet/Proxy ● Co-relate with increases in ATO/Excessive login attempts PCI HIPAA GDPR CCPA API
  • 12. 12 API Fraud ● Watch Materially sensitive data (account balance, price, game score etc) ● Data usage patterns via API’s by users/groups will be learnt for watched data over time ● Use User Attribution and Digital Fingerprint to correlate user behavior across API’s ● Account for Tokenization for credit cards, crypto currencies and other materially significant data. ● Sensors to bump up fraud risk - ○ GeoLocation ○ IP reputation ○ Cloud/Hosted/Residen tial IP ○ Tor/Botnet/Proxy ● Co-relate with increases in ATO/Excessive login attempts
  • 16. 16 ➔ Sensitive data flow predominantly through API’s given cloud native app design ➔ Baselining behavior based on User, Device, API and sensitive data types are key ➔ Anomaly detection can solve a good fraction of Business logic abuse attacks ➔ Data flow and risk drives modern application security ➔ Data breaches and Fraud via API’s are on the rise and need to be stopped Recap
  • 17. Sudeep Padiyar Founding Member, Product Management Traceable AI Thank you. Tim Davis Director of Risk, Move Money Products Chime