SlideShare a Scribd company logo
Ory Segal
Senior Director, Threat Research
Akamai
VICES AND DEVICES
How IoT & Insecure APIs Became the New Cyber Battlefront
AGENDA:
• APIs Overview & History
• AKAMAI Security visibility & scale
• API statistics from the Akamai platform
• Credential abuse attack overview
• APIs credential abuse campaigns
• SSHowDowN IoT device attacks
APPLICATION
PROGRAMMING
INTERFACE
A software design approach which enables
developers to integrate with other systems based on
a defined set of communication methods.
APIs serve as software building blocks and allow for
software reuse essentially allowing fast
development of new systems based on existing
capabilities
BRIEF HISTORY OF API
TECHNOLOGIES
0
10
20
30
40
50
60
70
80
90
100
Interestovertime
20072004 2010 20162013
CORBA
SOAP SERVICES
UDDI
WSDL
RESTful SERVICES
JSON APIs
MICROSERVICES
OPEN
&
SIMPLE
The same openness & simplicity that make APIs
attractive to developers also make APIs an
attractive target for attackers
Š2017 AKAMAI | FASTER FORWARDTM
The Intelligent Platform
• 220,000+ Edge Servers
• 3,315+ Locations
• 1200+ Cities
• 129 Countries
• 1,227+ Networks
The Data
• 3 trillion hits per day
• 1 Billion unique IPs seen quarterly
• 13+ trillion log lines per day
• 260+ terabytes of compressed daily logs
15 - 30% of all web traffichttp://wwwnui.akamai.com/gnet/globe/
http://tech.akamai.com/attack-globe/
AKAMAI
AKAMAI’S SECURITY VISIBILITY
Akamai
Intelligent Platform
Akamai
Intelligent Platform
Cloud Security Intelligence
Visibility │15-30% of global web traffic │3 Trillion Hits/Day │550M Daily logins monitored
Data │40B daily security events│700,000 log lines a second │20 TB new attack data daily
Analysis │Dedicated threat research team │100 automated heuristics │6M botnets monitored daily
144.7BHTTP requests
36.6B
API Calls
25% of all traffic -
API calls!
65%Mobile APIs
35%
AJAX, Web, Other
28%
23%
23%
10%
8%
5%
3%
High Technology
Online Retail
Media
Gaming
Hotel & Travel
Financial Services
Other
API Usage (By Industry)
51%
36%
11%
0%
0%
2%
25%
56%
10%
4%
2%
3%
JSON
Form-Data
XML
Plain Text
Binary
Other
Request Content-Type (APIs vs. Standard Web)
Standard Web API Calls
51% OF API CALLS
USE JSON!
Not all security protections are suitable for deep
inspection of attacks within complex JSON
messages
TOP ATTACK
VECTORS AFFECTING
API ENDPOINTS
Application Layer Attacks
Attacks targeting application logic – SQL
Injection, Cross-Site Request Forgery, XSS,
etc.
Denial of Service
Mass-scale attempts to exhaust system
resources and deny service from others
Content Scraping
Illegitimate data mining and content
harvesting
Credential Abuse (“Credential Stuffing”)
Mass-scale account abuse, either by brute-
force guessing, or by using leaked
credentials
76%
13%
6%
3%
2%
0.01%
SQL Injection
Local File Include
Code Injection
Command Injection
XSS
Remote File Include
413.4MLogin requests
27.9MUnique IP Addresses
48.7KInternet Hosts
42%
Only API Calls
(JSON, XML, SOAP)
55%
Only Forms Login
3% Use Both
78%
Mobile Logins
22%
Browsers, IoT
CREDENTIAL ABUSE
Overview
Password
Another password
ONE MORE PASSWORD
Password
YET ANOTHER PASSWORD
The average user uses over 50 different
services requiring a password
People have limited memory (and they
are often lazy)
Password
Password
PEOPLE USE THE SAME
PASSWORD
EVERYWHERE
It only takes one site to leak...
EVEN THE MOST TRUSTED
SERVICES HAVE BEEN BREACHED
ANATOMY OF AN
ATTACK
CAMPAIGN
TOOLS OF THE TRADE
413.4MLogin requests
27.9MUnique IP Addresses
48.7KInternet Hosts
30%Of all login requests are
malicious
CAMPAIGN ANALYSIS
1,000,000
4,000,000
Standard Web APIs
Average Campaign Size (By Number of
Accounts)
ATTACKERS ATTEMPT x4 MORE
STOLEN ACCOUNTS THROUGH API
88% OF ATTACKERS
PERFORMED API-BASED
ATTACKS!
x4.75 MORE IPs (Avg.)
PER CAMPAIGN IN APIs
API LOGINS: THE PERFECT TARGET
Complexity of deep API message
inspection:
The Non-standard message formats of API calls
make it hard for security solutions to detect
attacks. Attacks remain unseen
{API}
Drawbacks of web “Anti-
Automation” solutions:
Most anti-automation solutions apply protections
that are irrelevant in the API ecosystem:
• HTTP anomalies
• CAPTCHA
• JS challenges & fingerprinting
• Rate limits
Limited visibility:
Security products that are not API-centric, do not
provide proper logging and visibility into API
attacks
Lack of proper API management:
Many orgs. deploy hundreds of APIs, each
exposing a multitude of endpoints. Managing
these APIs is a daunting task. Hackers are
constantly on the lookout for “rogue APIs”
Operational simplicity:
APIs provide granular interfaces to backend
software functions. Their consumption in a
programmatic way is extremely simple.
Adversaries recently started using undocumented
APIs intended to be used by mobile applications.
SSHowDowN
On IoT Devices & Credential Abuse Attack Campaigns
1M-bot campaign demonstrated ~25% of IPs as
“single use” (no repeat activity)
Over 1 month, ~70% of the IPs only attacked 1
day
REAL WORLD: FINSERV CAMPAIGN
⍰How come we see such a high % of “single use” attack machines
⍰How come the work load (checked accounts) is balanced so well
among so many bot nodes? (no repeated account attempts)
⍰How come we see large networks of attacking machines that are
Routers, Hotspots, CCTV systems and other IoT devices?
OPEN QUESTIONS?
A single source is generating the traffic – explains why it is identical
A single source runs over the list of accounts – explains why work is not repeated
Large proxy lists are easy & cheap to maintain – much more than a botnet
A single attacker is routing login traffic using
round robin over a long list of machines
serving as proxies
Missing piece – What’s the deal with IoT devices?
SPECULATION:
CCTVs
Routers
Servers
Satellite Antennas(?!)
ADSL/Cable Modems
Hotspots
MANY SOURCE IPs EXPOSED A WEB
INTERFACE
Vices & Devices - How IoT & Insecure APIs Became the New Cyber Battlefront
Vices & Devices - How IoT & Insecure APIs Became the New Cyber Battlefront
Search for ESTABLISHED TCP Connections
Seems like the SSH daemon is responsible for many active HTTP/HTTPS
connections – some of which are to Akamai Ghost machines
DEFAULT ACCOUNT CANNOT “SSH” INTO
MACHINE
No active shell sessions seen – not under ”root” or “admin” users
The “admin” user (which has the default admin:admin credentials) has
/sbin/nologin configured – so an attacker can’t SSH into the machine and
run commands
Was SSHD tampered with and contains a backdoor? We checked - No...
HOW IS SSH USED FOR THESE ATTACKS?
All traffic passes through the SSH server, as if you setup a VPN through
SSH but without shell permissions on the server
<AllowTcpForwarding yes> (default)
USING SSH AS SOCKS PROXY WHEN USER
HAS NO SHELL PERMISSIONS
Attacker
Vulnerable IoT
Device Target Web Server
SSH TUNNEL
/> ssh –D 8080 –N cctv_admin@iot.vuln (requires “default” account credentials)
/> curl --proxy socks5h://localhost:8080 http://target.site/
Malicious HTTP
SOCKS PROXY
SSHowDowN INSTRUCTIONS MANUAL:
SSH TUNNEL 1
SSH TUNNEL 2
SSH TUNNEL n
....
Attacker
Vulnerable IoT
Device
Target Web Server
FROM PROXY TO CLOUD/BOTNET:
VULNERABLE DEVICES SPOTTED “IN THE
WILD”
Š2017 AKAMAI | FASTER FORWARDTM
And the Cherry on the Cake....
ACCESSING INTERNAL NETWORK MACHINES
IP of an internal machine
2. Access an Internal machine (in this example – over HTTP)
1. Create an SSH Proxy Tunnel:
SUMMARY
1. Huge growth in API usage (>25% of all traffic)
• Mobile apps are the #1 driver
• Device & app integration. IoT ecosphere is a perfect
example
2. Simple & accessible APIs, developed with modern lightweight
frameworks are a convenient, easy target
3. 4 main attack vectors are relevant: Credential Stuffing, App
layer attacks, DDoS, Data Scraping
4. Existing security solutions have drawbacks:
• Deep inspection of modern API message formats
• Technical difficulties implementing “Anti-Automation”
• Lack of granular visibility
• Weak API management
Q & A

More Related Content

ODP
Security components in mule esb
PDF
OWASP API Security Top 10 - API World
PPTX
Rest API Security - A quick understanding of Rest API Security
PDF
OWASP API Security TOP 10 - 2019
PPTX
API Abuse - The Anatomy of An Attack
PPTX
Securing Microservices with Spring Cloud Security
ODP
Security in mulesoft
PPTX
Layered API Security: What Hackers Don't Want You To Know
Security components in mule esb
OWASP API Security Top 10 - API World
Rest API Security - A quick understanding of Rest API Security
OWASP API Security TOP 10 - 2019
API Abuse - The Anatomy of An Attack
Securing Microservices with Spring Cloud Security
Security in mulesoft
Layered API Security: What Hackers Don't Want You To Know

What's hot (20)

PDF
Mobile_app_security
PDF
The Dev, Sec and Ops of API Security - NordicAPIs
PDF
API Security: the full story
PPTX
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
PPTX
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
PDF
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
PPTX
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
PDF
Guidelines to protect your APIs from threats
PDF
WEBINAR: Positive Security for APIs: What it is and why you need it!
PPTX
API Security and Management Best Practices
PDF
Two-factor Authentication
PDF
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
PDF
Mobile application security – effective methodology, efficient testing! hem...
PPTX
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
PDF
API Security - OWASP top 10 for APIs + tips for pentesters
PDF
OWASP API Security Top 10 - Austin DevSecOps Days
PDF
WEBINAR: OWASP API Security Top 10
PDF
Are You Properly Using JWTs?
PPTX
Penetrating Android Aapplications
PDF
Protecting Microservices APIs with 42Crunch API Firewall
Mobile_app_security
The Dev, Sec and Ops of API Security - NordicAPIs
API Security: the full story
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
Guidelines to protect your APIs from threats
WEBINAR: Positive Security for APIs: What it is and why you need it!
API Security and Management Best Practices
Two-factor Authentication
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Mobile application security – effective methodology, efficient testing! hem...
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
API Security - OWASP top 10 for APIs + tips for pentesters
OWASP API Security Top 10 - Austin DevSecOps Days
WEBINAR: OWASP API Security Top 10
Are You Properly Using JWTs?
Penetrating Android Aapplications
Protecting Microservices APIs with 42Crunch API Firewall
Ad

Similar to Vices & Devices - How IoT & Insecure APIs Became the New Cyber Battlefront (20)

PDF
5 step plan to securing your APIs
PDF
API SECURITY
PDF
mobsf.pdf
PPTX
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
PPTX
Website hacking and prevention (All Tools,Topics & Technique )
PDF
2013 OWASP Top 10
PPT
Penetration Testing Basics
PDF
Protecting Your APIs Against Attack & Hijack
PPTX
Cyber ppt
PDF
Cloud Security Primer - F5 Networks
PDF
Mobile Enterprise Application Platform
PDF
Realities of Security in the Cloud
PDF
Building Secure Apps in the Cloud
PDF
Apidays Helsinki & North 2024 - From Chaos to Calm- Navigating Emerging API ...
PPT
Web Application Security
PPT
Web Based Security
PPTX
Outpost24 webinar - Api security
PDF
Reducing Risk of Credential Compromise at Netflix
PDF
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
PDF
CSS17: Houston - Protecting Web Apps
5 step plan to securing your APIs
API SECURITY
mobsf.pdf
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
Website hacking and prevention (All Tools,Topics & Technique )
2013 OWASP Top 10
Penetration Testing Basics
Protecting Your APIs Against Attack & Hijack
Cyber ppt
Cloud Security Primer - F5 Networks
Mobile Enterprise Application Platform
Realities of Security in the Cloud
Building Secure Apps in the Cloud
Apidays Helsinki & North 2024 - From Chaos to Calm- Navigating Emerging API ...
Web Application Security
Web Based Security
Outpost24 webinar - Api security
Reducing Risk of Credential Compromise at Netflix
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
CSS17: Houston - Protecting Web Apps
Ad

Recently uploaded (20)

PPTX
STERILIZATION AND DISINFECTION-1.ppthhhbx
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PDF
Mega Projects Data Mega Projects Data
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PPTX
Market Analysis -202507- Wind-Solar+Hybrid+Street+Lights+for+the+North+Amer...
PDF
Transcultural that can help you someday.
PDF
Lecture1 pattern recognition............
PDF
annual-report-2024-2025 original latest.
PPTX
Database Infoormation System (DBIS).pptx
PPTX
A Complete Guide to Streamlining Business Processes
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPTX
Modelling in Business Intelligence , information system
PDF
Introduction to Data Science and Data Analysis
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PPT
Predictive modeling basics in data cleaning process
PDF
Oracle OFSAA_ The Complete Guide to Transforming Financial Risk Management an...
PDF
Introduction to the R Programming Language
PDF
Data Engineering Interview Questions & Answers Batch Processing (Spark, Hadoo...
PPTX
SAP 2 completion done . PRESENTATION.pptx
STERILIZATION AND DISINFECTION-1.ppthhhbx
Data_Analytics_and_PowerBI_Presentation.pptx
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
Mega Projects Data Mega Projects Data
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
Market Analysis -202507- Wind-Solar+Hybrid+Street+Lights+for+the+North+Amer...
Transcultural that can help you someday.
Lecture1 pattern recognition............
annual-report-2024-2025 original latest.
Database Infoormation System (DBIS).pptx
A Complete Guide to Streamlining Business Processes
climate analysis of Dhaka ,Banglades.pptx
Modelling in Business Intelligence , information system
Introduction to Data Science and Data Analysis
IBA_Chapter_11_Slides_Final_Accessible.pptx
Predictive modeling basics in data cleaning process
Oracle OFSAA_ The Complete Guide to Transforming Financial Risk Management an...
Introduction to the R Programming Language
Data Engineering Interview Questions & Answers Batch Processing (Spark, Hadoo...
SAP 2 completion done . PRESENTATION.pptx

Vices & Devices - How IoT & Insecure APIs Became the New Cyber Battlefront

  • 1. Ory Segal Senior Director, Threat Research Akamai VICES AND DEVICES How IoT & Insecure APIs Became the New Cyber Battlefront
  • 2. AGENDA: • APIs Overview & History • AKAMAI Security visibility & scale • API statistics from the Akamai platform • Credential abuse attack overview • APIs credential abuse campaigns • SSHowDowN IoT device attacks
  • 3. APPLICATION PROGRAMMING INTERFACE A software design approach which enables developers to integrate with other systems based on a defined set of communication methods. APIs serve as software building blocks and allow for software reuse essentially allowing fast development of new systems based on existing capabilities
  • 4. BRIEF HISTORY OF API TECHNOLOGIES 0 10 20 30 40 50 60 70 80 90 100 Interestovertime 20072004 2010 20162013 CORBA SOAP SERVICES UDDI WSDL RESTful SERVICES JSON APIs MICROSERVICES
  • 5. OPEN & SIMPLE The same openness & simplicity that make APIs attractive to developers also make APIs an attractive target for attackers
  • 6. Š2017 AKAMAI | FASTER FORWARDTM The Intelligent Platform • 220,000+ Edge Servers • 3,315+ Locations • 1200+ Cities • 129 Countries • 1,227+ Networks The Data • 3 trillion hits per day • 1 Billion unique IPs seen quarterly • 13+ trillion log lines per day • 260+ terabytes of compressed daily logs 15 - 30% of all web traffichttp://wwwnui.akamai.com/gnet/globe/ http://tech.akamai.com/attack-globe/ AKAMAI
  • 7. AKAMAI’S SECURITY VISIBILITY Akamai Intelligent Platform Akamai Intelligent Platform Cloud Security Intelligence Visibility │15-30% of global web traffic │3 Trillion Hits/Day │550M Daily logins monitored Data │40B daily security events│700,000 log lines a second │20 TB new attack data daily Analysis │Dedicated threat research team │100 automated heuristics │6M botnets monitored daily
  • 8. 144.7BHTTP requests 36.6B API Calls 25% of all traffic - API calls! 65%Mobile APIs 35% AJAX, Web, Other
  • 9. 28% 23% 23% 10% 8% 5% 3% High Technology Online Retail Media Gaming Hotel & Travel Financial Services Other API Usage (By Industry)
  • 10. 51% 36% 11% 0% 0% 2% 25% 56% 10% 4% 2% 3% JSON Form-Data XML Plain Text Binary Other Request Content-Type (APIs vs. Standard Web) Standard Web API Calls 51% OF API CALLS USE JSON! Not all security protections are suitable for deep inspection of attacks within complex JSON messages
  • 11. TOP ATTACK VECTORS AFFECTING API ENDPOINTS Application Layer Attacks Attacks targeting application logic – SQL Injection, Cross-Site Request Forgery, XSS, etc. Denial of Service Mass-scale attempts to exhaust system resources and deny service from others Content Scraping Illegitimate data mining and content harvesting Credential Abuse (“Credential Stuffing”) Mass-scale account abuse, either by brute- force guessing, or by using leaked credentials 76% 13% 6% 3% 2% 0.01% SQL Injection Local File Include Code Injection Command Injection XSS Remote File Include
  • 12. 413.4MLogin requests 27.9MUnique IP Addresses 48.7KInternet Hosts 42% Only API Calls (JSON, XML, SOAP) 55% Only Forms Login 3% Use Both 78% Mobile Logins 22% Browsers, IoT
  • 14. Password Another password ONE MORE PASSWORD Password YET ANOTHER PASSWORD The average user uses over 50 different services requiring a password People have limited memory (and they are often lazy) Password Password PEOPLE USE THE SAME PASSWORD EVERYWHERE
  • 15. It only takes one site to leak... EVEN THE MOST TRUSTED SERVICES HAVE BEEN BREACHED
  • 17. TOOLS OF THE TRADE
  • 18. 413.4MLogin requests 27.9MUnique IP Addresses 48.7KInternet Hosts 30%Of all login requests are malicious
  • 19. CAMPAIGN ANALYSIS 1,000,000 4,000,000 Standard Web APIs Average Campaign Size (By Number of Accounts) ATTACKERS ATTEMPT x4 MORE STOLEN ACCOUNTS THROUGH API 88% OF ATTACKERS PERFORMED API-BASED ATTACKS! x4.75 MORE IPs (Avg.) PER CAMPAIGN IN APIs
  • 20. API LOGINS: THE PERFECT TARGET Complexity of deep API message inspection: The Non-standard message formats of API calls make it hard for security solutions to detect attacks. Attacks remain unseen {API} Drawbacks of web “Anti- Automation” solutions: Most anti-automation solutions apply protections that are irrelevant in the API ecosystem: • HTTP anomalies • CAPTCHA • JS challenges & fingerprinting • Rate limits Limited visibility: Security products that are not API-centric, do not provide proper logging and visibility into API attacks Lack of proper API management: Many orgs. deploy hundreds of APIs, each exposing a multitude of endpoints. Managing these APIs is a daunting task. Hackers are constantly on the lookout for “rogue APIs” Operational simplicity: APIs provide granular interfaces to backend software functions. Their consumption in a programmatic way is extremely simple. Adversaries recently started using undocumented APIs intended to be used by mobile applications.
  • 21. SSHowDowN On IoT Devices & Credential Abuse Attack Campaigns
  • 22. 1M-bot campaign demonstrated ~25% of IPs as “single use” (no repeat activity) Over 1 month, ~70% of the IPs only attacked 1 day REAL WORLD: FINSERV CAMPAIGN
  • 23. ⍰How come we see such a high % of “single use” attack machines ⍰How come the work load (checked accounts) is balanced so well among so many bot nodes? (no repeated account attempts) ⍰How come we see large networks of attacking machines that are Routers, Hotspots, CCTV systems and other IoT devices? OPEN QUESTIONS?
  • 24. A single source is generating the traffic – explains why it is identical A single source runs over the list of accounts – explains why work is not repeated Large proxy lists are easy & cheap to maintain – much more than a botnet A single attacker is routing login traffic using round robin over a long list of machines serving as proxies Missing piece – What’s the deal with IoT devices? SPECULATION:
  • 28. Search for ESTABLISHED TCP Connections Seems like the SSH daemon is responsible for many active HTTP/HTTPS connections – some of which are to Akamai Ghost machines
  • 29. DEFAULT ACCOUNT CANNOT “SSH” INTO MACHINE
  • 30. No active shell sessions seen – not under ”root” or “admin” users The “admin” user (which has the default admin:admin credentials) has /sbin/nologin configured – so an attacker can’t SSH into the machine and run commands Was SSHD tampered with and contains a backdoor? We checked - No... HOW IS SSH USED FOR THESE ATTACKS?
  • 31. All traffic passes through the SSH server, as if you setup a VPN through SSH but without shell permissions on the server <AllowTcpForwarding yes> (default) USING SSH AS SOCKS PROXY WHEN USER HAS NO SHELL PERMISSIONS
  • 32. Attacker Vulnerable IoT Device Target Web Server SSH TUNNEL /> ssh –D 8080 –N cctv_admin@iot.vuln (requires “default” account credentials) /> curl --proxy socks5h://localhost:8080 http://target.site/ Malicious HTTP SOCKS PROXY SSHowDowN INSTRUCTIONS MANUAL:
  • 33. SSH TUNNEL 1 SSH TUNNEL 2 SSH TUNNEL n .... Attacker Vulnerable IoT Device Target Web Server FROM PROXY TO CLOUD/BOTNET:
  • 34. VULNERABLE DEVICES SPOTTED “IN THE WILD”
  • 35. Š2017 AKAMAI | FASTER FORWARDTM And the Cherry on the Cake....
  • 36. ACCESSING INTERNAL NETWORK MACHINES IP of an internal machine
  • 37. 2. Access an Internal machine (in this example – over HTTP) 1. Create an SSH Proxy Tunnel:
  • 39. 1. Huge growth in API usage (>25% of all traffic) • Mobile apps are the #1 driver • Device & app integration. IoT ecosphere is a perfect example 2. Simple & accessible APIs, developed with modern lightweight frameworks are a convenient, easy target 3. 4 main attack vectors are relevant: Credential Stuffing, App layer attacks, DDoS, Data Scraping 4. Existing security solutions have drawbacks: • Deep inspection of modern API message formats • Technical difficulties implementing “Anti-Automation” • Lack of granular visibility • Weak API management
  • 40. Q & A

Editor's Notes

  • #16: Bit.ly/bigdatabreaches