SlideShare uma empresa Scribd logo
1 de 125
API Security 
It’s Complicated. 
@dberlind
Disclaimers 
• I don’t necessarily have all the answers. I can and will make some 
recommendations. But ultimately, I’m a journalist. I interview 
people. I make observations. This presentation comes from those 
interviews and observations. 
• I think I’m pretty up to date. But, there may be new observations or 
information that make some of my information obsolete. It’s a huge 
ocean to boil. 
• Despite what I’m about to share with you, I do not consider myself 
a security expert. There may be some technical inaccuracies. 
• This presentation only scratches the surface. But it’s a good 
conversation starter 
• By the end, you may think the Internet is doomed. It could be. 
Unless you do something about it. 
• I’m terrible at PowerPoint
Anatomies of Recent API-related 
Attacks
Anatomy of Attack
Anatomy of Attack 
• 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints
Anatomy of Attack 
• 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints 
• Oct-2013 
• Hackers get busy “reverse engineering” passwords
Anatomy of Attack
Anatomy of Attack 
• 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints 
• Oct-2013 
• Hackers get busy “reverse engineering” passwords 
• Hackers target Github accounts of Buffer’s developers
Anatomy of Attack 
• 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints 
• Oct-2013 
• Hackers get busy “reverse engineering” passwords 
• Hackers target Github accounts of Buffer’s developers 
• Hackers gain access to Github’s code repository through shared passwords
Anatomy of Attack 
• 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints 
• Oct-2013 
• Hackers get busy “reverse engineering” passwords 
• Hackers target Github accounts of Buffer’s developers 
• Hackers gain access to Github’s code repository through shared passwords 
• From source code, hackers discover Buffer’s API keys for Twitter and Facebook
Anatomy of Attack 
• 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints 
• Oct-2013 
• Hackers get busy “reverse engineering” passwords 
• Hackers target Github accounts of Buffer’s developers 
• Hackers gain access to Github’s code respository through shared passwords 
• From source code, hackers discover Buffer’s API keys for Twitter and Facebook 
• Hackers target MongoHQ tech support personnel through shared passwords
Anatomy of Attack 
• 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints 
• Oct-2013 
• Hackers get busy “reverse engineering” passwords 
• Hackers target Github accounts of Buffer’s developers 
• Hackers gain access to Github’s code repository through shared passwords 
• From source code, hackers discover Buffer’s API keys for Twitter and Facebook 
• Hackers target MongoHQ tech support personnel through shared passwords 
• Hackers gain access to MongoHQ tech support app which has access to Buffer’s data
Anatomy of Attack 
• 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints 
• Oct-2013 
• Hackers get busy “reverse engineering” passwords 
• Hackers target Github accounts of Buffer’s developers 
• Hackers gain access to Github’s code repository through shared passwords 
• From source code, hackers discover Buffer’s API keys for Twitter and Facebook 
• Hackers target MongoHQ tech support personnel through shared passwords 
• Hackers gain access to MongoHQ tech support app which has access to Buffer’s data 
• Via MongoHQ’s tech support app, hackers find Buffer’s users’ OAuth tokens for 
Twitter, Facebook, probably develop ScrAPI to harvest them 1000 records per screen
Anatomy of Attack 
• 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints 
• Oct-2013 
• Hackers get busy “reverse engineering” passwords 
• Hackers target Github accounts of Buffer’s developers 
• Hackers gain access to Github’s code respository through shared passwords 
• From source code, hackers discover Buffer’s API keys for Twitter and Facebook 
• Hackers target MongoHQ tech support personnel through shared passwords 
• Hackers gain access to MongoHQ tech support app which has access to Buffer’s data 
• Via MongoHQ’s tech support app, hackers find Buffer’s users’ OAuth tokens for 
Twitter, Facebook, probably develop ScrAPI to harvest them 1000 records per screen 
• Hackers develop code that can pose as Buffer and cycle through all the tokens making 
posts to Facebook and Twitter via API.
Anatomy of Attack 
• 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints 
• Oct-2013 
• Hackers get busy “reverse engineering” passwords 
• Hackers target Github accounts of Buffer’s developers 
• Hackers gain access to Github’s code repository through shared passwords 
• From source code, hackers discover Buffer’s API keys for Twitter and Facebook 
• Hackers target MongoHQ tech support personnel through shared passwords 
• Hackers gain access to MongoHQ tech support app which has access to Buffer’s data 
• Via MongoHQ’s tech support app, hackers find Buffer’s users’ OAuth tokens for 
Twitter, Facebook, probably develop ScrAPI to harvest them 1000 records per screen 
• Hackers develop code that can pose as Buffer and cycle through all the tokens making 
posts to Facebook and Twitter via API. 
• 26-Oct-2013 
• Adobe Database published on AnonNews.org
Anatomy of Attack 
• 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints 
• Oct-2013 
• Hackers get busy “reverse engineering” passwords 
• Hackers target Github accounts of Buffer’s developers 
• Hackers gain access to Github’s code respository through shared passwords 
• From source code, hackers discover Buffer’s API keys for Twitter and Facebook 
• Hackers target MongoHQ tech support personnel through shared passwords 
• Hackers gain access to MongoHQ tech support app which has access to Buffer’s data 
• Via MongoHQ’s tech support app, hackers find Buffer’s users’ OAuth tokens for 
Twitter, Facebook, probably develop ScrAPI to harvest them 1000 records per screen 
• Hackers develop code that can pose as Buffer and cycle through all the tokens making 
posts to Facebook and Twitter via API. 
• 26-Oct-2013 
• Database published on AnonNews.org 
• Tens of thousands of Twitter/Facebook accounts spammed with weight-loss posts
Example of Attack
Anatomy of Attack 
• 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints 
• Oct-2013 
• Hackers get busy “reverse engineering” passwords 
• Hackers target Github accounts of Buffer’s developers 
• Hackers gain access to Github’s code repository through shared passwords 
• From source code, hackers discover Buffer’s API keys for Twitter and Facebook 
• Hackers target MongoHQ tech support personnel through shared passwords 
• Hackers gain access to MongoHQ tech support app which has access to Buffer’s data 
• Via MongoHQ’s tech support app, hackers find Buffer’s users’ OAuth tokens for 
Twitter, Facebook, probably develop ScrAPI to harvest them 1000 records per screen 
• Hackers develop code that can pose as Buffer and cycle through all the tokens making 
posts to Facebook and Twitter via API. 
• 26-Oct-2013 
• Database published on AnonNews.org 
• Tens of thousands of Twitter/Facebook accounts spammed with weight-loss posts 
• More than likely malware, but too late to know
Anatomy of Attack 
• 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints 
• Oct-2013 
• Hackers get busy “reverse engineering” passwords 
• Hackers target Github accounts of Buffer’s developers 
• Hackers gain access to Github’s code repository through shared passwords 
• From source code, hackers discover Buffer’s API keys for Twitter and Facebook 
• Hackers target MongoHQ tech support personnel through shared passwords 
• Hackers gain access to MongoHQ tech support app which has access to Buffer’s data 
• Via MongoHQ’s tech support app, hackers find Buffer’s users’ OAuth tokens for 
Twitter, Facebook, probably develop ScrAPI to harvest them 1000 records per screen 
• Hackers develop code that can pose as Buffer and cycle through all the tokens making 
posts to Facebook and Twitter via API. 
• 26-Oct-2013 
• Database published on AnonNews.org 
• Tens of thousands of Twitter/Facebook accounts spammed with weight-loss posts 
• More than likely malware, but too late to know 
• Buffer discloses
Anatomy of Attack 
• 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints 
• Oct-2013 
• Hackers get busy “reverse engineering” passwords 
• Hackers target Github accounts of Buffer’s developers 
• Hackers gain access to Github’s code repository through shared passwords 
• From source code, hackers discover Buffer’s API keys for Twitter and Facebook 
• Hackers target MongoHQ tech support personnel through shared passwords 
• Hackers gain access to MongoHQ tech support app which has access to Buffer’s data 
• Via MongoHQ’s tech support app, hackers find Buffer’s users’ OAuth tokens for 
Twitter, Facebook, probably develop ScrAPI to harvest them 1000 records per screen 
• Hackers develop code that can pose as Buffer and cycle through all the tokens making 
posts to Facebook and Twitter via API. 
• 26-Oct-2013 
• Database published on AnonNews.org 
• Tens of thousands of Twitter/Facebook accounts spammed with weight-loss posts 
• More than likely malware, but too late to know 
• Buffer discloses 
• MongoHQ discloses (not as much)
Anatomy of Attack 
• 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints 
• Oct-2013 
• Hackers get busy “reverse engineering” passwords 
• Hackers target Github accounts of Buffer’s developers 
• Hackers gain access to Github’s code respository through shared passwords 
• From source code, hackers discover Buffer’s API keys for Twitter and Facebook 
• Hackers target MongoHQ tech support personnel through shared passwords 
• Hackers gain access to MongoHQ tech support app which has access to Buffer’s data 
• Via MongoHQ’s tech support app, hackers find Buffer’s users’ OAuth tokens for 
Twitter, Facebook, probably develop ScrAPI to harvest them 1000 records per screen 
• Hackers develop code that can pose as Buffer and cycle through all the tokens making 
posts to Facebook and Twitter via API. 
• 26-Oct-2013 
• Database published on AnonNews.org 
• Tens of thousands of Twitter/Facebook accounts spammed with weight-loss posts 
• More than likely malware, but too late to know 
• Buffer discloses 
• MongoHQ discloses (not as much) 
• Nov-2013: Adobe sends out password reset emails
Adobe Password Reset Email
Other facts and notes 
● Hackers also looked for Buffer’s AWS credentials on Github
Other facts and notes 
● Hackers also looked for AWS credentials on Github 
● IP address in common across access of GitHub, MongoHQ, and Buffer… the Buffer 
logs showed the Twitter account associated with the IP address.. that account 
known to be associated with Anonymous.
Other facts and notes 
● Hackers also looked for AWS credentials on Github 
● IP address in common across access of GitHub, MongoHQ, and Buffer… the Buffer 
logs showed the Twitter account associated with the IP address.. that account 
known to be associated with Anonymous. 
● That twitter account also tweeted a question about thwarting security after 
Buffer moved to Google-based Two-Factor Authentication on Github
Other facts and notes 
● Hackers also looked for AWS credentials on Github 
● IP address in common across access of GitHub, MongoHQ, and Buffer… the Buffer 
logs showed the Twitter account associated with the IP address.. that account 
known to be associated with Anonymous. 
● That twitter account also tweeted a question about thwarting security after 
Buffer moved to Google-based Two-Factor Authentication on Github 
● Other companies hacked due to Mongo breach: Sunrise Calender
Other facts and notes 
● Hackers also looked for AWS credentials on Github 
● IP address in common across access of GitHub, MongoHQ, and Buffer… the Buffer 
logs showed the Twitter account associated with the IP address.. that account 
known to be associated with Twitter. 
● That twitter account also tweeted a question about thwarting security after 
Buffer moved to Google-based Two-Factor Authentication on Github 
● Other companies hacked due to Mongo breach: Sunrise Calender 
● Could have been much worse: Buffer had Stripe credentials in their code as well. 
Hacker could have charged charges to Buffer’s customers.
Other facts and notes 
● Hackers also looked for AWS credentials on Github 
● IP address in common across access of GitHub, MongoHQ, and Buffer… the Buffer 
logs showed the Twitter account associated with the IP address.. that account 
known to be associated with Twitter. 
● That twitter account also tweeted a question about thwarting security after 
Buffer moved to Google-based Two-Factor Authentication on Github 
● Other companies hacked due to Mongo breach: Sunrise Calender 
● Could have been much worse: Buffer had Stripe credentials in their code as well. 
Hacker could have charged charges to Buffer’s customers. 
● Able to identify incursions on Github by IP address (didn’t belong to anybody on 
the team).
Other facts and notes 
● Hackers also looked for AWS credentials on Github 
● IP address in common across access of GitHub, MongoHQ, and Buffer… the Buffer 
logs showed the Twitter account associated with the IP address.. that account 
known to be associated with Twitter. 
● That twitter account also tweeted a question about thwarting security after 
Buffer moved to Google-based Two-Factor Authentication on Github 
● Other companies hacked due to Mongo breach: Sunrise Calender 
● Could have been much worse: Buffer had Stripe credentials in their code as well. 
Hacker could have charged charges to Buffer’s customers. 
● Able to identify incursions on Github by IP address (didn’t belong to anybody on 
the team). 
● Buffer moved to Google-based 2FA across other services. But many of those 
services (eg: Dropbox) offer no way of managing that (eg: no enforcement.. You 
have to trust employees).
Other facts and notes 
● Hackers also looked for AWS credentials on Github 
● IP address in common across access of GitHub, MongoHQ, and Buffer… the Buffer 
logs showed the Twitter account associated with the IP address.. that account 
known to be associated with Twitter. 
● That twitter account also tweeted a question about thwarting security after 
Buffer moved to Google-based Two-Factor Authentication on Github 
● Other companies hacked due to Mongo breach: Sunrise Calender 
● Could have been much worse: Buffer had Stripe credentials in their code as well. 
Hacker could have charged charges to Buffer’s customers. 
● Able to identify incursions on Github by IP address (didn’t belong to anybody on 
the team). 
● Buffer moved to Google-based 2FA across other services. But many of those 
services (eg: Dropbox) offer no way of managing that (eg: no enforcement.. You 
have to trust employees). 
● Another issue: How do you store credentials that admins must share? Put them 
on Dropbox where you lack enterprise controls?
Pinterest Auto-Post Preference
The “Fappening” 
(Not All Details Confirmed By Apple) 
• Apple’s “cloud” (everything from iTunes to iCloud) relies on one Apple ID and password 
per user 
• Allegedly involved the undocumented Find My iPhone API (FMI API) – undocumented 
APIs are easy to reverse engineer 
• FMI API required only user name and password for authentication (no other forms of 
authentication like OAuth tokens) 
• FMI API had no rate limiting on it, allowing for an infinite number of attempts or what is 
otherwise known in security circles as a brute force attack. 
• Just needed a bit of code that loops and loops and loops 
• They called that bit of code iBrute and published it to Github 
• For passwords, hackers allegedly used the infamous RockYou database; a big sample 
listing the passwords for 14 million accounts that were compromised when the social 
gaming service was compromised in 2009 
• Once the passwords were discovered, they used Elcomsoft Phone Password Breaker 
(EPPB) to handle the bulk downloads and from there the photos are being published. 
• Within hours, Apple installed rate limiting on the API. 
• The phishing attacks preying on the media-induced fear started almost immediately 
• Apple claimed: 
– There was no breach of its systems 
– The hackers gained access through phishing or answering password recovery questions (but that 
involves rate limiting, no?) on targeted accounts 
– Advised all users to activate its two factor authentication (already known not to protect all entry 
points into the Apple kingdom)
The “Fappening” 
(Not All Details Confirmed By Apple) 
• Apple’s “cloud” (everything from iTunes to iCloud) relies on one Apple ID and password 
per user 
• Allegedly involved the undocumented Find My iPhone API (FMI API) – undocumented 
APIs are easy to reverse engineer 
• FMI API required only user name and password for authentication (no other forms of 
authentication like OAuth tokens) 
• FMI API had no rate limiting on it, allowing for an infinite number of attempts or what is 
otherwise known in security circles as a brute force attack. 
• Just needed a bit of code that loops and loops and loops 
• They called that bit of code iBrute and published it to Github 
• For passwords, hackers allegedly used the infamous RockYou database; a big sample 
listing the passwords for 14 million accounts that were compromised when the social 
gaming service was compromised in 2009 
• Once the passwords were discovered, they used Elcomsoft Phone Password Breaker 
(EPPB) to handle the bulk downloads and from there the photos are being published. 
• Within hours, Apple installed rate limiting on the API. 
• The phishing attacks preying on the media-induced fear started almost immediately 
• Apple claimed: 
– There was no breach of its systems 
– The hackers gained access through phishing or answering password recovery questions (but that 
involves rate limiting, no?) on targeted accounts 
– Advised all users to activate its two factor authentication (already known not to protect all entry 
points into the Apple kingdom)
The “Fappening” 
(Not All Details Confirmed By Apple) 
• Apple’s “cloud” (everything from iTunes to iCloud) relies on one Apple ID and password 
per user 
• Allegedly involved the undocumented Find My iPhone API (FMI API) – undocumented 
APIs are easy to reverse engineer 
• FMI API required only user name and password for authentication (no other forms of 
authentication like OAuth tokens) 
• FMI API had no rate limiting on it, allowing for an infinite number of attempts or what is 
otherwise known in security circles as a brute force attack. 
• Just needed a bit of code that loops and loops and loops 
• They called that bit of code iBrute and published it to Github 
• For passwords, hackers allegedly used the infamous RockYou database; a big sample 
listing the passwords for 14 million accounts that were compromised when the social 
gaming service was compromised in 2009 
• Once the passwords were discovered, they used Elcomsoft Phone Password Breaker 
(EPPB) to handle the bulk downloads and from there the photos are being published. 
• Within hours, Apple installed rate limiting on the API. 
• The phishing attacks preying on the media-induced fear started almost immediately 
• Apple claimed: 
– There was no breach of its systems 
– The hackers gained access through phishing or answering password recovery questions (but that 
involves rate limiting, no?) on targeted accounts 
– Advised all users to activate its two factor authentication (already known not to protect all entry 
points into the Apple kingdom)
The “Fappening” 
(Not All Details Confirmed By Apple) 
• Apple’s “cloud” (everything from iTunes to iCloud) relies on one Apple ID and password 
per user 
• Allegedly involved the undocumented Find My iPhone API (FMI API) – undocumented 
APIs are easy to reverse engineer 
• FMI API required only user name and password for authentication (no other forms of 
authentication like OAuth tokens) 
• FMI API had no rate limiting on it, allowing for an infinite number of attempts or what is 
otherwise known in security circles as a brute force attack. 
• Just needed a bit of code that loops and loops and loops 
• They called that bit of code iBrute and published it to Github 
• For passwords, hackers allegedly used the infamous RockYou database; a big sample 
listing the passwords for 14 million accounts that were compromised when the social 
gaming service was compromised in 2009 
• Once the passwords were discovered, they used Elcomsoft Phone Password Breaker 
(EPPB) to handle the bulk downloads and from there the photos are being published. 
• Within hours, Apple installed rate limiting on the API. 
• The phishing attacks preying on the media-induced fear started almost immediately 
• Apple claimed: 
– There was no breach of its systems 
– The hackers gained access through phishing or answering password recovery questions (but that 
involves rate limiting, no?) on targeted accounts 
– Advised all users to activate its two factor authentication (already known not to protect all entry 
points into the Apple kingdom)
The “Fappening” 
(Not All Details Confirmed By Apple) 
• Apple’s “cloud” (everything from iTunes to iCloud) relies on one Apple ID and password 
per user 
• Allegedly involved the undocumented Find My iPhone API (FMI API) – undocumented 
APIs are easy to reverse engineer 
• FMI API required only user name and password for authentication (no other forms of 
authentication like OAuth tokens) 
• FMI API had no rate limiting on it, allowing for an infinite number of attempts or what is 
otherwise known in security circles as a brute force attack. 
• Just needed a bit of code that loops and loops and loops 
• They called that bit of code iBrute and published it to Github 
• For passwords, hackers allegedly used the infamous RockYou database; a big sample 
listing the passwords for 14 million accounts that were compromised when the social 
gaming service was compromised in 2009 
• Once the passwords were discovered, they used Elcomsoft Phone Password Breaker 
(EPPB) to handle the bulk downloads and from there the photos are being published. 
• Within hours, Apple installed rate limiting on the API. 
• The phishing attacks preying on the media-induced fear started almost immediately 
• Apple claimed: 
– There was no breach of its systems 
– The hackers gained access through phishing or answering password recovery questions (but that 
involves rate limiting, no?) on targeted accounts 
– Advised all users to activate its two factor authentication (already known not to protect all entry 
points into the Apple kingdom)
The “Fappening” 
(Not All Details Confirmed By Apple) 
• Apple’s “cloud” (everything from iTunes to iCloud) relies on one Apple ID and password 
per user 
• Allegedly involved the undocumented Find My iPhone API (FMI API) – undocumented 
APIs are easy to reverse engineer 
• FMI API required only user name and password for authentication (no other forms of 
authentication like OAuth tokens) 
• FMI API had no rate limiting on it, allowing for an infinite number of attempts or what is 
otherwise known in security circles as a brute force attack. 
• Just needed a bit of code that loops and loops and loops 
• They called that bit of code iBrute and published it to Github 
• For passwords, hackers allegedly used the infamous RockYou database; a big sample 
listing the passwords for 14 million accounts that were compromised when the social 
gaming service was compromised in 2009 
• Once the passwords were discovered, they used Elcomsoft Phone Password Breaker 
(EPPB) to handle the bulk downloads and from there the photos are being published. 
• Within hours, Apple installed rate limiting on the API. 
• The phishing attacks preying on the media-induced fear started almost immediately 
• Apple claimed: 
– There was no breach of its systems 
– The hackers gained access through phishing or answering password recovery questions (but that 
involves rate limiting, no?) on targeted accounts 
– Advised all users to activate its two factor authentication (already known not to protect all entry 
points into the Apple kingdom)
Source Code to iBrute on Github
The “Fappening” 
(Not All Details Confirmed By Apple) 
• Apple’s “cloud” (everything from iTunes to iCloud) relies on one Apple ID and password 
per user 
• Allegedly involved the undocumented Find My iPhone API (FMI API) – undocumented 
APIs are easy to reverse engineer 
• FMI API required only user name and password for authentication (no other forms of 
authentication like OAuth tokens) 
• FMI API had no rate limiting on it, allowing for an infinite number of attempts or what is 
otherwise known in security circles as a brute force attack. 
• Just needed a bit of code that loops and loops and loops 
• They called that bit of code iBrute and published it to Github 
• For passwords, hackers allegedly used the infamous RockYou database; a big sample 
listing the passwords for 30M accounts that were compromised when that social 
gaming service was compromised in 2009 
• Once the passwords were discovered, they used Elcomsoft Phone Password Breaker 
(EPPB) to handle the bulk downloads and from there the photos are being published. 
• Within hours, Apple installed rate limiting on the API. 
• The phishing attacks preying on the media-induced fear started almost immediately 
• Apple claimed: 
– There was no breach of its systems 
– The hackers gained access through phishing or answering password recovery questions (but that 
involves rate limiting, no?) on targeted accounts 
– Advised all users to activate its two factor authentication (already known not to protect all entry 
points into the Apple kingdom)
The “Fappening” 
(Not All Details Confirmed By Apple) 
• Apple’s “cloud” (everything from iTunes to iCloud) relies on one Apple ID and password 
per user 
• Allegedly involved the undocumented Find My iPhone API (FMI API) – undocumented 
APIs are easy to reverse engineer 
• FMI API required only user name and password for authentication (no other forms of 
authentication like OAuth tokens) 
• FMI API had no rate limiting on it, allowing for an infinite number of attempts or what is 
otherwise known in security circles as a brute force attack. 
• Just needed a bit of code that loops and loops and loops 
• They called that bit of code iBrute and published it to Github 
• For passwords, hackers allegedly used the infamous RockYou database; a big sample 
listing the passwords for 30M accounts that were compromised when the social gaming 
service was compromised in 2009 
• Once the passwords were discovered, they used Elcomsoft Phone Password Breaker 
(EPPB) to handle the bulk downloads and from there the photos are being published. 
• Within hours, Apple installed rate limiting on the API. 
• The phishing attacks preying on the media-induced fear started almost immediately 
• Apple claimed: 
– There was no breach of its systems 
– The hackers gained access through phishing or answering password recovery questions (but that 
involves rate limiting, no?) on targeted accounts 
– Advised all users to activate its two factor authentication (already known not to protect all entry 
points into the Apple kingdom)
The “Fappening” 
(Not All Details Confirmed By Apple) 
• Apple’s “cloud” (everything from iTunes to iCloud) relies on one Apple ID and password 
per user 
• Allegedly involved the undocumented Find My iPhone API (FMI API) – undocumented 
APIs are easy to reverse engineer 
• FMI API required only user name and password for authentication (no other forms of 
authentication like OAuth tokens) 
• FMI API had no rate limiting on it, allowing for an infinite number of attempts or what is 
otherwise known in security circles as a brute force attack. 
• Just needed a bit of code that loops and loops and loops 
• They called that bit of code iBrute and published it to Github 
• For passwords, hackers allegedly used the infamous RockYou database; a big sample 
listing the passwords for 30M accounts that were compromised when the social gaming 
service was compromised in 2009 
• Once the passwords were discovered, they used Elcomsoft Phone Password Breaker 
(EPPB) to handle the bulk downloads and from there the photos are being published. 
• Within hours, Apple installed rate limiting on the API. 
• The phishing attacks preying on the media-induced fear started almost immediately 
• Apple claimed: 
– There was no breach of its systems 
– The hackers gained access through phishing or answering password recovery questions (but that 
involves rate limiting, no?) on targeted accounts 
– Advised all users to activate its two factor authentication (already known not to protect all entry 
points into the Apple kingdom)
The “Fappening” 
(Not All Details Confirmed By Apple) 
• Apple’s “cloud” (everything from iTunes to iCloud) relies on one Apple ID and password 
per user 
• Allegedly involved the undocumented Find My iPhone API (FMI API) – undocumented 
APIs are easy to reverse engineer 
• FMI API required only user name and password for authentication (no other forms of 
authentication like OAuth tokens) 
• FMI API had no rate limiting on it, allowing for an infinite number of attempts or what is 
otherwise known in security circles as a brute force attack. 
• Just needed a bit of code that loops and loops and loops 
• They called that bit of code iBrute and published it to Github 
• For passwords, hackers allegedly used the infamous RockYou database; a big sample 
listing the passwords for 30M accounts that were compromised when the social gaming 
service was compromised in 2009 
• Once the passwords were discovered, they used Elcomsoft Phone Password Breaker 
(EPPB) to handle the bulk downloads and from there the photos are being published. 
• Within hours, Apple installed rate limiting on the API. 
• The phishing attacks preying on the media-induced fear started almost immediately 
• Apple claimed: 
– There was no breach of its systems 
– The hackers gained access through phishing or answering password recovery questions (but that 
involves rate limiting, no?) on targeted accounts 
– Advised all users to activate its two factor authentication (already known not to protect all entry 
points into the Apple kingdom)
The “Fappening” 
(Not All Details Confirmed By Apple) 
• Apple’s “cloud” (everything from iTunes to iCloud) relies on one Apple ID and password 
per user 
• Allegedly involved the undocumented Find My iPhone API (FMI API) – undocumented 
APIs are easy to reverse engineer 
• FMI API required only user name and password for authentication (no other forms of 
authentication like OAuth tokens) 
• FMI API had no rate limiting on it, allowing for an infinite number of attempts or what is 
otherwise known in security circles as a brute force attack. 
• Just needed a bit of code that loops and loops and loops 
• They called that bit of code iBrute and published it to Github 
• For passwords, hackers allegedly used the infamous RockYou database; a big sample 
listing the passwords for 30M accounts that were compromised when the social gaming 
service was compromised in 2009 
• Once the passwords were discovered, they used Elcomsoft Phone Password Breaker 
(EPPB) to handle the bulk downloads and from there the photos are being published. 
• Within hours, Apple installed rate limiting on the API. 
• The phishing attacks preying on the media-induced fear started almost immediately 
• Apple claimed: 
– There was no breach of its systems 
– The hackers gained access through phishing or answering password recovery questions (but that 
involves rate limiting, no?) on targeted accounts 
– Advised all users to activate its two factor authentication (already known not to protect all entry 
points into the Apple kingdom)
Common Breach Patterns 
• Hackers seek potential for scale (APIs are sitting ducks!) 
• Original transgression often targeted and undetected 
• Leverages trusted relationships (the downside of social nets) 
• Publication or black market sale of content 
• Publication of source code 
• Media coverage, useless expert advice 
• Official company disclosure (sometimes) 
• News goes viral on social media (usually negative) 
• Partners get sucked inn 
• Phishing attack (the second wave), invariably malware 
• Additional transgressions 
• Additional “publications”
Common Breach Patterns 
• Hackers seek potential for scale (APIs are sitting ducks!) 
• Original transgression often targeted and undetected 
• Leverages trusted relationships (the downside of social nets) 
• Publication or black market sale of content 
• Publication of source code 
• Media coverage, useless expert advice 
• Official company disclosure (sometimes) 
• News goes viral on social media (usually negative) 
• Partners get sucked inn 
• Phishing attack (the second wave), invariably malware 
• Additional transgressions 
• Additional “publications”
Common Breach Patterns 
• Hackers seek potential for scale (APIs are sitting ducks!) 
• Original transgression often targeted and undetected 
• Leverages trusted relationships (the downside of social nets) 
• Publication or black market sale of content 
• Publication of source code 
• Media coverage, useless expert advice 
• Official company disclosure (sometimes) 
• News goes viral on social media (usually negative) 
• Partners get sucked inn 
• Phishing attack (the second wave), invariably malware 
• Additional transgressions 
• Additional “publications”
Common Breach Patterns 
• Hackers seek potential for scale (APIs are sitting ducks!) 
• Original transgression often targeted and undetected 
• Leverages trusted relationships (the downside of social nets) 
• Publication or black market sale of content 
• Publication of source code 
• Media coverage, useless expert advice 
• Official company disclosure (sometimes) 
• News goes viral on social media (usually negative) 
• Partners get sucked inn 
• Phishing attack (the second wave), invariably malware 
• Additional transgressions 
• Additional “publications”
Common Breach Patterns 
• Hackers seek potential for scale (APIs are sitting ducks!) 
• Original transgression often targeted and undetected 
• Leverages trusted relationships (the downside of social nets) 
• Publication or black market sale of content 
• Publication of source code 
• Media coverage, useless expert advice 
• Official company disclosure (sometimes) 
• News goes viral on social media (usually negative) 
• Partners get sucked inn 
• Phishing attack (the second wave), invariably malware 
• Additional transgressions 
• Additional “publications”
Common Breach Patterns 
• Hackers seek potential for scale (APIs are sitting ducks!) 
• Original transgression often targeted and undetected 
• Leverages trusted relationships (the downside of social nets) 
• Publication or black market sale of content 
• Publication of source code 
• Media coverage, useless expert advice 
• Official company disclosure (sometimes) 
• News goes viral on social media (usually negative) 
• Partners get sucked inn 
• Phishing attack (the second wave), invariably malware 
• Additional transgressions 
• Additional “publications”
Common Breach Patterns 
• Hackers seek potential for scale (APIs are sitting ducks!) 
• Original transgression often targeted and undetected 
• Leverages trusted relationships (the downside of social nets) 
• Publication or black market sale of content 
• Publication of source code 
• Media coverage, useless expert advice 
• Official company disclosure (sometimes) 
• News goes viral on social media (usually negative) 
• Partners get sucked inn 
• Phishing attack (the second wave), invariably malware 
• Additional transgressions 
• Additional “publications”
Common Breach Patterns 
• Hackers seek potential for scale (APIs are sitting ducks!) 
• Original transgression often targeted and undetected 
• Leverages trusted relationships (the downside of social nets) 
• Publication or black market sale of content 
• Publication of source code 
• Media coverage, useless expert advice 
• Official company disclosure (sometimes) 
• News goes viral on social media (usually negative) 
• Partners get sucked inn 
• Phishing attack (the second wave), invariably malware 
• Additional transgressions 
• Additional “publications”
Common Breach Patterns 
• Hackers seek potential for scale (APIs are sitting ducks!) 
• Original transgression often targeted and undetected 
• Leverages trusted relationships (the downside of social nets) 
• Publication or black market sale of content 
• Publication of source code 
• Media coverage, useless expert advice 
• Official company disclosure (sometimes) 
• News goes viral on social media (usually negative) 
• Partners get sucked in 
• Phishing attack (the second wave), invariably malware 
• Additional transgressions 
• Additional “publications”
Common Breach Patterns 
• Hackers seek potential for scale (APIs are sitting ducks!) 
• Original transgression often targeted and undetected 
• Leverages trusted relationships (the downside of social nets) 
• Publication or black market sale of content 
• Publication of source code 
• Media coverage, useless expert advice 
• Official company disclosure (sometimes) 
• News goes viral on social media (usually negative) 
• Partners get sucked in 
• Phishing attack (the second wave), invariably malware 
• Additional transgressions 
• Additional “publications”
Common Breach Patterns 
• Hackers seek potential for scale (APIs are sitting ducks!) 
• Original transgression often targeted and undetected 
• Leverages trusted relationships (the downside of social nets) 
• Publication or black market sale of content 
• Publication of source code 
• Media coverage, useless expert advice 
• Official company disclosure (sometimes) 
• News goes viral on social media (usually negative) 
• Partners get sucked inn 
• Phishing attack (the second wave), invariably malware 
• Additional transgressions 
• Additional “publications”
Common Breach Patterns 
• Hackers seek potential for scale (APIs are sitting ducks!) 
• Original transgression often targeted and undetected 
• Leverages trusted relationships (the downside of social nets) 
• Publication or black market sale of content 
• Publication of source code 
• Media coverage, useless expert advice 
• Official company disclosure (sometimes) 
• News goes viral on social media (usually negative) 
• Partners get sucked inn 
• Phishing attack (the second wave), invariably malware 
• Additional transgressions 
• Additional “publications”
Consequences of Breaches 
• Of those individuals, 38 percent said they no longer did business with the 
organization because of the data breach. A larger number, 46 percent, said they 
‘advised friends and family to be careful of sharing data with the organization 
(Economist Intelligence Report). 
• Possible account suspensions (eg: Twitter, etc.) 
• Loss of developer confidence 
• Micro financial impact (loss of revenues, customers, partners, costly reconciliation) 
• Legal financial impact (lawsuits, fines, etc.) 
• Meta financial Impact (on stock of company, upcoming public offering, or on entire 
stock market) 
• Lives are forever changed 
• Business shutdown
Consequences of Breaches 
• Of those individuals, 38 percent said they no longer did business with the 
organization because of the data breach. A larger number, 46 percent, said they 
‘advised friends and family to be careful of sharing data with the organization 
(Economist Intelligence Report). 
• Possible account suspensions (eg: Twitter, etc.) 
• Loss of developer confidence 
• Micro financial impact (loss of revenues, customers, partners, costly reconciliation) 
• Legal financial impact (lawsuits, fines, etc.) 
• Meta financial Impact (on stock of company, upcoming public offering, or on entire 
stock market) 
• Lives are forever changed 
• Business shutdown
Consequences of Breaches 
• Of those individuals, 38 percent said they no longer did business with the 
organization because of the data breach. A larger number, 46 percent, said they 
‘advised friends and family to be careful of sharing data with the organization 
(Economist Intelligence Report). 
• Possible account suspensions (eg: Twitter, etc.) 
• Loss of developer confidence 
• Micro financial impact (loss of revenues, customers, partners, costly reconciliation) 
• Legal financial impact (lawsuits, fines, etc.) 
• Meta financial Impact (on stock of company, upcoming public offering, or on entire 
stock market) 
• Lives are forever changed 
• Business shutdown
Consequences of Breaches 
• Of those individuals, 38 percent said they no longer did business with the 
organization because of the data breach. A larger number, 46 percent, said they 
‘advised friends and family to be careful of sharing data with the organization 
(Economist Intelligence Report). 
• Possible account suspensions (eg: Twitter, etc.) 
• Loss of developer confidence 
• Micro financial impact (loss of revenues, customers, partners, costly reconciliation) 
• Legal financial impact (lawsuits, fines, etc.) 
• Meta financial Impact (on stock of company, upcoming public offering, or on entire 
stock market) 
• Lives are forever changed 
• Business shutdown
Post Intrusion Costs (Malware) 
“Breaches due to malware or spyware represented only 11% by number of 
breaches in 2013 and 2014, but they have been increasing, with the total 
number of breaches in this category growing by 20% between 2013 and 
2014. Due to heavy forensics costs (money spent to find out exactly how the 
breach occurred) these breaches are on average 4.5 times more costly than 
the largest loss category, unintended disclosure.” (source: Beazley) 
* Malware is smallest group with biggest impact
Consequences of Breaches 
• Of those individuals, 38 percent said they no longer did business with the 
organization because of the data breach. A larger number, 46 percent, said they 
‘advised friends and family to be careful of sharing data with the organization 
(Economist Intelligence Report). 
• Possible account suspensions (eg: Twitter, etc.) 
• Loss of developer confidence 
• Micro financial impact (loss of revenues, customers, partners, costly reconciliation) 
• Legal financial impact (lawsuits, fines, etc.) 
• Meta financial Impact (on stock of company, upcoming public offering, or on entire 
stock market) 
• Lives are forever changed 
• Business shutdown
Consequences of Breaches 
• Of those individuals, 38 percent said they no longer did business with the 
organization because of the data breach. A larger number, 46 percent, said they 
‘advised friends and family to be careful of sharing data with the organization 
(Economist Intelligence Report). 
• Possible account suspensions (eg: Twitter, etc.) 
• Loss of developer confidence 
• Micro financial impact (loss of revenues, customers, partners, costly reconciliation) 
• Legal financial impact (lawsuits, fines, etc.) 
• Meta financial Impact (on stock of company, upcoming public offering, or on entire 
stock market) 
• Lives are forever changed 
• Business shutdown
1 Tweet Sends Dow Down By 140
Consequences of Breaches 
• Of those individuals, 38 percent said they no longer did business with the 
organization because of the data breach. A larger number, 46 percent, said they 
‘advised friends and family to be careful of sharing data with the organization 
(Economist Intelligence Report). 
• Possible account suspensions (eg: Twitter, etc.) 
• Loss of developer confidence 
• Micro financial impact (loss of revenues, customers, partners, costly reconciliation) 
• Legal financial impact (lawsuits, fines, etc.) 
• Meta financial Impact (on stock of company, upcoming public offering, or on entire 
stock market) 
• Lives are forever changed 
• Business shutdown
Consequences of Breaches 
• Of those individuals, 38 percent said they no longer did business with the 
organization because of the data breach. A larger number, 46 percent, said they 
‘advised friends and family to be careful of sharing data with the organization 
(Economist Intelligence Report). 
• Possible account suspensions (eg: Twitter, etc.) 
• Loss of developer confidence 
• Micro financial impact (loss of revenues, customers, partners, costly reconciliation) 
• Legal financial impact (lawsuits, fines, etc.) 
• Meta financial Impact (on stock of company, upcoming public offering, or on entire 
stock market) 
• Lives are forever changed 
• Business scuttled
Reaches of Breaches 
• An Economist Intelligence Unit study conducted among consumers in 24 countries in 
March 2013 found that 18 percent of respondents had been a victim of a data breach 
(2014) 
• Adobe: 150 million userIDs, email addresses, pwd hashes, password hints(2013) 
• eBay: 145 million userIDs, email addresses, pwd hashes, birthdates, addresses, first, 
last, phone numbers, targeted eBay employees (2014) 
• RockYou: 30 million user IDs, Passwords (2009) 
• TJX: 90 million credit/debit cards 
• Target: 100 million credit/debit cards, PoS malware; “BlackPOS” a.k.a. Kaptoxa” (2013) 
• Home Depot: 56 million credit/debit cards, same (forked) malware as Target (2014)
Eventually… 
Someone will build and publish a 
database that maps user IDs to 
actual people and all of their 
data (creating a bigger problem 
for shared passwords)
Malware Case Study: Pony BotNet
Malware Case Study: Pony BotNet
Pony summary stats 
• A total of nearly 650,000 website credential stolen, with the top sites 
being: 
• ~90,000 credentials for Facebook accounts 
• ~25,000 credentials for Yahoo accounts 
• ~20,000 credentials for Google accounts 
• And many more with lower individual numbers, but still amounting to 
the remaining 515,000 accounts 
• Next in numbers were email accounts, with 17,000 compromised 
• And for the frosting on this credential cake are 7,000 stolen FTP 
credentials. 
Source: http://blog.spiderlabs.com/2013/06/look-what-i-found-its-a-pony-1.html
Fork of Pony 
• Approximately 2MM total 
• ~1,580,000 website login credentials stolen 
• ~320,000 email account credentials stolen 
• ~41,000 FTP account credentials stolen 
• ~3,000 Remote Desktop credentials stolen 
• ~3,000 Secure Shell account credentials stolen 
Source: http://blog.spiderlabs.com/2013/12/look-what-i-found-moar-pony.html
More recently 
“Cyber criminals have also developed 
botnets that force enslaved computers to 
create, or "mine", digital currencies, which 
the fraudsters then claim as their own.” 
http://www.reuters.com/article/2014/02/24/us-bitcoin-security- 
idUSBREA1N1JO20140224
Challenges in API Security 
(work that we, the API industry must do) 
• Massive proliferation of APIs where security was after-thought or non-thought 
• User ID / password absurdity 
– Shared passwords (really no solution) 
– Weak passwords 
– Discoverable Passwords 
– Horrendous Best Practices 
• Non-uniform implementations of 
– App Secrets 
– Callback URLs 
• Good security is expensive 
– Talent 
– Resources like HSM 
• Administrative tools for key/OAuth management limited 
– Analytics 
– Revocation/Reissue 
• Unknown possibilities for 2FA with APIs 
• Internet of Things 
• Standards still in the works 
• Disclosure / Collaboration
Challenges in API Security 
"There are far too many APIs being cranked out in such a short period of time... there 
is no way that they have all been properly secured and built. There will definitely be 
new attack vectors in an API-centric Internet, but we are still too early to know the 
pervasiveness of such attacks." - Evident.io founder and former Adobe Creative 
Cloud Architecture & Security Team Lead Tim Prendergast 
(http://twitter.com/auxome)
Challenges in API Security 
(work that we, the API industry must do) 
• Massive proliferation of APIs where security was after-thought or non-thought 
• User ID / password absurdity 
– Shared passwords (really no solution) 
– Weak passwords 
– Discoverable Passwords 
– Horrendous Best Practices 
• Non-uniform implementations of 
– App Secrets 
– Callback URLs 
• Good security is expensive 
– Talent 
– Resources like HSM 
• Administrative tools for key/OAuth management limited 
– Analytics 
– Revocation/Reissue 
• Unknown possibilities for 2FA with APIs 
• Internet of Things 
• Standards still in the works 
• Disclosure / Collaboration
Challenges in API Security 
(work that we, the API industry must do) 
• Massive proliferation of APIs where security was after-thought or non-thought 
• User ID / password absurdity 
– Shared passwords (really no solution) 
– Weak passwords 
– Discoverable Passwords 
– Horrendous Best Practices 
• Non-uniform implementations of 
– App Secrets 
– Callback URLs 
• Good security is expensive 
– Talent 
– Resources like HSM 
• Administrative tools for key/OAuth management limited 
– Analytics 
– Revocation/Reissue 
• Unknown possibilities for 2FA with APIs 
• Internet of Things 
• Standards still in the works 
• Disclosure / Collaboration
Challenges in API Security 
(work that we, the API industry must do) 
• Massive proliferation of APIs where security was after-thought or non-thought 
• User ID / password absurdity 
– Shared passwords (really no solution) 
– Weak passwords 
– Discoverable Passwords 
– Horrendous Best Practices 
• Non-uniform implementations of 
– App Secrets 
– Callback URLs 
• Good security is expensive 
– Talent 
– Resources like HSM 
• Administrative tools for key/OAuth management limited 
– Analytics 
– Revocation/Reissue 
• Unknown possibilities for 2FA with APIs 
• Internet of Things 
• Standards still in the works 
• Disclosure / Collaboration
Discoverable Password Recovery 
Information
Challenges in API Security 
(work that we, the API industry must do) 
• Massive proliferation of APIs where security was after-thought or non-thought 
• User ID / password absurdity 
– Shared passwords (really no solution) 
– Weak passwords 
– Discoverable Passwords 
– Horrendous Best Practices 
• Non-uniform implementations of 
– App Secrets 
– Callback URLs 
• Good security is expensive 
– Talent 
– Resources like HSM 
• Administrative tools for key/OAuth management limited 
– Analytics 
– Revocation/Reissue 
• Unknown possibilities for 2FA with APIs 
• Internet of Things 
• Standards still in the works 
• Disclosure / Collaboration
Horrendous Password Practices
Horrendous Password Practices
Challenges in API Security 
(work that we, the API industry must do) 
• Massive proliferation of APIs where security was after-thought or non-thought 
• User ID / password absurdity 
– Shared passwords (really no solution) 
– Weak passwords 
– Discoverable Passwords 
– Horrendous Best Practices 
• Non-uniform implementations of 
– App Secrets 
– Callback URLs 
• Good security is expensive 
– Talent 
– Resources like HSM 
• Administrative tools for key/OAuth management limited 
– Analytics 
– Revocation/Reissue 
• Unknown possibilities for 2FA with APIs 
• Internet of Things 
• Standards still in the works 
• Disclosure / Collaboration
Twitter Requires App Secret
Facebook Doesn’t
Keys and Secrets Sold/Published 
https://gist.github.com/rhenium/3878505
Challenges in API Security 
(work that we, the API industry must do) 
• Massive proliferation of APIs where security was after-thought or non-thought 
• User ID / password absurdity 
– Shared passwords (really no solution) 
– Weak passwords 
– Discoverable Passwords 
– Horrendous Best Practices 
• Non-uniform implementations of 
– App Secrets 
– Callback URLs 
• Good security is expensive 
– Talent 
– Resources like HSM 
• Administrative tools for key/OAuth management limited 
– Analytics 
– Revocation/Reissue 
• Unknown possibilities for 2FA with APIs 
• Internet of Things 
• Standards still in the works 
• Disclosure / Collaboration
Callback URL Not Always Required
Challenges in API Security 
(work that we, the API industry must do) 
• Massive proliferation of APIs where security was after-thought or non-thought 
• User ID / password absurdity 
– Shared passwords (really no solution) 
– Weak passwords 
– Discoverable Passwords 
– Horrendous Best Practices 
• Non-uniform implementations of 
– App Secrets 
– Callback URLs 
• Good security is expensive 
– Talent 
– Resources like HSM 
• Administrative tools for key/OAuth management limited 
– Analytics 
– Revocation/Reissue 
• Unknown possibilities for 2FA with APIs 
• Internet of Things 
• Standards still in the works 
• Disclosure / Collaboration
Challenges in API Security 
(work that we, the API industry must do) 
• Massive proliferation of APIs where security was after-thought or non-thought 
• User ID / password absurdity 
– Shared passwords (really no solution) 
– Weak passwords 
– Discoverable Passwords 
– Horrendous Best Practices 
• Non-uniform implementations of 
– App Secrets 
– Callback URLs 
• Good security is expensive 
– Talent 
– Resources like HSM (Hardware Security Module) 
• Administrative tools for key/OAuth management limited 
– Analytics 
– Revocation/Reissue 
• Unknown possibilities for 2FA with APIs 
• Internet of Things 
• Standards still in the works 
• Disclosure / Collaboration
It’s Expensive to Secure Secrets
Challenges in API Security 
(work that we, the API industry must do) 
• Massive proliferation of APIs where security was after-thought or non-thought 
• User ID / password absurdity 
– Shared passwords (really no solution) 
– Weak passwords 
– Discoverable Passwords 
– Horrendous Best Practices 
• Non-uniform implementations of 
– App Secrets 
– Callback URLs 
• Good security is expensive 
– Talent 
– Resources like HSM (Hardware Security Module) 
• Administrative tools for key/OAuth management limited 
– Analytics 
– Revocation/Reissue 
• Unknown possibilities for 2FA with APIs 
• Internet of Things 
• Standards still in the works 
• Disclosure / Collaboration
Challenges in API Security 
(work that we, the API industry must do) 
• Massive proliferation of APIs where security was after-thought or non-thought 
• User ID / password absurdity 
– Shared passwords (really no solution) 
– Weak passwords 
– Discoverable Passwords 
– Horrendous Best Practices 
• Non-uniform implementations of 
– App Secrets 
– Callback URLs 
• Good security is expensive 
– Talent 
– Resources like HSM (Hardware Security Module) 
• Administrative tools for key/OAuth management limited 
– Analytics 
– Revocation/Reissue 
• Unknown possibilities for 2FA with APIs 
• Internet of Things 
• Standards still in the works 
• Disclosure / Collaboration
Challenges in API Security 
(work that we, the API industry must do) 
• Massive proliferation of APIs where security was after-thought or non-thought 
• User ID / password absurdity 
– Shared passwords (really no solution) 
– Weak passwords 
– Discoverable Passwords 
– Horrendous Best Practices 
• Non-uniform implementations of 
– App Secrets 
– Callback URLs 
• Good security is expensive 
– Talent 
– Resources like HSM (Hardware Security Module) 
• Administrative tools for key/OAuth management limited 
– Analytics 
– Revocation/Reissue 
• Unknown possibilities for 2FA with APIs 
• Internet of Things 
• Standards still in the works 
• Disclosure / Collaboration
Challenges in API Security 
(work that we, the API industry must do) 
• Massive proliferation of APIs where security was after-thought or non-thought 
• User ID / password absurdity 
– Shared passwords (really no solution) 
– Weak passwords 
– Discoverable Passwords 
– Horrendous Best Practices 
• Non-uniform implementations of 
– App Secrets 
– Callback URLs 
• Good security is expensive 
– Talent 
– Resources like HSM (Hardware Security Module) 
• Administrative tools for key/OAuth management limited 
– Analytics 
– Revocation/Reissue 
• Unknown possibilities for 2FA with APIs 
• Internet of Things 
• Standards still in the works 
• Disclosure / Collaboration
The IoT Exacerbation 
• 50 billion devices by 2020 
• Proliferation of miniaturized but battle-untested 
platforms and operating systems 
• Security and usage patterns barely understood 
• Non-standard protocols involving less-evolved 
security 
• Endpoints sprinkled across devices, proxies, and 
the cloud 
• Involving massive amount of sensitive data
Challenges in API Security 
(work that we, the API industry must do) 
• Massive proliferation of APIs where security was after-thought or non-thought 
• User ID / password absurdity 
– Shared passwords (really no solution) 
– Weak passwords 
– Discoverable Passwords 
– Horrendous Best Practices 
• Non-uniform implementations of 
– App Secrets 
– Callback URLs 
• Good security is expensive 
– Talent 
– Resources like HSM (Hardware Security Module) 
• Administrative tools for key/OAuth management limited 
– Analytics 
– Revocation/Reissue 
• Unknown possibilities for 2FA with APIs 
• Internet of Things 
• Standards still in the works 
• Disclosure / Collaboration
Challenges in API Security 
(work that we, the API industry must do) 
• Massive proliferation of APIs where security was after-thought or non-thought 
• User ID / password absurdity 
– Shared passwords (really no solution) 
– Weak passwords 
– Discoverable Passwords 
– Horrendous Best Practices 
• Non-uniform implementations of 
– App Secrets 
– Callback URLs 
• Good security is expensive 
– Talent 
– Resources like HSM (Hardware Security Module) 
• Administrative tools for key/OAuth management limited 
– Analytics 
– Revocation/Reissue 
• Unknown possibilities for 2FA with APIs 
• Internet of Things 
• Standards still in the works 
• Documentation / Disclosure / Collaboration
Lax Docs 
stated here https://developer.linkedin.com/documents/getting-oauth-token 
"You now have an access token and can make LinkedIn API calls. Please 
ensure to keep the user access tokens secure, as agreed upon in our APIs 
Terms of Use." 
But the terms of use: http://developer.linkedin.com/documents/linkedin-apis- 
terms-use 
Do not say or suggest that tokens must be stored or encrypted and how to do 
that.
Indecent Disclosure? 
Could even more be done?
Protect Your API & Adjacencies 
• API security not just about securing the API itself 
• Do not rely on user credentials (user ID / password) for authentication 
• When issuing tokens, refresh frequently 
• Require app key and secret (not a silver bullet, but a barrier) 
• Require call-back URLs to go with application keys and secrets 
• Secure as much as possible via HSM or reasonable alternatives 
• Encrypt data in transit and at rest 
• Require 2FA-based authentication for all developers 
• Develop and regression test against known security patterns (make Apple’s 
problem your problem) for all APIs (documented/undocumented) 
• Require/Reject User Settable Recovery Questions (where credentials are required) 
• Include Email address of record for recovery workflow? 
• Better more prescriptive documentation 
• Developer and end-user testing 
• Better Disclosure (for your users/customers, for the industry) 
• Monitor OAuth WG Proof of Possession (PoP) Standard
Protect Yourselves 
• Only use password protected WiFi 
• Use a VPN if possible 
• Use 2FA-supported Federated Login when Possible 
(reduce reliance on user ID/password combinations) 
• Examine email links before clicking through 
• Force token resets on a regular basis: 
– Example: go to Twitter settings revoke client app access 
(eg: Buffer), grant it access again (forces re-issue of token) 
• Check known sites for PWNage 
• Setup a Google Alert?
https://isleaked.com/action/check/
https://www3.trustwave.com/support/labs/check-compromised-email.asp
Pwned? 
http://www.haveibeenpwned.com/
API Security < Internet Security

Mais conteúdo relacionado

Mais procurados

APISecurity_OWASP_MitigationGuide
APISecurity_OWASP_MitigationGuide APISecurity_OWASP_MitigationGuide
APISecurity_OWASP_MitigationGuide Isabelle Mauny
 
The Dev, Sec and Ops of API Security - NordicAPIs
The Dev, Sec and Ops of API Security - NordicAPIsThe Dev, Sec and Ops of API Security - NordicAPIs
The Dev, Sec and Ops of API Security - NordicAPIs42Crunch
 
Guidelines to protect your APIs from threats
Guidelines to protect your APIs from threatsGuidelines to protect your APIs from threats
Guidelines to protect your APIs from threatsIsabelle Mauny
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applicationsNiyas Nazar
 
CIS13: APIs, Identity, and Securing the Enterprise
CIS13: APIs, Identity, and Securing the EnterpriseCIS13: APIs, Identity, and Securing the Enterprise
CIS13: APIs, Identity, and Securing the EnterpriseCloudIDSummit
 
Layered API Security: What Hackers Don't Want You To Know
Layered API Security: What Hackers Don't Want You To KnowLayered API Security: What Hackers Don't Want You To Know
Layered API Security: What Hackers Don't Want You To KnowAaronLieberman5
 
OWASP API Security Top 10 - Austin DevSecOps Days
OWASP API Security Top 10 - Austin DevSecOps DaysOWASP API Security Top 10 - Austin DevSecOps Days
OWASP API Security Top 10 - Austin DevSecOps Days42Crunch
 
Protecting Microservices APIs with 42Crunch API Firewall
Protecting Microservices APIs with 42Crunch API FirewallProtecting Microservices APIs with 42Crunch API Firewall
Protecting Microservices APIs with 42Crunch API Firewall42Crunch
 
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
Checkmarx meetup API Security -  API Security top 10 - Erez YalonCheckmarx meetup API Security -  API Security top 10 - Erez Yalon
Checkmarx meetup API Security - API Security top 10 - Erez YalonAdar Weidman
 
API Security: the full story
API Security: the full storyAPI Security: the full story
API Security: the full story42Crunch
 
Securing AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriSecuring AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriOWASP Delhi
 
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
Checkmarx meetup API Security - API Security in depth - Inon ShkedyCheckmarx meetup API Security - API Security in depth - Inon Shkedy
Checkmarx meetup API Security - API Security in depth - Inon ShkedyAdar Weidman
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017TriNimbus
 
API Security: Securing Digital Channels and Mobile Apps Against Hacks
API Security: Securing Digital Channels and Mobile Apps Against HacksAPI Security: Securing Digital Channels and Mobile Apps Against Hacks
API Security: Securing Digital Channels and Mobile Apps Against HacksAkana
 
Advanced API Security Patterns
Advanced API Security PatternsAdvanced API Security Patterns
Advanced API Security Patterns42Crunch
 
Managing Identities in the World of APIs
Managing Identities in the World of APIsManaging Identities in the World of APIs
Managing Identities in the World of APIsApigee | Google Cloud
 
The Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API WorldThe Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API World42Crunch
 
Security components in mule esb
Security components in mule esbSecurity components in mule esb
Security components in mule esbhimajareddys
 

Mais procurados (20)

APISecurity_OWASP_MitigationGuide
APISecurity_OWASP_MitigationGuide APISecurity_OWASP_MitigationGuide
APISecurity_OWASP_MitigationGuide
 
Data-driven API Security
Data-driven API SecurityData-driven API Security
Data-driven API Security
 
The Dev, Sec and Ops of API Security - NordicAPIs
The Dev, Sec and Ops of API Security - NordicAPIsThe Dev, Sec and Ops of API Security - NordicAPIs
The Dev, Sec and Ops of API Security - NordicAPIs
 
Guidelines to protect your APIs from threats
Guidelines to protect your APIs from threatsGuidelines to protect your APIs from threats
Guidelines to protect your APIs from threats
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
CIS13: APIs, Identity, and Securing the Enterprise
CIS13: APIs, Identity, and Securing the EnterpriseCIS13: APIs, Identity, and Securing the Enterprise
CIS13: APIs, Identity, and Securing the Enterprise
 
Layered API Security: What Hackers Don't Want You To Know
Layered API Security: What Hackers Don't Want You To KnowLayered API Security: What Hackers Don't Want You To Know
Layered API Security: What Hackers Don't Want You To Know
 
OWASP API Security Top 10 - Austin DevSecOps Days
OWASP API Security Top 10 - Austin DevSecOps DaysOWASP API Security Top 10 - Austin DevSecOps Days
OWASP API Security Top 10 - Austin DevSecOps Days
 
Protecting Microservices APIs with 42Crunch API Firewall
Protecting Microservices APIs with 42Crunch API FirewallProtecting Microservices APIs with 42Crunch API Firewall
Protecting Microservices APIs with 42Crunch API Firewall
 
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
Checkmarx meetup API Security -  API Security top 10 - Erez YalonCheckmarx meetup API Security -  API Security top 10 - Erez Yalon
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
 
API Security: the full story
API Security: the full storyAPI Security: the full story
API Security: the full story
 
Securing AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriSecuring AWS environments by Ankit Giri
Securing AWS environments by Ankit Giri
 
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
Checkmarx meetup API Security - API Security in depth - Inon ShkedyCheckmarx meetup API Security - API Security in depth - Inon Shkedy
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
 
Web security and OWASP
Web security and OWASPWeb security and OWASP
Web security and OWASP
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017
 
API Security: Securing Digital Channels and Mobile Apps Against Hacks
API Security: Securing Digital Channels and Mobile Apps Against HacksAPI Security: Securing Digital Channels and Mobile Apps Against Hacks
API Security: Securing Digital Channels and Mobile Apps Against Hacks
 
Advanced API Security Patterns
Advanced API Security PatternsAdvanced API Security Patterns
Advanced API Security Patterns
 
Managing Identities in the World of APIs
Managing Identities in the World of APIsManaging Identities in the World of APIs
Managing Identities in the World of APIs
 
The Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API WorldThe Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API World
 
Security components in mule esb
Security components in mule esbSecurity components in mule esb
Security components in mule esb
 

Destaque

Best Practices for API Security
Best Practices for API SecurityBest Practices for API Security
Best Practices for API SecurityMuleSoft
 
Deep-Dive: API Security in the Digital Age
Deep-Dive: API Security in the Digital AgeDeep-Dive: API Security in the Digital Age
Deep-Dive: API Security in the Digital AgeApigee | Google Cloud
 
Rest API Security
Rest API SecurityRest API Security
Rest API SecurityStormpath
 
Javascript 入門 - 前端工程開發實務訓練
Javascript 入門 - 前端工程開發實務訓練Javascript 入門 - 前端工程開發實務訓練
Javascript 入門 - 前端工程開發實務訓練Joseph Chiang
 
Practical Steps to Hack Proofing AWS
Practical Steps to Hack Proofing AWSPractical Steps to Hack Proofing AWS
Practical Steps to Hack Proofing AWSAmazon Web Services
 
The Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityThe Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityDistil Networks
 
Oracle VM Spec Sheet
Oracle VM Spec SheetOracle VM Spec Sheet
Oracle VM Spec Sheetmarkgatkinson
 
JSR 375 - Have you seen Java EE Security API lately? - codemotion Tel Aviv 2015
JSR 375 - Have you seen Java EE Security API lately? - codemotion Tel Aviv 2015JSR 375 - Have you seen Java EE Security API lately? - codemotion Tel Aviv 2015
JSR 375 - Have you seen Java EE Security API lately? - codemotion Tel Aviv 2015Werner Keil
 
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next LevelAPI Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next LevelCA Technologies
 
Interoperability in a B2B Word (NordicAPIS April 2014)
Interoperability in a B2B Word (NordicAPIS April 2014)Interoperability in a B2B Word (NordicAPIS April 2014)
Interoperability in a B2B Word (NordicAPIS April 2014)Nordic APIs
 
前端的未來 - 前端工程實務訓練
前端的未來 - 前端工程實務訓練前端的未來 - 前端工程實務訓練
前端的未來 - 前端工程實務訓練Joseph Chiang
 
Practical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWSPractical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWSAmazon Web Services
 
WSO2 - Forrester Guest Webinar: API Management is not Enough: You Need an API...
WSO2 - Forrester Guest Webinar: API Management is not Enough: You Need an API...WSO2 - Forrester Guest Webinar: API Management is not Enough: You Need an API...
WSO2 - Forrester Guest Webinar: API Management is not Enough: You Need an API...WSO2
 
Google Map Android API V2 setup guide
Google Map Android API V2 setup guideGoogle Map Android API V2 setup guide
Google Map Android API V2 setup guideCAVEDU Education
 
The Future of B2B: Applying API-Led Connectivity to B2B/EDI - Eric Rempel, CI...
The Future of B2B: Applying API-Led Connectivity to B2B/EDI - Eric Rempel, CI...The Future of B2B: Applying API-Led Connectivity to B2B/EDI - Eric Rempel, CI...
The Future of B2B: Applying API-Led Connectivity to B2B/EDI - Eric Rempel, CI...MuleSoft
 
AWS CodeDeploy, AWS CodePipeline, and AWS CodeCommit: Transforming Software D...
AWS CodeDeploy, AWS CodePipeline, and AWS CodeCommit: Transforming Software D...AWS CodeDeploy, AWS CodePipeline, and AWS CodeCommit: Transforming Software D...
AWS CodeDeploy, AWS CodePipeline, and AWS CodeCommit: Transforming Software D...Amazon Web Services
 
Progress in the API Economy - April 2014
Progress in the API Economy - April 2014Progress in the API Economy - April 2014
Progress in the API Economy - April 20143scale
 

Destaque (20)

Best Practices for API Security
Best Practices for API SecurityBest Practices for API Security
Best Practices for API Security
 
Deep-Dive: API Security in the Digital Age
Deep-Dive: API Security in the Digital AgeDeep-Dive: API Security in the Digital Age
Deep-Dive: API Security in the Digital Age
 
Rest API Security
Rest API SecurityRest API Security
Rest API Security
 
Adapt or Die Sydney - API Security
Adapt or Die Sydney - API SecurityAdapt or Die Sydney - API Security
Adapt or Die Sydney - API Security
 
Javascript 入門 - 前端工程開發實務訓練
Javascript 入門 - 前端工程開發實務訓練Javascript 入門 - 前端工程開發實務訓練
Javascript 入門 - 前端工程開發實務訓練
 
Practical Steps to Hack Proofing AWS
Practical Steps to Hack Proofing AWSPractical Steps to Hack Proofing AWS
Practical Steps to Hack Proofing AWS
 
The Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityThe Inconvenient Truth About API Security
The Inconvenient Truth About API Security
 
Oracle VM Spec Sheet
Oracle VM Spec SheetOracle VM Spec Sheet
Oracle VM Spec Sheet
 
JSR 375 - Have you seen Java EE Security API lately? - codemotion Tel Aviv 2015
JSR 375 - Have you seen Java EE Security API lately? - codemotion Tel Aviv 2015JSR 375 - Have you seen Java EE Security API lately? - codemotion Tel Aviv 2015
JSR 375 - Have you seen Java EE Security API lately? - codemotion Tel Aviv 2015
 
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next LevelAPI Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next Level
 
Interoperability in a B2B Word (NordicAPIS April 2014)
Interoperability in a B2B Word (NordicAPIS April 2014)Interoperability in a B2B Word (NordicAPIS April 2014)
Interoperability in a B2B Word (NordicAPIS April 2014)
 
前端的未來 - 前端工程實務訓練
前端的未來 - 前端工程實務訓練前端的未來 - 前端工程實務訓練
前端的未來 - 前端工程實務訓練
 
Pentesting Cloud Environment
Pentesting Cloud EnvironmentPentesting Cloud Environment
Pentesting Cloud Environment
 
Practical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWSPractical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWS
 
WSO2 - Forrester Guest Webinar: API Management is not Enough: You Need an API...
WSO2 - Forrester Guest Webinar: API Management is not Enough: You Need an API...WSO2 - Forrester Guest Webinar: API Management is not Enough: You Need an API...
WSO2 - Forrester Guest Webinar: API Management is not Enough: You Need an API...
 
Google Map Android API V2 setup guide
Google Map Android API V2 setup guideGoogle Map Android API V2 setup guide
Google Map Android API V2 setup guide
 
How to Achieve Agile API Security
How to Achieve Agile API SecurityHow to Achieve Agile API Security
How to Achieve Agile API Security
 
The Future of B2B: Applying API-Led Connectivity to B2B/EDI - Eric Rempel, CI...
The Future of B2B: Applying API-Led Connectivity to B2B/EDI - Eric Rempel, CI...The Future of B2B: Applying API-Led Connectivity to B2B/EDI - Eric Rempel, CI...
The Future of B2B: Applying API-Led Connectivity to B2B/EDI - Eric Rempel, CI...
 
AWS CodeDeploy, AWS CodePipeline, and AWS CodeCommit: Transforming Software D...
AWS CodeDeploy, AWS CodePipeline, and AWS CodeCommit: Transforming Software D...AWS CodeDeploy, AWS CodePipeline, and AWS CodeCommit: Transforming Software D...
AWS CodeDeploy, AWS CodePipeline, and AWS CodeCommit: Transforming Software D...
 
Progress in the API Economy - April 2014
Progress in the API Economy - April 2014Progress in the API Economy - April 2014
Progress in the API Economy - April 2014
 

Semelhante a Why API Security Is More Complicated Than You Think (and Why It’s Your #1 Priority)

Fun! with the Twitter API
Fun! with the Twitter APIFun! with the Twitter API
Fun! with the Twitter APIErin Shellman
 
H4CK1N6 - Web Application Security
H4CK1N6 - Web Application SecurityH4CK1N6 - Web Application Security
H4CK1N6 - Web Application SecurityOliver Hader
 
api_slides.pptx
api_slides.pptxapi_slides.pptx
api_slides.pptxadewad
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a passwordRob Gillen
 
Cloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesCloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesGokul Alex
 
20+ Ways To Bypass Your Macos Privacy Mechanisms
20+ Ways To Bypass Your Macos Privacy Mechanisms20+ Ways To Bypass Your Macos Privacy Mechanisms
20+ Ways To Bypass Your Macos Privacy MechanismsSecuRing
 
Using AI at the Library - SWFLN Makerpalooza - Session 2
Using AI at the Library  - SWFLN Makerpalooza - Session 2Using AI at the Library  - SWFLN Makerpalooza - Session 2
Using AI at the Library - SWFLN Makerpalooza - Session 2Brian Pichman
 
Building Social Tools
Building Social ToolsBuilding Social Tools
Building Social ToolsAnand Hemmige
 
Testing Application Security: The Hacker Psyche Exposed
Testing Application Security: The Hacker Psyche ExposedTesting Application Security: The Hacker Psyche Exposed
Testing Application Security: The Hacker Psyche ExposedTechWell
 
Hunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestHunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestSecuRing
 
APIsecure 2023 - API First Hacking, Corey Ball, Author of Hacking APIs
APIsecure 2023 - API First Hacking, Corey Ball, Author of Hacking APIsAPIsecure 2023 - API First Hacking, Corey Ball, Author of Hacking APIs
APIsecure 2023 - API First Hacking, Corey Ball, Author of Hacking APIsapidays
 
Attacking Web Applications
Attacking Web ApplicationsAttacking Web Applications
Attacking Web ApplicationsSasha Goldshtein
 
Self-Service x Hashicorp Vault
Self-Service x Hashicorp VaultSelf-Service x Hashicorp Vault
Self-Service x Hashicorp VaultMartin Conraux
 
The Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptxThe Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptxlior mazor
 
CSE5656 Complex Networks - Gathering Data from Twitter
CSE5656 Complex Networks - Gathering Data from TwitterCSE5656 Complex Networks - Gathering Data from Twitter
CSE5656 Complex Networks - Gathering Data from TwitterMarcello Tomasini
 
UC2013 Speed Geeking: Intro to OAuth2
UC2013 Speed Geeking: Intro to OAuth2UC2013 Speed Geeking: Intro to OAuth2
UC2013 Speed Geeking: Intro to OAuth2Aaron Parecki
 
Your internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerableYour internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerableIIMBNSRCEL
 

Semelhante a Why API Security Is More Complicated Than You Think (and Why It’s Your #1 Priority) (20)

Fun! with the Twitter API
Fun! with the Twitter APIFun! with the Twitter API
Fun! with the Twitter API
 
H4CK1N6 - Web Application Security
H4CK1N6 - Web Application SecurityH4CK1N6 - Web Application Security
H4CK1N6 - Web Application Security
 
api_slides.pptx
api_slides.pptxapi_slides.pptx
api_slides.pptx
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a password
 
Cloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesCloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and Techniques
 
Subj3ct
Subj3ctSubj3ct
Subj3ct
 
20+ Ways To Bypass Your Macos Privacy Mechanisms
20+ Ways To Bypass Your Macos Privacy Mechanisms20+ Ways To Bypass Your Macos Privacy Mechanisms
20+ Ways To Bypass Your Macos Privacy Mechanisms
 
Using AI at the Library - SWFLN Makerpalooza - Session 2
Using AI at the Library  - SWFLN Makerpalooza - Session 2Using AI at the Library  - SWFLN Makerpalooza - Session 2
Using AI at the Library - SWFLN Makerpalooza - Session 2
 
Building Social Tools
Building Social ToolsBuilding Social Tools
Building Social Tools
 
Testing Application Security: The Hacker Psyche Exposed
Testing Application Security: The Hacker Psyche ExposedTesting Application Security: The Hacker Psyche Exposed
Testing Application Security: The Hacker Psyche Exposed
 
Hunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestHunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forest
 
Twitter4R OAuth
Twitter4R OAuthTwitter4R OAuth
Twitter4R OAuth
 
APIsecure 2023 - API First Hacking, Corey Ball, Author of Hacking APIs
APIsecure 2023 - API First Hacking, Corey Ball, Author of Hacking APIsAPIsecure 2023 - API First Hacking, Corey Ball, Author of Hacking APIs
APIsecure 2023 - API First Hacking, Corey Ball, Author of Hacking APIs
 
Attacking Web Applications
Attacking Web ApplicationsAttacking Web Applications
Attacking Web Applications
 
Self-Service x Hashicorp Vault
Self-Service x Hashicorp VaultSelf-Service x Hashicorp Vault
Self-Service x Hashicorp Vault
 
The Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptxThe Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptx
 
Id fiware upm-dit
Id fiware  upm-ditId fiware  upm-dit
Id fiware upm-dit
 
CSE5656 Complex Networks - Gathering Data from Twitter
CSE5656 Complex Networks - Gathering Data from TwitterCSE5656 Complex Networks - Gathering Data from Twitter
CSE5656 Complex Networks - Gathering Data from Twitter
 
UC2013 Speed Geeking: Intro to OAuth2
UC2013 Speed Geeking: Intro to OAuth2UC2013 Speed Geeking: Intro to OAuth2
UC2013 Speed Geeking: Intro to OAuth2
 
Your internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerableYour internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerable
 

Mais de ProgrammableWeb

Building A Business-Facing Mobile Developer Community
Building A Business-Facing Mobile Developer CommunityBuilding A Business-Facing Mobile Developer Community
Building A Business-Facing Mobile Developer CommunityProgrammableWeb
 
Profiting From "Smart City" APIs
Profiting From "Smart City" APIsProfiting From "Smart City" APIs
Profiting From "Smart City" APIsProgrammableWeb
 
Get Your Software Speaking SMS With Esendex
Get Your Software Speaking SMS With EsendexGet Your Software Speaking SMS With Esendex
Get Your Software Speaking SMS With EsendexProgrammableWeb
 
The Future of API Monetization
The Future of API MonetizationThe Future of API Monetization
The Future of API MonetizationProgrammableWeb
 
Open Source And the Internet Of Things
Open Source And the Internet Of ThingsOpen Source And the Internet Of Things
Open Source And the Internet Of ThingsProgrammableWeb
 
Your API Deserves More Respect: Make It A Product
Your API Deserves More Respect: Make It A ProductYour API Deserves More Respect: Make It A Product
Your API Deserves More Respect: Make It A ProductProgrammableWeb
 
How And Why To Dogfood Your API
How And Why To Dogfood Your APIHow And Why To Dogfood Your API
How And Why To Dogfood Your APIProgrammableWeb
 
Real World API Business Models That Worked
Real World API Business Models That WorkedReal World API Business Models That Worked
Real World API Business Models That WorkedProgrammableWeb
 
Innovation Showcase: Hugo Fiennes, CEO/Co-Founder, Electric Imp
Innovation Showcase: Hugo Fiennes, CEO/Co-Founder, Electric ImpInnovation Showcase: Hugo Fiennes, CEO/Co-Founder, Electric Imp
Innovation Showcase: Hugo Fiennes, CEO/Co-Founder, Electric ImpProgrammableWeb
 
Innovation showcase: Markus Lanthaler, Developer, Consultant, Researcher,mark...
Innovation showcase: Markus Lanthaler, Developer, Consultant, Researcher,mark...Innovation showcase: Markus Lanthaler, Developer, Consultant, Researcher,mark...
Innovation showcase: Markus Lanthaler, Developer, Consultant, Researcher,mark...ProgrammableWeb
 
ProgrammablaWeb's Innovation Showcase: Stefan Zanetti, Founder/CEO, QIPP
ProgrammablaWeb's Innovation Showcase: Stefan Zanetti, Founder/CEO, QIPPProgrammablaWeb's Innovation Showcase: Stefan Zanetti, Founder/CEO, QIPP
ProgrammablaWeb's Innovation Showcase: Stefan Zanetti, Founder/CEO, QIPPProgrammableWeb
 
Innovation Showcase: David Johnston, Decentralized Application Funds
Innovation Showcase: David Johnston, Decentralized Application FundsInnovation Showcase: David Johnston, Decentralized Application Funds
Innovation Showcase: David Johnston, Decentralized Application FundsProgrammableWeb
 
HTTP APIs as first class procedures in your language: cutting out SDK complex...
HTTP APIs as first class procedures in your language: cutting out SDK complex...HTTP APIs as first class procedures in your language: cutting out SDK complex...
HTTP APIs as first class procedures in your language: cutting out SDK complex...ProgrammableWeb
 
Intro To Orchestrate DBaaS: A Single API For Key/Value, Search, Graph, And Ev...
Intro To Orchestrate DBaaS: A Single API For Key/Value, Search, Graph, And Ev...Intro To Orchestrate DBaaS: A Single API For Key/Value, Search, Graph, And Ev...
Intro To Orchestrate DBaaS: A Single API For Key/Value, Search, Graph, And Ev...ProgrammableWeb
 
Case Study: A Real-World Implementation Of Linked Data
Case Study: A Real-World Implementation Of Linked DataCase Study: A Real-World Implementation Of Linked Data
Case Study: A Real-World Implementation Of Linked DataProgrammableWeb
 
Pivoting Your Business From Product To Platform
Pivoting Your Business From Product To PlatformPivoting Your Business From Product To Platform
Pivoting Your Business From Product To PlatformProgrammableWeb
 
Exploring UK Bus And Train Data With TransportAPI
Exploring UK Bus And Train Data With TransportAPIExploring UK Bus And Train Data With TransportAPI
Exploring UK Bus And Train Data With TransportAPIProgrammableWeb
 
DDD (Delight-Driven Development) Of APIs With RAML
DDD (Delight-Driven Development) Of APIs With RAMLDDD (Delight-Driven Development) Of APIs With RAML
DDD (Delight-Driven Development) Of APIs With RAMLProgrammableWeb
 
Why And How To Leverage Predictive APIs In Any Application
Why And How To Leverage Predictive APIs In Any Application Why And How To Leverage Predictive APIs In Any Application
Why And How To Leverage Predictive APIs In Any Application ProgrammableWeb
 
Is There An API In That (IoT)?
Is There An API In That (IoT)?Is There An API In That (IoT)?
Is There An API In That (IoT)?ProgrammableWeb
 

Mais de ProgrammableWeb (20)

Building A Business-Facing Mobile Developer Community
Building A Business-Facing Mobile Developer CommunityBuilding A Business-Facing Mobile Developer Community
Building A Business-Facing Mobile Developer Community
 
Profiting From "Smart City" APIs
Profiting From "Smart City" APIsProfiting From "Smart City" APIs
Profiting From "Smart City" APIs
 
Get Your Software Speaking SMS With Esendex
Get Your Software Speaking SMS With EsendexGet Your Software Speaking SMS With Esendex
Get Your Software Speaking SMS With Esendex
 
The Future of API Monetization
The Future of API MonetizationThe Future of API Monetization
The Future of API Monetization
 
Open Source And the Internet Of Things
Open Source And the Internet Of ThingsOpen Source And the Internet Of Things
Open Source And the Internet Of Things
 
Your API Deserves More Respect: Make It A Product
Your API Deserves More Respect: Make It A ProductYour API Deserves More Respect: Make It A Product
Your API Deserves More Respect: Make It A Product
 
How And Why To Dogfood Your API
How And Why To Dogfood Your APIHow And Why To Dogfood Your API
How And Why To Dogfood Your API
 
Real World API Business Models That Worked
Real World API Business Models That WorkedReal World API Business Models That Worked
Real World API Business Models That Worked
 
Innovation Showcase: Hugo Fiennes, CEO/Co-Founder, Electric Imp
Innovation Showcase: Hugo Fiennes, CEO/Co-Founder, Electric ImpInnovation Showcase: Hugo Fiennes, CEO/Co-Founder, Electric Imp
Innovation Showcase: Hugo Fiennes, CEO/Co-Founder, Electric Imp
 
Innovation showcase: Markus Lanthaler, Developer, Consultant, Researcher,mark...
Innovation showcase: Markus Lanthaler, Developer, Consultant, Researcher,mark...Innovation showcase: Markus Lanthaler, Developer, Consultant, Researcher,mark...
Innovation showcase: Markus Lanthaler, Developer, Consultant, Researcher,mark...
 
ProgrammablaWeb's Innovation Showcase: Stefan Zanetti, Founder/CEO, QIPP
ProgrammablaWeb's Innovation Showcase: Stefan Zanetti, Founder/CEO, QIPPProgrammablaWeb's Innovation Showcase: Stefan Zanetti, Founder/CEO, QIPP
ProgrammablaWeb's Innovation Showcase: Stefan Zanetti, Founder/CEO, QIPP
 
Innovation Showcase: David Johnston, Decentralized Application Funds
Innovation Showcase: David Johnston, Decentralized Application FundsInnovation Showcase: David Johnston, Decentralized Application Funds
Innovation Showcase: David Johnston, Decentralized Application Funds
 
HTTP APIs as first class procedures in your language: cutting out SDK complex...
HTTP APIs as first class procedures in your language: cutting out SDK complex...HTTP APIs as first class procedures in your language: cutting out SDK complex...
HTTP APIs as first class procedures in your language: cutting out SDK complex...
 
Intro To Orchestrate DBaaS: A Single API For Key/Value, Search, Graph, And Ev...
Intro To Orchestrate DBaaS: A Single API For Key/Value, Search, Graph, And Ev...Intro To Orchestrate DBaaS: A Single API For Key/Value, Search, Graph, And Ev...
Intro To Orchestrate DBaaS: A Single API For Key/Value, Search, Graph, And Ev...
 
Case Study: A Real-World Implementation Of Linked Data
Case Study: A Real-World Implementation Of Linked DataCase Study: A Real-World Implementation Of Linked Data
Case Study: A Real-World Implementation Of Linked Data
 
Pivoting Your Business From Product To Platform
Pivoting Your Business From Product To PlatformPivoting Your Business From Product To Platform
Pivoting Your Business From Product To Platform
 
Exploring UK Bus And Train Data With TransportAPI
Exploring UK Bus And Train Data With TransportAPIExploring UK Bus And Train Data With TransportAPI
Exploring UK Bus And Train Data With TransportAPI
 
DDD (Delight-Driven Development) Of APIs With RAML
DDD (Delight-Driven Development) Of APIs With RAMLDDD (Delight-Driven Development) Of APIs With RAML
DDD (Delight-Driven Development) Of APIs With RAML
 
Why And How To Leverage Predictive APIs In Any Application
Why And How To Leverage Predictive APIs In Any Application Why And How To Leverage Predictive APIs In Any Application
Why And How To Leverage Predictive APIs In Any Application
 
Is There An API In That (IoT)?
Is There An API In That (IoT)?Is There An API In That (IoT)?
Is There An API In That (IoT)?
 

Último

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Último (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Why API Security Is More Complicated Than You Think (and Why It’s Your #1 Priority)

  • 1. API Security It’s Complicated. @dberlind
  • 2. Disclaimers • I don’t necessarily have all the answers. I can and will make some recommendations. But ultimately, I’m a journalist. I interview people. I make observations. This presentation comes from those interviews and observations. • I think I’m pretty up to date. But, there may be new observations or information that make some of my information obsolete. It’s a huge ocean to boil. • Despite what I’m about to share with you, I do not consider myself a security expert. There may be some technical inaccuracies. • This presentation only scratches the surface. But it’s a good conversation starter • By the end, you may think the Internet is doomed. It could be. Unless you do something about it. • I’m terrible at PowerPoint
  • 3. Anatomies of Recent API-related Attacks
  • 5. Anatomy of Attack • 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints
  • 6.
  • 7. Anatomy of Attack • 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints • Oct-2013 • Hackers get busy “reverse engineering” passwords
  • 9. Anatomy of Attack • 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints • Oct-2013 • Hackers get busy “reverse engineering” passwords • Hackers target Github accounts of Buffer’s developers
  • 10.
  • 11. Anatomy of Attack • 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints • Oct-2013 • Hackers get busy “reverse engineering” passwords • Hackers target Github accounts of Buffer’s developers • Hackers gain access to Github’s code repository through shared passwords
  • 12. Anatomy of Attack • 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints • Oct-2013 • Hackers get busy “reverse engineering” passwords • Hackers target Github accounts of Buffer’s developers • Hackers gain access to Github’s code repository through shared passwords • From source code, hackers discover Buffer’s API keys for Twitter and Facebook
  • 13. Anatomy of Attack • 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints • Oct-2013 • Hackers get busy “reverse engineering” passwords • Hackers target Github accounts of Buffer’s developers • Hackers gain access to Github’s code respository through shared passwords • From source code, hackers discover Buffer’s API keys for Twitter and Facebook • Hackers target MongoHQ tech support personnel through shared passwords
  • 14.
  • 15. Anatomy of Attack • 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints • Oct-2013 • Hackers get busy “reverse engineering” passwords • Hackers target Github accounts of Buffer’s developers • Hackers gain access to Github’s code repository through shared passwords • From source code, hackers discover Buffer’s API keys for Twitter and Facebook • Hackers target MongoHQ tech support personnel through shared passwords • Hackers gain access to MongoHQ tech support app which has access to Buffer’s data
  • 16.
  • 17. Anatomy of Attack • 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints • Oct-2013 • Hackers get busy “reverse engineering” passwords • Hackers target Github accounts of Buffer’s developers • Hackers gain access to Github’s code repository through shared passwords • From source code, hackers discover Buffer’s API keys for Twitter and Facebook • Hackers target MongoHQ tech support personnel through shared passwords • Hackers gain access to MongoHQ tech support app which has access to Buffer’s data • Via MongoHQ’s tech support app, hackers find Buffer’s users’ OAuth tokens for Twitter, Facebook, probably develop ScrAPI to harvest them 1000 records per screen
  • 18. Anatomy of Attack • 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints • Oct-2013 • Hackers get busy “reverse engineering” passwords • Hackers target Github accounts of Buffer’s developers • Hackers gain access to Github’s code respository through shared passwords • From source code, hackers discover Buffer’s API keys for Twitter and Facebook • Hackers target MongoHQ tech support personnel through shared passwords • Hackers gain access to MongoHQ tech support app which has access to Buffer’s data • Via MongoHQ’s tech support app, hackers find Buffer’s users’ OAuth tokens for Twitter, Facebook, probably develop ScrAPI to harvest them 1000 records per screen • Hackers develop code that can pose as Buffer and cycle through all the tokens making posts to Facebook and Twitter via API.
  • 19. Anatomy of Attack • 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints • Oct-2013 • Hackers get busy “reverse engineering” passwords • Hackers target Github accounts of Buffer’s developers • Hackers gain access to Github’s code repository through shared passwords • From source code, hackers discover Buffer’s API keys for Twitter and Facebook • Hackers target MongoHQ tech support personnel through shared passwords • Hackers gain access to MongoHQ tech support app which has access to Buffer’s data • Via MongoHQ’s tech support app, hackers find Buffer’s users’ OAuth tokens for Twitter, Facebook, probably develop ScrAPI to harvest them 1000 records per screen • Hackers develop code that can pose as Buffer and cycle through all the tokens making posts to Facebook and Twitter via API. • 26-Oct-2013 • Adobe Database published on AnonNews.org
  • 20.
  • 21. Anatomy of Attack • 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints • Oct-2013 • Hackers get busy “reverse engineering” passwords • Hackers target Github accounts of Buffer’s developers • Hackers gain access to Github’s code respository through shared passwords • From source code, hackers discover Buffer’s API keys for Twitter and Facebook • Hackers target MongoHQ tech support personnel through shared passwords • Hackers gain access to MongoHQ tech support app which has access to Buffer’s data • Via MongoHQ’s tech support app, hackers find Buffer’s users’ OAuth tokens for Twitter, Facebook, probably develop ScrAPI to harvest them 1000 records per screen • Hackers develop code that can pose as Buffer and cycle through all the tokens making posts to Facebook and Twitter via API. • 26-Oct-2013 • Database published on AnonNews.org • Tens of thousands of Twitter/Facebook accounts spammed with weight-loss posts
  • 23. Anatomy of Attack • 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints • Oct-2013 • Hackers get busy “reverse engineering” passwords • Hackers target Github accounts of Buffer’s developers • Hackers gain access to Github’s code repository through shared passwords • From source code, hackers discover Buffer’s API keys for Twitter and Facebook • Hackers target MongoHQ tech support personnel through shared passwords • Hackers gain access to MongoHQ tech support app which has access to Buffer’s data • Via MongoHQ’s tech support app, hackers find Buffer’s users’ OAuth tokens for Twitter, Facebook, probably develop ScrAPI to harvest them 1000 records per screen • Hackers develop code that can pose as Buffer and cycle through all the tokens making posts to Facebook and Twitter via API. • 26-Oct-2013 • Database published on AnonNews.org • Tens of thousands of Twitter/Facebook accounts spammed with weight-loss posts • More than likely malware, but too late to know
  • 24. Anatomy of Attack • 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints • Oct-2013 • Hackers get busy “reverse engineering” passwords • Hackers target Github accounts of Buffer’s developers • Hackers gain access to Github’s code repository through shared passwords • From source code, hackers discover Buffer’s API keys for Twitter and Facebook • Hackers target MongoHQ tech support personnel through shared passwords • Hackers gain access to MongoHQ tech support app which has access to Buffer’s data • Via MongoHQ’s tech support app, hackers find Buffer’s users’ OAuth tokens for Twitter, Facebook, probably develop ScrAPI to harvest them 1000 records per screen • Hackers develop code that can pose as Buffer and cycle through all the tokens making posts to Facebook and Twitter via API. • 26-Oct-2013 • Database published on AnonNews.org • Tens of thousands of Twitter/Facebook accounts spammed with weight-loss posts • More than likely malware, but too late to know • Buffer discloses
  • 25.
  • 26. Anatomy of Attack • 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints • Oct-2013 • Hackers get busy “reverse engineering” passwords • Hackers target Github accounts of Buffer’s developers • Hackers gain access to Github’s code repository through shared passwords • From source code, hackers discover Buffer’s API keys for Twitter and Facebook • Hackers target MongoHQ tech support personnel through shared passwords • Hackers gain access to MongoHQ tech support app which has access to Buffer’s data • Via MongoHQ’s tech support app, hackers find Buffer’s users’ OAuth tokens for Twitter, Facebook, probably develop ScrAPI to harvest them 1000 records per screen • Hackers develop code that can pose as Buffer and cycle through all the tokens making posts to Facebook and Twitter via API. • 26-Oct-2013 • Database published on AnonNews.org • Tens of thousands of Twitter/Facebook accounts spammed with weight-loss posts • More than likely malware, but too late to know • Buffer discloses • MongoHQ discloses (not as much)
  • 27. Anatomy of Attack • 03-Oct-2013: Adobe Database breached: 150M user IDs, password hashes, and hints • Oct-2013 • Hackers get busy “reverse engineering” passwords • Hackers target Github accounts of Buffer’s developers • Hackers gain access to Github’s code respository through shared passwords • From source code, hackers discover Buffer’s API keys for Twitter and Facebook • Hackers target MongoHQ tech support personnel through shared passwords • Hackers gain access to MongoHQ tech support app which has access to Buffer’s data • Via MongoHQ’s tech support app, hackers find Buffer’s users’ OAuth tokens for Twitter, Facebook, probably develop ScrAPI to harvest them 1000 records per screen • Hackers develop code that can pose as Buffer and cycle through all the tokens making posts to Facebook and Twitter via API. • 26-Oct-2013 • Database published on AnonNews.org • Tens of thousands of Twitter/Facebook accounts spammed with weight-loss posts • More than likely malware, but too late to know • Buffer discloses • MongoHQ discloses (not as much) • Nov-2013: Adobe sends out password reset emails
  • 29. Other facts and notes ● Hackers also looked for Buffer’s AWS credentials on Github
  • 30. Other facts and notes ● Hackers also looked for AWS credentials on Github ● IP address in common across access of GitHub, MongoHQ, and Buffer… the Buffer logs showed the Twitter account associated with the IP address.. that account known to be associated with Anonymous.
  • 31. Other facts and notes ● Hackers also looked for AWS credentials on Github ● IP address in common across access of GitHub, MongoHQ, and Buffer… the Buffer logs showed the Twitter account associated with the IP address.. that account known to be associated with Anonymous. ● That twitter account also tweeted a question about thwarting security after Buffer moved to Google-based Two-Factor Authentication on Github
  • 32.
  • 33. Other facts and notes ● Hackers also looked for AWS credentials on Github ● IP address in common across access of GitHub, MongoHQ, and Buffer… the Buffer logs showed the Twitter account associated with the IP address.. that account known to be associated with Anonymous. ● That twitter account also tweeted a question about thwarting security after Buffer moved to Google-based Two-Factor Authentication on Github ● Other companies hacked due to Mongo breach: Sunrise Calender
  • 34. Other facts and notes ● Hackers also looked for AWS credentials on Github ● IP address in common across access of GitHub, MongoHQ, and Buffer… the Buffer logs showed the Twitter account associated with the IP address.. that account known to be associated with Twitter. ● That twitter account also tweeted a question about thwarting security after Buffer moved to Google-based Two-Factor Authentication on Github ● Other companies hacked due to Mongo breach: Sunrise Calender ● Could have been much worse: Buffer had Stripe credentials in their code as well. Hacker could have charged charges to Buffer’s customers.
  • 35. Other facts and notes ● Hackers also looked for AWS credentials on Github ● IP address in common across access of GitHub, MongoHQ, and Buffer… the Buffer logs showed the Twitter account associated with the IP address.. that account known to be associated with Twitter. ● That twitter account also tweeted a question about thwarting security after Buffer moved to Google-based Two-Factor Authentication on Github ● Other companies hacked due to Mongo breach: Sunrise Calender ● Could have been much worse: Buffer had Stripe credentials in their code as well. Hacker could have charged charges to Buffer’s customers. ● Able to identify incursions on Github by IP address (didn’t belong to anybody on the team).
  • 36. Other facts and notes ● Hackers also looked for AWS credentials on Github ● IP address in common across access of GitHub, MongoHQ, and Buffer… the Buffer logs showed the Twitter account associated with the IP address.. that account known to be associated with Twitter. ● That twitter account also tweeted a question about thwarting security after Buffer moved to Google-based Two-Factor Authentication on Github ● Other companies hacked due to Mongo breach: Sunrise Calender ● Could have been much worse: Buffer had Stripe credentials in their code as well. Hacker could have charged charges to Buffer’s customers. ● Able to identify incursions on Github by IP address (didn’t belong to anybody on the team). ● Buffer moved to Google-based 2FA across other services. But many of those services (eg: Dropbox) offer no way of managing that (eg: no enforcement.. You have to trust employees).
  • 37. Other facts and notes ● Hackers also looked for AWS credentials on Github ● IP address in common across access of GitHub, MongoHQ, and Buffer… the Buffer logs showed the Twitter account associated with the IP address.. that account known to be associated with Twitter. ● That twitter account also tweeted a question about thwarting security after Buffer moved to Google-based Two-Factor Authentication on Github ● Other companies hacked due to Mongo breach: Sunrise Calender ● Could have been much worse: Buffer had Stripe credentials in their code as well. Hacker could have charged charges to Buffer’s customers. ● Able to identify incursions on Github by IP address (didn’t belong to anybody on the team). ● Buffer moved to Google-based 2FA across other services. But many of those services (eg: Dropbox) offer no way of managing that (eg: no enforcement.. You have to trust employees). ● Another issue: How do you store credentials that admins must share? Put them on Dropbox where you lack enterprise controls?
  • 38.
  • 39.
  • 40.
  • 41.
  • 43.
  • 44. The “Fappening” (Not All Details Confirmed By Apple) • Apple’s “cloud” (everything from iTunes to iCloud) relies on one Apple ID and password per user • Allegedly involved the undocumented Find My iPhone API (FMI API) – undocumented APIs are easy to reverse engineer • FMI API required only user name and password for authentication (no other forms of authentication like OAuth tokens) • FMI API had no rate limiting on it, allowing for an infinite number of attempts or what is otherwise known in security circles as a brute force attack. • Just needed a bit of code that loops and loops and loops • They called that bit of code iBrute and published it to Github • For passwords, hackers allegedly used the infamous RockYou database; a big sample listing the passwords for 14 million accounts that were compromised when the social gaming service was compromised in 2009 • Once the passwords were discovered, they used Elcomsoft Phone Password Breaker (EPPB) to handle the bulk downloads and from there the photos are being published. • Within hours, Apple installed rate limiting on the API. • The phishing attacks preying on the media-induced fear started almost immediately • Apple claimed: – There was no breach of its systems – The hackers gained access through phishing or answering password recovery questions (but that involves rate limiting, no?) on targeted accounts – Advised all users to activate its two factor authentication (already known not to protect all entry points into the Apple kingdom)
  • 45. The “Fappening” (Not All Details Confirmed By Apple) • Apple’s “cloud” (everything from iTunes to iCloud) relies on one Apple ID and password per user • Allegedly involved the undocumented Find My iPhone API (FMI API) – undocumented APIs are easy to reverse engineer • FMI API required only user name and password for authentication (no other forms of authentication like OAuth tokens) • FMI API had no rate limiting on it, allowing for an infinite number of attempts or what is otherwise known in security circles as a brute force attack. • Just needed a bit of code that loops and loops and loops • They called that bit of code iBrute and published it to Github • For passwords, hackers allegedly used the infamous RockYou database; a big sample listing the passwords for 14 million accounts that were compromised when the social gaming service was compromised in 2009 • Once the passwords were discovered, they used Elcomsoft Phone Password Breaker (EPPB) to handle the bulk downloads and from there the photos are being published. • Within hours, Apple installed rate limiting on the API. • The phishing attacks preying on the media-induced fear started almost immediately • Apple claimed: – There was no breach of its systems – The hackers gained access through phishing or answering password recovery questions (but that involves rate limiting, no?) on targeted accounts – Advised all users to activate its two factor authentication (already known not to protect all entry points into the Apple kingdom)
  • 46. The “Fappening” (Not All Details Confirmed By Apple) • Apple’s “cloud” (everything from iTunes to iCloud) relies on one Apple ID and password per user • Allegedly involved the undocumented Find My iPhone API (FMI API) – undocumented APIs are easy to reverse engineer • FMI API required only user name and password for authentication (no other forms of authentication like OAuth tokens) • FMI API had no rate limiting on it, allowing for an infinite number of attempts or what is otherwise known in security circles as a brute force attack. • Just needed a bit of code that loops and loops and loops • They called that bit of code iBrute and published it to Github • For passwords, hackers allegedly used the infamous RockYou database; a big sample listing the passwords for 14 million accounts that were compromised when the social gaming service was compromised in 2009 • Once the passwords were discovered, they used Elcomsoft Phone Password Breaker (EPPB) to handle the bulk downloads and from there the photos are being published. • Within hours, Apple installed rate limiting on the API. • The phishing attacks preying on the media-induced fear started almost immediately • Apple claimed: – There was no breach of its systems – The hackers gained access through phishing or answering password recovery questions (but that involves rate limiting, no?) on targeted accounts – Advised all users to activate its two factor authentication (already known not to protect all entry points into the Apple kingdom)
  • 47. The “Fappening” (Not All Details Confirmed By Apple) • Apple’s “cloud” (everything from iTunes to iCloud) relies on one Apple ID and password per user • Allegedly involved the undocumented Find My iPhone API (FMI API) – undocumented APIs are easy to reverse engineer • FMI API required only user name and password for authentication (no other forms of authentication like OAuth tokens) • FMI API had no rate limiting on it, allowing for an infinite number of attempts or what is otherwise known in security circles as a brute force attack. • Just needed a bit of code that loops and loops and loops • They called that bit of code iBrute and published it to Github • For passwords, hackers allegedly used the infamous RockYou database; a big sample listing the passwords for 14 million accounts that were compromised when the social gaming service was compromised in 2009 • Once the passwords were discovered, they used Elcomsoft Phone Password Breaker (EPPB) to handle the bulk downloads and from there the photos are being published. • Within hours, Apple installed rate limiting on the API. • The phishing attacks preying on the media-induced fear started almost immediately • Apple claimed: – There was no breach of its systems – The hackers gained access through phishing or answering password recovery questions (but that involves rate limiting, no?) on targeted accounts – Advised all users to activate its two factor authentication (already known not to protect all entry points into the Apple kingdom)
  • 48. The “Fappening” (Not All Details Confirmed By Apple) • Apple’s “cloud” (everything from iTunes to iCloud) relies on one Apple ID and password per user • Allegedly involved the undocumented Find My iPhone API (FMI API) – undocumented APIs are easy to reverse engineer • FMI API required only user name and password for authentication (no other forms of authentication like OAuth tokens) • FMI API had no rate limiting on it, allowing for an infinite number of attempts or what is otherwise known in security circles as a brute force attack. • Just needed a bit of code that loops and loops and loops • They called that bit of code iBrute and published it to Github • For passwords, hackers allegedly used the infamous RockYou database; a big sample listing the passwords for 14 million accounts that were compromised when the social gaming service was compromised in 2009 • Once the passwords were discovered, they used Elcomsoft Phone Password Breaker (EPPB) to handle the bulk downloads and from there the photos are being published. • Within hours, Apple installed rate limiting on the API. • The phishing attacks preying on the media-induced fear started almost immediately • Apple claimed: – There was no breach of its systems – The hackers gained access through phishing or answering password recovery questions (but that involves rate limiting, no?) on targeted accounts – Advised all users to activate its two factor authentication (already known not to protect all entry points into the Apple kingdom)
  • 49. The “Fappening” (Not All Details Confirmed By Apple) • Apple’s “cloud” (everything from iTunes to iCloud) relies on one Apple ID and password per user • Allegedly involved the undocumented Find My iPhone API (FMI API) – undocumented APIs are easy to reverse engineer • FMI API required only user name and password for authentication (no other forms of authentication like OAuth tokens) • FMI API had no rate limiting on it, allowing for an infinite number of attempts or what is otherwise known in security circles as a brute force attack. • Just needed a bit of code that loops and loops and loops • They called that bit of code iBrute and published it to Github • For passwords, hackers allegedly used the infamous RockYou database; a big sample listing the passwords for 14 million accounts that were compromised when the social gaming service was compromised in 2009 • Once the passwords were discovered, they used Elcomsoft Phone Password Breaker (EPPB) to handle the bulk downloads and from there the photos are being published. • Within hours, Apple installed rate limiting on the API. • The phishing attacks preying on the media-induced fear started almost immediately • Apple claimed: – There was no breach of its systems – The hackers gained access through phishing or answering password recovery questions (but that involves rate limiting, no?) on targeted accounts – Advised all users to activate its two factor authentication (already known not to protect all entry points into the Apple kingdom)
  • 50. Source Code to iBrute on Github
  • 51. The “Fappening” (Not All Details Confirmed By Apple) • Apple’s “cloud” (everything from iTunes to iCloud) relies on one Apple ID and password per user • Allegedly involved the undocumented Find My iPhone API (FMI API) – undocumented APIs are easy to reverse engineer • FMI API required only user name and password for authentication (no other forms of authentication like OAuth tokens) • FMI API had no rate limiting on it, allowing for an infinite number of attempts or what is otherwise known in security circles as a brute force attack. • Just needed a bit of code that loops and loops and loops • They called that bit of code iBrute and published it to Github • For passwords, hackers allegedly used the infamous RockYou database; a big sample listing the passwords for 30M accounts that were compromised when that social gaming service was compromised in 2009 • Once the passwords were discovered, they used Elcomsoft Phone Password Breaker (EPPB) to handle the bulk downloads and from there the photos are being published. • Within hours, Apple installed rate limiting on the API. • The phishing attacks preying on the media-induced fear started almost immediately • Apple claimed: – There was no breach of its systems – The hackers gained access through phishing or answering password recovery questions (but that involves rate limiting, no?) on targeted accounts – Advised all users to activate its two factor authentication (already known not to protect all entry points into the Apple kingdom)
  • 52.
  • 53. The “Fappening” (Not All Details Confirmed By Apple) • Apple’s “cloud” (everything from iTunes to iCloud) relies on one Apple ID and password per user • Allegedly involved the undocumented Find My iPhone API (FMI API) – undocumented APIs are easy to reverse engineer • FMI API required only user name and password for authentication (no other forms of authentication like OAuth tokens) • FMI API had no rate limiting on it, allowing for an infinite number of attempts or what is otherwise known in security circles as a brute force attack. • Just needed a bit of code that loops and loops and loops • They called that bit of code iBrute and published it to Github • For passwords, hackers allegedly used the infamous RockYou database; a big sample listing the passwords for 30M accounts that were compromised when the social gaming service was compromised in 2009 • Once the passwords were discovered, they used Elcomsoft Phone Password Breaker (EPPB) to handle the bulk downloads and from there the photos are being published. • Within hours, Apple installed rate limiting on the API. • The phishing attacks preying on the media-induced fear started almost immediately • Apple claimed: – There was no breach of its systems – The hackers gained access through phishing or answering password recovery questions (but that involves rate limiting, no?) on targeted accounts – Advised all users to activate its two factor authentication (already known not to protect all entry points into the Apple kingdom)
  • 54.
  • 55. The “Fappening” (Not All Details Confirmed By Apple) • Apple’s “cloud” (everything from iTunes to iCloud) relies on one Apple ID and password per user • Allegedly involved the undocumented Find My iPhone API (FMI API) – undocumented APIs are easy to reverse engineer • FMI API required only user name and password for authentication (no other forms of authentication like OAuth tokens) • FMI API had no rate limiting on it, allowing for an infinite number of attempts or what is otherwise known in security circles as a brute force attack. • Just needed a bit of code that loops and loops and loops • They called that bit of code iBrute and published it to Github • For passwords, hackers allegedly used the infamous RockYou database; a big sample listing the passwords for 30M accounts that were compromised when the social gaming service was compromised in 2009 • Once the passwords were discovered, they used Elcomsoft Phone Password Breaker (EPPB) to handle the bulk downloads and from there the photos are being published. • Within hours, Apple installed rate limiting on the API. • The phishing attacks preying on the media-induced fear started almost immediately • Apple claimed: – There was no breach of its systems – The hackers gained access through phishing or answering password recovery questions (but that involves rate limiting, no?) on targeted accounts – Advised all users to activate its two factor authentication (already known not to protect all entry points into the Apple kingdom)
  • 56. The “Fappening” (Not All Details Confirmed By Apple) • Apple’s “cloud” (everything from iTunes to iCloud) relies on one Apple ID and password per user • Allegedly involved the undocumented Find My iPhone API (FMI API) – undocumented APIs are easy to reverse engineer • FMI API required only user name and password for authentication (no other forms of authentication like OAuth tokens) • FMI API had no rate limiting on it, allowing for an infinite number of attempts or what is otherwise known in security circles as a brute force attack. • Just needed a bit of code that loops and loops and loops • They called that bit of code iBrute and published it to Github • For passwords, hackers allegedly used the infamous RockYou database; a big sample listing the passwords for 30M accounts that were compromised when the social gaming service was compromised in 2009 • Once the passwords were discovered, they used Elcomsoft Phone Password Breaker (EPPB) to handle the bulk downloads and from there the photos are being published. • Within hours, Apple installed rate limiting on the API. • The phishing attacks preying on the media-induced fear started almost immediately • Apple claimed: – There was no breach of its systems – The hackers gained access through phishing or answering password recovery questions (but that involves rate limiting, no?) on targeted accounts – Advised all users to activate its two factor authentication (already known not to protect all entry points into the Apple kingdom)
  • 57.
  • 58. The “Fappening” (Not All Details Confirmed By Apple) • Apple’s “cloud” (everything from iTunes to iCloud) relies on one Apple ID and password per user • Allegedly involved the undocumented Find My iPhone API (FMI API) – undocumented APIs are easy to reverse engineer • FMI API required only user name and password for authentication (no other forms of authentication like OAuth tokens) • FMI API had no rate limiting on it, allowing for an infinite number of attempts or what is otherwise known in security circles as a brute force attack. • Just needed a bit of code that loops and loops and loops • They called that bit of code iBrute and published it to Github • For passwords, hackers allegedly used the infamous RockYou database; a big sample listing the passwords for 30M accounts that were compromised when the social gaming service was compromised in 2009 • Once the passwords were discovered, they used Elcomsoft Phone Password Breaker (EPPB) to handle the bulk downloads and from there the photos are being published. • Within hours, Apple installed rate limiting on the API. • The phishing attacks preying on the media-induced fear started almost immediately • Apple claimed: – There was no breach of its systems – The hackers gained access through phishing or answering password recovery questions (but that involves rate limiting, no?) on targeted accounts – Advised all users to activate its two factor authentication (already known not to protect all entry points into the Apple kingdom)
  • 59. Common Breach Patterns • Hackers seek potential for scale (APIs are sitting ducks!) • Original transgression often targeted and undetected • Leverages trusted relationships (the downside of social nets) • Publication or black market sale of content • Publication of source code • Media coverage, useless expert advice • Official company disclosure (sometimes) • News goes viral on social media (usually negative) • Partners get sucked inn • Phishing attack (the second wave), invariably malware • Additional transgressions • Additional “publications”
  • 60. Common Breach Patterns • Hackers seek potential for scale (APIs are sitting ducks!) • Original transgression often targeted and undetected • Leverages trusted relationships (the downside of social nets) • Publication or black market sale of content • Publication of source code • Media coverage, useless expert advice • Official company disclosure (sometimes) • News goes viral on social media (usually negative) • Partners get sucked inn • Phishing attack (the second wave), invariably malware • Additional transgressions • Additional “publications”
  • 61. Common Breach Patterns • Hackers seek potential for scale (APIs are sitting ducks!) • Original transgression often targeted and undetected • Leverages trusted relationships (the downside of social nets) • Publication or black market sale of content • Publication of source code • Media coverage, useless expert advice • Official company disclosure (sometimes) • News goes viral on social media (usually negative) • Partners get sucked inn • Phishing attack (the second wave), invariably malware • Additional transgressions • Additional “publications”
  • 62. Common Breach Patterns • Hackers seek potential for scale (APIs are sitting ducks!) • Original transgression often targeted and undetected • Leverages trusted relationships (the downside of social nets) • Publication or black market sale of content • Publication of source code • Media coverage, useless expert advice • Official company disclosure (sometimes) • News goes viral on social media (usually negative) • Partners get sucked inn • Phishing attack (the second wave), invariably malware • Additional transgressions • Additional “publications”
  • 63. Common Breach Patterns • Hackers seek potential for scale (APIs are sitting ducks!) • Original transgression often targeted and undetected • Leverages trusted relationships (the downside of social nets) • Publication or black market sale of content • Publication of source code • Media coverage, useless expert advice • Official company disclosure (sometimes) • News goes viral on social media (usually negative) • Partners get sucked inn • Phishing attack (the second wave), invariably malware • Additional transgressions • Additional “publications”
  • 64. Common Breach Patterns • Hackers seek potential for scale (APIs are sitting ducks!) • Original transgression often targeted and undetected • Leverages trusted relationships (the downside of social nets) • Publication or black market sale of content • Publication of source code • Media coverage, useless expert advice • Official company disclosure (sometimes) • News goes viral on social media (usually negative) • Partners get sucked inn • Phishing attack (the second wave), invariably malware • Additional transgressions • Additional “publications”
  • 65. Common Breach Patterns • Hackers seek potential for scale (APIs are sitting ducks!) • Original transgression often targeted and undetected • Leverages trusted relationships (the downside of social nets) • Publication or black market sale of content • Publication of source code • Media coverage, useless expert advice • Official company disclosure (sometimes) • News goes viral on social media (usually negative) • Partners get sucked inn • Phishing attack (the second wave), invariably malware • Additional transgressions • Additional “publications”
  • 66. Common Breach Patterns • Hackers seek potential for scale (APIs are sitting ducks!) • Original transgression often targeted and undetected • Leverages trusted relationships (the downside of social nets) • Publication or black market sale of content • Publication of source code • Media coverage, useless expert advice • Official company disclosure (sometimes) • News goes viral on social media (usually negative) • Partners get sucked inn • Phishing attack (the second wave), invariably malware • Additional transgressions • Additional “publications”
  • 67. Common Breach Patterns • Hackers seek potential for scale (APIs are sitting ducks!) • Original transgression often targeted and undetected • Leverages trusted relationships (the downside of social nets) • Publication or black market sale of content • Publication of source code • Media coverage, useless expert advice • Official company disclosure (sometimes) • News goes viral on social media (usually negative) • Partners get sucked in • Phishing attack (the second wave), invariably malware • Additional transgressions • Additional “publications”
  • 68. Common Breach Patterns • Hackers seek potential for scale (APIs are sitting ducks!) • Original transgression often targeted and undetected • Leverages trusted relationships (the downside of social nets) • Publication or black market sale of content • Publication of source code • Media coverage, useless expert advice • Official company disclosure (sometimes) • News goes viral on social media (usually negative) • Partners get sucked in • Phishing attack (the second wave), invariably malware • Additional transgressions • Additional “publications”
  • 69. Common Breach Patterns • Hackers seek potential for scale (APIs are sitting ducks!) • Original transgression often targeted and undetected • Leverages trusted relationships (the downside of social nets) • Publication or black market sale of content • Publication of source code • Media coverage, useless expert advice • Official company disclosure (sometimes) • News goes viral on social media (usually negative) • Partners get sucked inn • Phishing attack (the second wave), invariably malware • Additional transgressions • Additional “publications”
  • 70. Common Breach Patterns • Hackers seek potential for scale (APIs are sitting ducks!) • Original transgression often targeted and undetected • Leverages trusted relationships (the downside of social nets) • Publication or black market sale of content • Publication of source code • Media coverage, useless expert advice • Official company disclosure (sometimes) • News goes viral on social media (usually negative) • Partners get sucked inn • Phishing attack (the second wave), invariably malware • Additional transgressions • Additional “publications”
  • 71. Consequences of Breaches • Of those individuals, 38 percent said they no longer did business with the organization because of the data breach. A larger number, 46 percent, said they ‘advised friends and family to be careful of sharing data with the organization (Economist Intelligence Report). • Possible account suspensions (eg: Twitter, etc.) • Loss of developer confidence • Micro financial impact (loss of revenues, customers, partners, costly reconciliation) • Legal financial impact (lawsuits, fines, etc.) • Meta financial Impact (on stock of company, upcoming public offering, or on entire stock market) • Lives are forever changed • Business shutdown
  • 72. Consequences of Breaches • Of those individuals, 38 percent said they no longer did business with the organization because of the data breach. A larger number, 46 percent, said they ‘advised friends and family to be careful of sharing data with the organization (Economist Intelligence Report). • Possible account suspensions (eg: Twitter, etc.) • Loss of developer confidence • Micro financial impact (loss of revenues, customers, partners, costly reconciliation) • Legal financial impact (lawsuits, fines, etc.) • Meta financial Impact (on stock of company, upcoming public offering, or on entire stock market) • Lives are forever changed • Business shutdown
  • 73. Consequences of Breaches • Of those individuals, 38 percent said they no longer did business with the organization because of the data breach. A larger number, 46 percent, said they ‘advised friends and family to be careful of sharing data with the organization (Economist Intelligence Report). • Possible account suspensions (eg: Twitter, etc.) • Loss of developer confidence • Micro financial impact (loss of revenues, customers, partners, costly reconciliation) • Legal financial impact (lawsuits, fines, etc.) • Meta financial Impact (on stock of company, upcoming public offering, or on entire stock market) • Lives are forever changed • Business shutdown
  • 74. Consequences of Breaches • Of those individuals, 38 percent said they no longer did business with the organization because of the data breach. A larger number, 46 percent, said they ‘advised friends and family to be careful of sharing data with the organization (Economist Intelligence Report). • Possible account suspensions (eg: Twitter, etc.) • Loss of developer confidence • Micro financial impact (loss of revenues, customers, partners, costly reconciliation) • Legal financial impact (lawsuits, fines, etc.) • Meta financial Impact (on stock of company, upcoming public offering, or on entire stock market) • Lives are forever changed • Business shutdown
  • 75. Post Intrusion Costs (Malware) “Breaches due to malware or spyware represented only 11% by number of breaches in 2013 and 2014, but they have been increasing, with the total number of breaches in this category growing by 20% between 2013 and 2014. Due to heavy forensics costs (money spent to find out exactly how the breach occurred) these breaches are on average 4.5 times more costly than the largest loss category, unintended disclosure.” (source: Beazley) * Malware is smallest group with biggest impact
  • 76. Consequences of Breaches • Of those individuals, 38 percent said they no longer did business with the organization because of the data breach. A larger number, 46 percent, said they ‘advised friends and family to be careful of sharing data with the organization (Economist Intelligence Report). • Possible account suspensions (eg: Twitter, etc.) • Loss of developer confidence • Micro financial impact (loss of revenues, customers, partners, costly reconciliation) • Legal financial impact (lawsuits, fines, etc.) • Meta financial Impact (on stock of company, upcoming public offering, or on entire stock market) • Lives are forever changed • Business shutdown
  • 77.
  • 78. Consequences of Breaches • Of those individuals, 38 percent said they no longer did business with the organization because of the data breach. A larger number, 46 percent, said they ‘advised friends and family to be careful of sharing data with the organization (Economist Intelligence Report). • Possible account suspensions (eg: Twitter, etc.) • Loss of developer confidence • Micro financial impact (loss of revenues, customers, partners, costly reconciliation) • Legal financial impact (lawsuits, fines, etc.) • Meta financial Impact (on stock of company, upcoming public offering, or on entire stock market) • Lives are forever changed • Business shutdown
  • 79. 1 Tweet Sends Dow Down By 140
  • 80. Consequences of Breaches • Of those individuals, 38 percent said they no longer did business with the organization because of the data breach. A larger number, 46 percent, said they ‘advised friends and family to be careful of sharing data with the organization (Economist Intelligence Report). • Possible account suspensions (eg: Twitter, etc.) • Loss of developer confidence • Micro financial impact (loss of revenues, customers, partners, costly reconciliation) • Legal financial impact (lawsuits, fines, etc.) • Meta financial Impact (on stock of company, upcoming public offering, or on entire stock market) • Lives are forever changed • Business shutdown
  • 81. Consequences of Breaches • Of those individuals, 38 percent said they no longer did business with the organization because of the data breach. A larger number, 46 percent, said they ‘advised friends and family to be careful of sharing data with the organization (Economist Intelligence Report). • Possible account suspensions (eg: Twitter, etc.) • Loss of developer confidence • Micro financial impact (loss of revenues, customers, partners, costly reconciliation) • Legal financial impact (lawsuits, fines, etc.) • Meta financial Impact (on stock of company, upcoming public offering, or on entire stock market) • Lives are forever changed • Business scuttled
  • 82. Reaches of Breaches • An Economist Intelligence Unit study conducted among consumers in 24 countries in March 2013 found that 18 percent of respondents had been a victim of a data breach (2014) • Adobe: 150 million userIDs, email addresses, pwd hashes, password hints(2013) • eBay: 145 million userIDs, email addresses, pwd hashes, birthdates, addresses, first, last, phone numbers, targeted eBay employees (2014) • RockYou: 30 million user IDs, Passwords (2009) • TJX: 90 million credit/debit cards • Target: 100 million credit/debit cards, PoS malware; “BlackPOS” a.k.a. Kaptoxa” (2013) • Home Depot: 56 million credit/debit cards, same (forked) malware as Target (2014)
  • 83. Eventually… Someone will build and publish a database that maps user IDs to actual people and all of their data (creating a bigger problem for shared passwords)
  • 84. Malware Case Study: Pony BotNet
  • 85. Malware Case Study: Pony BotNet
  • 86. Pony summary stats • A total of nearly 650,000 website credential stolen, with the top sites being: • ~90,000 credentials for Facebook accounts • ~25,000 credentials for Yahoo accounts • ~20,000 credentials for Google accounts • And many more with lower individual numbers, but still amounting to the remaining 515,000 accounts • Next in numbers were email accounts, with 17,000 compromised • And for the frosting on this credential cake are 7,000 stolen FTP credentials. Source: http://blog.spiderlabs.com/2013/06/look-what-i-found-its-a-pony-1.html
  • 87. Fork of Pony • Approximately 2MM total • ~1,580,000 website login credentials stolen • ~320,000 email account credentials stolen • ~41,000 FTP account credentials stolen • ~3,000 Remote Desktop credentials stolen • ~3,000 Secure Shell account credentials stolen Source: http://blog.spiderlabs.com/2013/12/look-what-i-found-moar-pony.html
  • 88.
  • 89. More recently “Cyber criminals have also developed botnets that force enslaved computers to create, or "mine", digital currencies, which the fraudsters then claim as their own.” http://www.reuters.com/article/2014/02/24/us-bitcoin-security- idUSBREA1N1JO20140224
  • 90. Challenges in API Security (work that we, the API industry must do) • Massive proliferation of APIs where security was after-thought or non-thought • User ID / password absurdity – Shared passwords (really no solution) – Weak passwords – Discoverable Passwords – Horrendous Best Practices • Non-uniform implementations of – App Secrets – Callback URLs • Good security is expensive – Talent – Resources like HSM • Administrative tools for key/OAuth management limited – Analytics – Revocation/Reissue • Unknown possibilities for 2FA with APIs • Internet of Things • Standards still in the works • Disclosure / Collaboration
  • 91. Challenges in API Security "There are far too many APIs being cranked out in such a short period of time... there is no way that they have all been properly secured and built. There will definitely be new attack vectors in an API-centric Internet, but we are still too early to know the pervasiveness of such attacks." - Evident.io founder and former Adobe Creative Cloud Architecture & Security Team Lead Tim Prendergast (http://twitter.com/auxome)
  • 92. Challenges in API Security (work that we, the API industry must do) • Massive proliferation of APIs where security was after-thought or non-thought • User ID / password absurdity – Shared passwords (really no solution) – Weak passwords – Discoverable Passwords – Horrendous Best Practices • Non-uniform implementations of – App Secrets – Callback URLs • Good security is expensive – Talent – Resources like HSM • Administrative tools for key/OAuth management limited – Analytics – Revocation/Reissue • Unknown possibilities for 2FA with APIs • Internet of Things • Standards still in the works • Disclosure / Collaboration
  • 93. Challenges in API Security (work that we, the API industry must do) • Massive proliferation of APIs where security was after-thought or non-thought • User ID / password absurdity – Shared passwords (really no solution) – Weak passwords – Discoverable Passwords – Horrendous Best Practices • Non-uniform implementations of – App Secrets – Callback URLs • Good security is expensive – Talent – Resources like HSM • Administrative tools for key/OAuth management limited – Analytics – Revocation/Reissue • Unknown possibilities for 2FA with APIs • Internet of Things • Standards still in the works • Disclosure / Collaboration
  • 94. Challenges in API Security (work that we, the API industry must do) • Massive proliferation of APIs where security was after-thought or non-thought • User ID / password absurdity – Shared passwords (really no solution) – Weak passwords – Discoverable Passwords – Horrendous Best Practices • Non-uniform implementations of – App Secrets – Callback URLs • Good security is expensive – Talent – Resources like HSM • Administrative tools for key/OAuth management limited – Analytics – Revocation/Reissue • Unknown possibilities for 2FA with APIs • Internet of Things • Standards still in the works • Disclosure / Collaboration
  • 96. Challenges in API Security (work that we, the API industry must do) • Massive proliferation of APIs where security was after-thought or non-thought • User ID / password absurdity – Shared passwords (really no solution) – Weak passwords – Discoverable Passwords – Horrendous Best Practices • Non-uniform implementations of – App Secrets – Callback URLs • Good security is expensive – Talent – Resources like HSM • Administrative tools for key/OAuth management limited – Analytics – Revocation/Reissue • Unknown possibilities for 2FA with APIs • Internet of Things • Standards still in the works • Disclosure / Collaboration
  • 99. Challenges in API Security (work that we, the API industry must do) • Massive proliferation of APIs where security was after-thought or non-thought • User ID / password absurdity – Shared passwords (really no solution) – Weak passwords – Discoverable Passwords – Horrendous Best Practices • Non-uniform implementations of – App Secrets – Callback URLs • Good security is expensive – Talent – Resources like HSM • Administrative tools for key/OAuth management limited – Analytics – Revocation/Reissue • Unknown possibilities for 2FA with APIs • Internet of Things • Standards still in the works • Disclosure / Collaboration
  • 102. Keys and Secrets Sold/Published https://gist.github.com/rhenium/3878505
  • 103. Challenges in API Security (work that we, the API industry must do) • Massive proliferation of APIs where security was after-thought or non-thought • User ID / password absurdity – Shared passwords (really no solution) – Weak passwords – Discoverable Passwords – Horrendous Best Practices • Non-uniform implementations of – App Secrets – Callback URLs • Good security is expensive – Talent – Resources like HSM • Administrative tools for key/OAuth management limited – Analytics – Revocation/Reissue • Unknown possibilities for 2FA with APIs • Internet of Things • Standards still in the works • Disclosure / Collaboration
  • 104. Callback URL Not Always Required
  • 105. Challenges in API Security (work that we, the API industry must do) • Massive proliferation of APIs where security was after-thought or non-thought • User ID / password absurdity – Shared passwords (really no solution) – Weak passwords – Discoverable Passwords – Horrendous Best Practices • Non-uniform implementations of – App Secrets – Callback URLs • Good security is expensive – Talent – Resources like HSM • Administrative tools for key/OAuth management limited – Analytics – Revocation/Reissue • Unknown possibilities for 2FA with APIs • Internet of Things • Standards still in the works • Disclosure / Collaboration
  • 106. Challenges in API Security (work that we, the API industry must do) • Massive proliferation of APIs where security was after-thought or non-thought • User ID / password absurdity – Shared passwords (really no solution) – Weak passwords – Discoverable Passwords – Horrendous Best Practices • Non-uniform implementations of – App Secrets – Callback URLs • Good security is expensive – Talent – Resources like HSM (Hardware Security Module) • Administrative tools for key/OAuth management limited – Analytics – Revocation/Reissue • Unknown possibilities for 2FA with APIs • Internet of Things • Standards still in the works • Disclosure / Collaboration
  • 107. It’s Expensive to Secure Secrets
  • 108. Challenges in API Security (work that we, the API industry must do) • Massive proliferation of APIs where security was after-thought or non-thought • User ID / password absurdity – Shared passwords (really no solution) – Weak passwords – Discoverable Passwords – Horrendous Best Practices • Non-uniform implementations of – App Secrets – Callback URLs • Good security is expensive – Talent – Resources like HSM (Hardware Security Module) • Administrative tools for key/OAuth management limited – Analytics – Revocation/Reissue • Unknown possibilities for 2FA with APIs • Internet of Things • Standards still in the works • Disclosure / Collaboration
  • 109. Challenges in API Security (work that we, the API industry must do) • Massive proliferation of APIs where security was after-thought or non-thought • User ID / password absurdity – Shared passwords (really no solution) – Weak passwords – Discoverable Passwords – Horrendous Best Practices • Non-uniform implementations of – App Secrets – Callback URLs • Good security is expensive – Talent – Resources like HSM (Hardware Security Module) • Administrative tools for key/OAuth management limited – Analytics – Revocation/Reissue • Unknown possibilities for 2FA with APIs • Internet of Things • Standards still in the works • Disclosure / Collaboration
  • 110. Challenges in API Security (work that we, the API industry must do) • Massive proliferation of APIs where security was after-thought or non-thought • User ID / password absurdity – Shared passwords (really no solution) – Weak passwords – Discoverable Passwords – Horrendous Best Practices • Non-uniform implementations of – App Secrets – Callback URLs • Good security is expensive – Talent – Resources like HSM (Hardware Security Module) • Administrative tools for key/OAuth management limited – Analytics – Revocation/Reissue • Unknown possibilities for 2FA with APIs • Internet of Things • Standards still in the works • Disclosure / Collaboration
  • 111. Challenges in API Security (work that we, the API industry must do) • Massive proliferation of APIs where security was after-thought or non-thought • User ID / password absurdity – Shared passwords (really no solution) – Weak passwords – Discoverable Passwords – Horrendous Best Practices • Non-uniform implementations of – App Secrets – Callback URLs • Good security is expensive – Talent – Resources like HSM (Hardware Security Module) • Administrative tools for key/OAuth management limited – Analytics – Revocation/Reissue • Unknown possibilities for 2FA with APIs • Internet of Things • Standards still in the works • Disclosure / Collaboration
  • 112. The IoT Exacerbation • 50 billion devices by 2020 • Proliferation of miniaturized but battle-untested platforms and operating systems • Security and usage patterns barely understood • Non-standard protocols involving less-evolved security • Endpoints sprinkled across devices, proxies, and the cloud • Involving massive amount of sensitive data
  • 113.
  • 114. Challenges in API Security (work that we, the API industry must do) • Massive proliferation of APIs where security was after-thought or non-thought • User ID / password absurdity – Shared passwords (really no solution) – Weak passwords – Discoverable Passwords – Horrendous Best Practices • Non-uniform implementations of – App Secrets – Callback URLs • Good security is expensive – Talent – Resources like HSM (Hardware Security Module) • Administrative tools for key/OAuth management limited – Analytics – Revocation/Reissue • Unknown possibilities for 2FA with APIs • Internet of Things • Standards still in the works • Disclosure / Collaboration
  • 115. Challenges in API Security (work that we, the API industry must do) • Massive proliferation of APIs where security was after-thought or non-thought • User ID / password absurdity – Shared passwords (really no solution) – Weak passwords – Discoverable Passwords – Horrendous Best Practices • Non-uniform implementations of – App Secrets – Callback URLs • Good security is expensive – Talent – Resources like HSM (Hardware Security Module) • Administrative tools for key/OAuth management limited – Analytics – Revocation/Reissue • Unknown possibilities for 2FA with APIs • Internet of Things • Standards still in the works • Documentation / Disclosure / Collaboration
  • 116. Lax Docs stated here https://developer.linkedin.com/documents/getting-oauth-token "You now have an access token and can make LinkedIn API calls. Please ensure to keep the user access tokens secure, as agreed upon in our APIs Terms of Use." But the terms of use: http://developer.linkedin.com/documents/linkedin-apis- terms-use Do not say or suggest that tokens must be stored or encrypted and how to do that.
  • 117. Indecent Disclosure? Could even more be done?
  • 118. Protect Your API & Adjacencies • API security not just about securing the API itself • Do not rely on user credentials (user ID / password) for authentication • When issuing tokens, refresh frequently • Require app key and secret (not a silver bullet, but a barrier) • Require call-back URLs to go with application keys and secrets • Secure as much as possible via HSM or reasonable alternatives • Encrypt data in transit and at rest • Require 2FA-based authentication for all developers • Develop and regression test against known security patterns (make Apple’s problem your problem) for all APIs (documented/undocumented) • Require/Reject User Settable Recovery Questions (where credentials are required) • Include Email address of record for recovery workflow? • Better more prescriptive documentation • Developer and end-user testing • Better Disclosure (for your users/customers, for the industry) • Monitor OAuth WG Proof of Possession (PoP) Standard
  • 119. Protect Yourselves • Only use password protected WiFi • Use a VPN if possible • Use 2FA-supported Federated Login when Possible (reduce reliance on user ID/password combinations) • Examine email links before clicking through • Force token resets on a regular basis: – Example: go to Twitter settings revoke client app access (eg: Buffer), grant it access again (forces re-issue of token) • Check known sites for PWNage • Setup a Google Alert?
  • 120.
  • 123.
  • 125. API Security < Internet Security