SlideShare a Scribd company logo
© 2024 Akamai
1
API Security Best
Practices:
Lessons Learned from
Real-World Attacks and Breaches
Boon Wah, Tay
郑文华 鄭文華 정문하 テイブーンワ
API Security Solutions Specialist
Senior Solutions Engineer
28 Sep 2024
© 2024 Akamai
2
API - Application Programming Interface
© 2024 Akamai
3
API – Application Programming Interface
• Set of rules or programming to allow applications to interface or
communicate between each other.
• Simply put.. a piece of code talking to another piece of code
• API architecture is usually explained in terms of client and server. The
application sending the request is called the client, and the application
sending the response is called the server.
Your Program
(in language X)
Your Program
(in language Y)
● Operating systems APIs
● Remote APIs
● Database APIs
● Web APIs
© 2024 Akamai
4
APIs Power the Modern World
Mission Critical Operations, Digital Transformation, and Information Availability – All Rely on APIs
© 2024 Akamai
5
API Security Incidents
- Major Data Breach
- Fraudulent Financial Transactions
© 2024 Akamai
6
https://www.bleepingcomputer.com/news/security/dell-api-abused-to-steal-49-million-customer-records-in-data-breach/
© 2024 Akamai
7
https://www.bankinfosecurity.com/google-settles-google-api-data-leak-lawsuit-for-350m-a-24296?trk=feed_main-feed-card_feed-article-content
• Google+ API that allowed outside developers to access users' private profile data.
• Up to 438 third-party apps likely had access to the API.
• Access to data including photos, relationship status, email and home addresses
• Discovered in March 2018 a glitch dating to 2015
© 2024 Akamai
8
APIs Attacks Are the New Normal
Recent major breaches caused by API exploitation
76% of organizations have had an
API-related breach in the past year*
Sensitive Health Data for 3.9M Customers
$35M hit to revenue
$34M Customer Funds Stolen
Reputation Damaged
2.8 M Customer IDs
$50M Fine Proposed
22.5M Gov Identity Records
68% of citizens at risk for identity theft
37m Customer Records
Brand Impact & Fines Likely
300K Customer Emails
Public Apology
National Registration
Dept of Malaysia
500K+ Customers’ PII Exposed
Brand Impact and Fines
3200+ Apps Exposed
200 Million Records
Source Code & Customer PII
Critical IP Stolen
*API Security Disconnect, Akamai Study, 2022
© 2024 Akamai
9
API Attacks
- Business Logic Flaws
© 2024 Akamai
10
API Attacks are Different
Web Security
Protection
Attacker
Web /
Mobile
App
API
Back-end
Data /
App
Crown
Jewel
Yesterday’s Attacks
Today’s Attacks
© 2024 Akamai
11
API Attacks are Different
Web Security
Protection
Attacker
Web /
Mobile
App
API
Back-end
Data /
App
• Attackers, are going right around your web & mobile app, straight to the API and then the back-end, where the
valuable data (crown jewel) is stored!!!
• Attackers are by-passing all the traditional web & mobile app security protection.
• API breaches exploit business logic flaws or gaps in authorization or weak authentication and the like.
Crown
Jewel
© 2024 Akamai
12
OWASP API Security Top 10 2019
https://owasp.org/www-project-api-security/
© 2024 Akamai
13
OWASP API Security Top 10 2023
https://owasp.org/www-project-api-security/
API1:2023 Broken Object Level Authorization
API2:2023 Broken Authentication
API3:2023 Broken Object Property Level Authorization
API4:2023 Unrestricted Resource Consumption
API5:2023 Broken Function Level Authorization
API6:2023 Unrestricted Access to Sensitive Business Flows
API7:2023 Server Side Request Forgery
API8:2023 Security Misconfiguration
API9:2023 Improper Inventory Management
API10:2023 Unsafe Consumption of APIs
© 2024 Akamai
14
OWASP Top 10 2019 to 2023
API1:2023 - Broken Object Level Authorization
API2:2023 - Broken Authentication
API3:2023 - Broken Object Property Level Authorization
API4:2023 - Unrestricted Resource Consumption
API5:2023 - Broken Function Level Authorization
API8:2023 - Security Misconfiguration
API9:2023 - Improper Inventory Management
API1:2019 - Broken Object Level Authorization
API2:2019 - Broken User Authentication
API3:2019 - Excessive Data Exposure
API4:2019 - Lack of Resources & Rate Limiting
API5:2019 - Broken Function Level Authorization
API6:2019 - Mass Assignment
API7:2019 - Security Misconfiguration
API8:2019 - Injection
API9:2019 - Improper Assets Management
API10:2019 - Insufficient Logging & Monitoring
API6:2023 - Unrestricted Access to Sensitive Business Flows
API7:2023 - Server Side Request Forgery
API10:2023 - Unsafe Consumption of APIs
Legend Unchanged Renamed Merged New Removed
© 2024 Akamai
15
© 2024 Akamai
16
Broken Object Level Authorization (BOLA)
• User A can access other users’ record (or data object)
• API Endpoint have insufficient access controls – No Authorization Check of the data object
• Violation of Zero Trust leads to Major Data Breach or Fraudulent Transactions
User A
User A Data
User B Data
User C Data
User N Data
Rightful Access (1-to-1 Mapping)
Data Access due to No Authorization Check
(1-to-Many Mapping)
© 2024 Akamai
17
© 2024 Akamai
18
© 2024 Akamai
19
© 2024 Akamai
20
Broken Object Level Authorization
What if I replace id1
with id2 and view
someone else’s data
Alice
Attacker
GET/accounts/id1/financial_info
GET/accounts/id2/financial_info
© 2024 Akamai
21
Data Exfiltration
Legit Behavior
JWT Token of
Francis
API URI with User ID of Francis
© 2024 Akamai
22
Data Exfiltration
Legit Behavior
Personal Data of
Francis
© 2024 Akamai
23
Data Exfiltration
Anomaly
User ID had changed
Same JWT Token
of Francis was
used
API Hacking
© 2024 Akamai
24
Data Exfiltration
Anomaly
API Hacking
Now Reading Other
People’s Data
© 2024 Akamai
25
Data Exfiltration
Anomaly
API Hacking
Now Reading More Other
People’s Data
© 2024 Akamai
26
Data Exfiltration
Data Exfiltration
API Hacking
All of them are 200 OK! That’s Bad!!!
Appear Normal to WAF or API Gateway
© 2024 Akamai
27
© Akamai API Security. All rights
reserved.
[ Optus Data Breach]
● Company: Optus
● Industry: Telco
● Impact: ~600M USD
● Vulnerability:
○ Unauthenticated, publicly exposed
API Endpoint
○ Excessive Data Exposure
○ Incrementing Customer Identifiers
© 2024 Akamai
28
https://www.bankinfosecurity.com/optus-under-1-million-extortion-threat-in-data-breach-a-20142 https://www.bankinfosecurity.com/optus-under-1-million-extortion-threat-in-data-breach-a-20142
© 2024 Akamai
29
https://www.straitstimes.com/business/companies-markets/singtels-profit-risks-erosion-from-optus-data-hack-in-australia
© 2024 Akamai
30 https://www.bankinfosecurity.com/optus-under-1-million-extortion-threat-in-data-breach-a-20142
"No authenticate
needed. That is bad
access control. All
open to internet for
any one to use."
© 2024 Akamai
31
https://mango.pdf.zone/finding-former-australian-prime-mi
nister-tony-abbotts-passport-number-on-instagram
API and Boarding Pass
© 2024 Akamai
32
© 2024 Akamai
33
The Akamai API Security Platform
Complete API security covers the entire lifecycle of an API
Locate and inventory all of your
APIs and related risk, from both
the inside-out and outside-in
Discovery
Uncover vulnerabilities and
misconfigurations to speed
remediation and ensure
compliance
Detect and block API attacks
with real-time traffic analysis
powered by machine learning
Find and remediate API
vulnerabilities during the
development lifecycle
Posture Runtime Testing
© 2024 Akamai
34
Applications are
at the center of
everything we do.
We protect the applications
you build everywhere,
every time without
compromising performance
or customer experience.
© 2024 Akamai
35
Boon Wah, Tay
Senior Solutions Engineer
Akamai Technologies
https://www.linkedin.com/in/boonwah/
Thank You!

More Related Content

PDF
CyberJutsu - The Joern-ey of Static Code Analysis.pdf
PDF
First Step into Your House: Các kỹ thuật xâm nhập hệ thống phổ biến từ các sự...
PDF
Modern Security Operations - Building and leading modern SOC
PDF
ROP 輕鬆談
PDF
INTERFACE by apidays 2023 - Everything you need to know about API security, T...
PPTX
Consumer behaviour and utility analysis
PPTX
Windows Client Privilege Escalation-Shared.pptx
PPTX
Depression
CyberJutsu - The Joern-ey of Static Code Analysis.pdf
First Step into Your House: Các kỹ thuật xâm nhập hệ thống phổ biến từ các sự...
Modern Security Operations - Building and leading modern SOC
ROP 輕鬆談
INTERFACE by apidays 2023 - Everything you need to know about API security, T...
Consumer behaviour and utility analysis
Windows Client Privilege Escalation-Shared.pptx
Depression

What's hot (20)

PPTX
Popping Pitch Deck
PDF
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
PDF
API Gateway How-To: The Many Ways to Apply the Gateway Pattern
PPTX
Dynatrace
PPTX
What is an API Gateway?
PPTX
What's New in API Connect & DataPower Gateway in 1H 2018
PDF
Open Banking 3.0 Partner Deck - MEA webinar
PPTX
SSO introduction
PPTX
Microservice intro
PPTX
How Schneider Electric Assures Its Salesforce Lightning Migration with Thousa...
PPTX
What do you mean by “API as a Product”?
PPTX
Patterns of enterprise application architecture
PPTX
Akamai Intelligent Edge Security
PDF
Api Gateway
PDF
Microservice architecture
PDF
Architecting an Enterprise API Management Strategy
PPTX
Exploring Universal API Management And Flex Gateway
PPTX
Anypoint monitoring capabilities
PPTX
Azure App Service
PDF
5. Core Banking System
Popping Pitch Deck
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
API Gateway How-To: The Many Ways to Apply the Gateway Pattern
Dynatrace
What is an API Gateway?
What's New in API Connect & DataPower Gateway in 1H 2018
Open Banking 3.0 Partner Deck - MEA webinar
SSO introduction
Microservice intro
How Schneider Electric Assures Its Salesforce Lightning Migration with Thousa...
What do you mean by “API as a Product”?
Patterns of enterprise application architecture
Akamai Intelligent Edge Security
Api Gateway
Microservice architecture
Architecting an Enterprise API Management Strategy
Exploring Universal API Management And Flex Gateway
Anypoint monitoring capabilities
Azure App Service
5. Core Banking System
Ad

Similar to Akamai_ API Security Best Practices - Real-world attacks and breaches (20)

PPTX
Apidays London 2024 - Securing APIs, Beyond the Basics with Advanced Security...
PDF
Apidays Helsinki & North 2024 - From Chaos to Calm- Navigating Emerging API ...
PPTX
Research Reveals: Current Threats to APIs and Possible Mitigations - Eli Arku...
PDF
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
PDF
What Is API Security? Threats, Tools, and Best Practices in 2025 | USCSI®
PDF
LF_APIStrat17_OWASP’s Latest Category: API Underprotection
PPTX
apidays Munich 2025 - Effectively incorporating API Security into the overall...
PPTX
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
PDF
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
PDF
WEBINAR: OWASP API Security Top 10
PDF
F5-API-Security-Best-Practices.pdf
PDF
Protecting Microservices APIs with 42Crunch API Firewall
PDF
OWASP API Security Top 10 - Austin DevSecOps Days
PDF
apidays Australia 2023 - API Security Breach Analysis & Empowering Devs to M...
PDF
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
PPTX
Managing Identity without Boundaries
PDF
Cyberlands Sales Deck
PDF
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
PDF
API Security Best Practices and Guidelines
PDF
Mobile Defense-in-Dev (Depth)
Apidays London 2024 - Securing APIs, Beyond the Basics with Advanced Security...
Apidays Helsinki & North 2024 - From Chaos to Calm- Navigating Emerging API ...
Research Reveals: Current Threats to APIs and Possible Mitigations - Eli Arku...
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
What Is API Security? Threats, Tools, and Best Practices in 2025 | USCSI®
LF_APIStrat17_OWASP’s Latest Category: API Underprotection
apidays Munich 2025 - Effectively incorporating API Security into the overall...
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
WEBINAR: OWASP API Security Top 10
F5-API-Security-Best-Practices.pdf
Protecting Microservices APIs with 42Crunch API Firewall
OWASP API Security Top 10 - Austin DevSecOps Days
apidays Australia 2023 - API Security Breach Analysis & Empowering Devs to M...
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
Managing Identity without Boundaries
Cyberlands Sales Deck
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
API Security Best Practices and Guidelines
Mobile Defense-in-Dev (Depth)
Ad

More from Security Bootcamp (20)

PDF
Ẩn mình kết nối C&C - Xu hướng tấn công và cách phòng thủ
PPTX
AI-ttacks - Nghiên cứu về một số tấn công vào các mô hình học máy và AI
PPTX
Human and AI - Balancing Innovation and Data Privacy in the Age of Cyber Threats
PPTX
Robustness of Deep learning mode ls.pptx
PPTX
DLL Sideloading cho mọi nhà - Security Bootcamp 2024
PDF
Let the Hunt Begin - Security Bootcamp 2024
PDF
Detection as Code - Effective Approach to manage & optimize SOC Development
PDF
Quản trị rủi ro nguồn mở tại các doanh nghiệp phần mềm Việt Nam
PDF
Phân tích một chiến dịch ransomware: Từ lan truyền đến tống tiền
PPTX
Security in the AI and Web3 era - Veramine
PDF
ĐỂ AI ĐƯỢC AN TOÀN, MINH BẠCH, CÓ TRÁCH NHIỆM VÀ ‘NHÂN TÍNH’ HƠN
PDF
Humanity and AI: Balancing Innovation and Data Privacy in the Age of Cyber Th...
PPTX
SBC2024_AI TRONG CYBER SECURITY_final.pptx
PPTX
Cyber GenAI – Another Chatbot? - Trellix
PPTX
How to steal a drone Drone Hijacking - VNPT Cyber Immunity
PDF
Empowering Malware Analysis with IDA AppCall
PDF
Detection of Spreading Process on many assets over the network
PDF
Ransomware is Knocking your Door_Final.pdf
PPTX
Hieupc-The role of psychology in enhancing cybersecurity
PDF
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s view
Ẩn mình kết nối C&C - Xu hướng tấn công và cách phòng thủ
AI-ttacks - Nghiên cứu về một số tấn công vào các mô hình học máy và AI
Human and AI - Balancing Innovation and Data Privacy in the Age of Cyber Threats
Robustness of Deep learning mode ls.pptx
DLL Sideloading cho mọi nhà - Security Bootcamp 2024
Let the Hunt Begin - Security Bootcamp 2024
Detection as Code - Effective Approach to manage & optimize SOC Development
Quản trị rủi ro nguồn mở tại các doanh nghiệp phần mềm Việt Nam
Phân tích một chiến dịch ransomware: Từ lan truyền đến tống tiền
Security in the AI and Web3 era - Veramine
ĐỂ AI ĐƯỢC AN TOÀN, MINH BẠCH, CÓ TRÁCH NHIỆM VÀ ‘NHÂN TÍNH’ HƠN
Humanity and AI: Balancing Innovation and Data Privacy in the Age of Cyber Th...
SBC2024_AI TRONG CYBER SECURITY_final.pptx
Cyber GenAI – Another Chatbot? - Trellix
How to steal a drone Drone Hijacking - VNPT Cyber Immunity
Empowering Malware Analysis with IDA AppCall
Detection of Spreading Process on many assets over the network
Ransomware is Knocking your Door_Final.pdf
Hieupc-The role of psychology in enhancing cybersecurity
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s view

Recently uploaded (20)

PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
Internet___Basics___Styled_ presentation
PDF
Testing WebRTC applications at scale.pdf
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
DOCX
Unit-3 cyber security network security of internet system
PDF
Introduction to the IoT system, how the IoT system works
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
Digital Literacy And Online Safety on internet
The Internet -By the Numbers, Sri Lanka Edition
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Job_Card_System_Styled_lorem_ipsum_.pptx
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
WebRTC in SignalWire - troubleshooting media negotiation
Internet___Basics___Styled_ presentation
Testing WebRTC applications at scale.pdf
SAP Ariba Sourcing PPT for learning material
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Decoding a Decade: 10 Years of Applied CTI Discipline
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
international classification of diseases ICD-10 review PPT.pptx
presentation_pfe-universite-molay-seltan.pptx
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Unit-3 cyber security network security of internet system
Introduction to the IoT system, how the IoT system works
introduction about ICD -10 & ICD-11 ppt.pptx
Digital Literacy And Online Safety on internet

Akamai_ API Security Best Practices - Real-world attacks and breaches

  • 1. © 2024 Akamai 1 API Security Best Practices: Lessons Learned from Real-World Attacks and Breaches Boon Wah, Tay 郑文华 鄭文華 정문하 テイブーンワ API Security Solutions Specialist Senior Solutions Engineer 28 Sep 2024
  • 2. © 2024 Akamai 2 API - Application Programming Interface
  • 3. © 2024 Akamai 3 API – Application Programming Interface • Set of rules or programming to allow applications to interface or communicate between each other. • Simply put.. a piece of code talking to another piece of code • API architecture is usually explained in terms of client and server. The application sending the request is called the client, and the application sending the response is called the server. Your Program (in language X) Your Program (in language Y) ● Operating systems APIs ● Remote APIs ● Database APIs ● Web APIs
  • 4. © 2024 Akamai 4 APIs Power the Modern World Mission Critical Operations, Digital Transformation, and Information Availability – All Rely on APIs
  • 5. © 2024 Akamai 5 API Security Incidents - Major Data Breach - Fraudulent Financial Transactions
  • 7. © 2024 Akamai 7 https://www.bankinfosecurity.com/google-settles-google-api-data-leak-lawsuit-for-350m-a-24296?trk=feed_main-feed-card_feed-article-content • Google+ API that allowed outside developers to access users' private profile data. • Up to 438 third-party apps likely had access to the API. • Access to data including photos, relationship status, email and home addresses • Discovered in March 2018 a glitch dating to 2015
  • 8. © 2024 Akamai 8 APIs Attacks Are the New Normal Recent major breaches caused by API exploitation 76% of organizations have had an API-related breach in the past year* Sensitive Health Data for 3.9M Customers $35M hit to revenue $34M Customer Funds Stolen Reputation Damaged 2.8 M Customer IDs $50M Fine Proposed 22.5M Gov Identity Records 68% of citizens at risk for identity theft 37m Customer Records Brand Impact & Fines Likely 300K Customer Emails Public Apology National Registration Dept of Malaysia 500K+ Customers’ PII Exposed Brand Impact and Fines 3200+ Apps Exposed 200 Million Records Source Code & Customer PII Critical IP Stolen *API Security Disconnect, Akamai Study, 2022
  • 9. © 2024 Akamai 9 API Attacks - Business Logic Flaws
  • 10. © 2024 Akamai 10 API Attacks are Different Web Security Protection Attacker Web / Mobile App API Back-end Data / App Crown Jewel Yesterday’s Attacks Today’s Attacks
  • 11. © 2024 Akamai 11 API Attacks are Different Web Security Protection Attacker Web / Mobile App API Back-end Data / App • Attackers, are going right around your web & mobile app, straight to the API and then the back-end, where the valuable data (crown jewel) is stored!!! • Attackers are by-passing all the traditional web & mobile app security protection. • API breaches exploit business logic flaws or gaps in authorization or weak authentication and the like. Crown Jewel
  • 12. © 2024 Akamai 12 OWASP API Security Top 10 2019 https://owasp.org/www-project-api-security/
  • 13. © 2024 Akamai 13 OWASP API Security Top 10 2023 https://owasp.org/www-project-api-security/ API1:2023 Broken Object Level Authorization API2:2023 Broken Authentication API3:2023 Broken Object Property Level Authorization API4:2023 Unrestricted Resource Consumption API5:2023 Broken Function Level Authorization API6:2023 Unrestricted Access to Sensitive Business Flows API7:2023 Server Side Request Forgery API8:2023 Security Misconfiguration API9:2023 Improper Inventory Management API10:2023 Unsafe Consumption of APIs
  • 14. © 2024 Akamai 14 OWASP Top 10 2019 to 2023 API1:2023 - Broken Object Level Authorization API2:2023 - Broken Authentication API3:2023 - Broken Object Property Level Authorization API4:2023 - Unrestricted Resource Consumption API5:2023 - Broken Function Level Authorization API8:2023 - Security Misconfiguration API9:2023 - Improper Inventory Management API1:2019 - Broken Object Level Authorization API2:2019 - Broken User Authentication API3:2019 - Excessive Data Exposure API4:2019 - Lack of Resources & Rate Limiting API5:2019 - Broken Function Level Authorization API6:2019 - Mass Assignment API7:2019 - Security Misconfiguration API8:2019 - Injection API9:2019 - Improper Assets Management API10:2019 - Insufficient Logging & Monitoring API6:2023 - Unrestricted Access to Sensitive Business Flows API7:2023 - Server Side Request Forgery API10:2023 - Unsafe Consumption of APIs Legend Unchanged Renamed Merged New Removed
  • 16. © 2024 Akamai 16 Broken Object Level Authorization (BOLA) • User A can access other users’ record (or data object) • API Endpoint have insufficient access controls – No Authorization Check of the data object • Violation of Zero Trust leads to Major Data Breach or Fraudulent Transactions User A User A Data User B Data User C Data User N Data Rightful Access (1-to-1 Mapping) Data Access due to No Authorization Check (1-to-Many Mapping)
  • 20. © 2024 Akamai 20 Broken Object Level Authorization What if I replace id1 with id2 and view someone else’s data Alice Attacker GET/accounts/id1/financial_info GET/accounts/id2/financial_info
  • 21. © 2024 Akamai 21 Data Exfiltration Legit Behavior JWT Token of Francis API URI with User ID of Francis
  • 22. © 2024 Akamai 22 Data Exfiltration Legit Behavior Personal Data of Francis
  • 23. © 2024 Akamai 23 Data Exfiltration Anomaly User ID had changed Same JWT Token of Francis was used API Hacking
  • 24. © 2024 Akamai 24 Data Exfiltration Anomaly API Hacking Now Reading Other People’s Data
  • 25. © 2024 Akamai 25 Data Exfiltration Anomaly API Hacking Now Reading More Other People’s Data
  • 26. © 2024 Akamai 26 Data Exfiltration Data Exfiltration API Hacking All of them are 200 OK! That’s Bad!!! Appear Normal to WAF or API Gateway
  • 27. © 2024 Akamai 27 © Akamai API Security. All rights reserved. [ Optus Data Breach] ● Company: Optus ● Industry: Telco ● Impact: ~600M USD ● Vulnerability: ○ Unauthenticated, publicly exposed API Endpoint ○ Excessive Data Exposure ○ Incrementing Customer Identifiers
  • 28. © 2024 Akamai 28 https://www.bankinfosecurity.com/optus-under-1-million-extortion-threat-in-data-breach-a-20142 https://www.bankinfosecurity.com/optus-under-1-million-extortion-threat-in-data-breach-a-20142
  • 30. © 2024 Akamai 30 https://www.bankinfosecurity.com/optus-under-1-million-extortion-threat-in-data-breach-a-20142 "No authenticate needed. That is bad access control. All open to internet for any one to use."
  • 33. © 2024 Akamai 33 The Akamai API Security Platform Complete API security covers the entire lifecycle of an API Locate and inventory all of your APIs and related risk, from both the inside-out and outside-in Discovery Uncover vulnerabilities and misconfigurations to speed remediation and ensure compliance Detect and block API attacks with real-time traffic analysis powered by machine learning Find and remediate API vulnerabilities during the development lifecycle Posture Runtime Testing
  • 34. © 2024 Akamai 34 Applications are at the center of everything we do. We protect the applications you build everywhere, every time without compromising performance or customer experience.
  • 35. © 2024 Akamai 35 Boon Wah, Tay Senior Solutions Engineer Akamai Technologies https://www.linkedin.com/in/boonwah/ Thank You!