Are APIs Putting Financial Data At Risk? (csoonline.com) 66
We live in a world where billions of login credentials have been stolen, enabling the brute-force cyberattacks known as "credential stuffing", reports CSO Online. And it's being made easier by APIs:
New data from security and content delivery company Akamai shows that one in every five attempts to gain unauthorized access to user accounts is now done through application programming interfaces (APIs) instead of user-facing login pages. According to a report released today, between December 2017 and November 2019, Akamai observed 85.4 billion credential abuse attacks against companies worldwide that use its services. Of those attacks, around 16.5 billion, or nearly 20%, targeted hostnames that were clearly identified as API endpoints.
However, in the financial industry, the percentage of attacks that targeted APIs rose sharply between May and September 2019, at times reaching 75%.
"API usage and widespread adoption have enabled criminals to automate their attacks," the company said in its report. "This is why the volume of credential stuffing incidents has continued to grow year over year, and why such attacks remain a steady and constant risk across all market segments."
APIs also make it easier to extract information automatically, the article notes, while security experts "have long expressed concerns that implementation errors in banking APIs and the lack of a common development standard could increase the risk of data breaches."
Yet the EU's "Payment Services Directive" included a push for third-party interoperability among financial institutions, so "most banks started implementing such APIs... Even if no similar regulatory requirements exist in non-EU countries, market forces are pushing financial institutions in the same direction since they need to innovate and keep up with the competition."
However, in the financial industry, the percentage of attacks that targeted APIs rose sharply between May and September 2019, at times reaching 75%.
"API usage and widespread adoption have enabled criminals to automate their attacks," the company said in its report. "This is why the volume of credential stuffing incidents has continued to grow year over year, and why such attacks remain a steady and constant risk across all market segments."
APIs also make it easier to extract information automatically, the article notes, while security experts "have long expressed concerns that implementation errors in banking APIs and the lack of a common development standard could increase the risk of data breaches."
Yet the EU's "Payment Services Directive" included a push for third-party interoperability among financial institutions, so "most banks started implementing such APIs... Even if no similar regulatory requirements exist in non-EU countries, market forces are pushing financial institutions in the same direction since they need to innovate and keep up with the competition."
In theory (Score:2)
In practice, few companies do that, they just start writing APIs as new features are needed. It works in the happy case, and security is someone else's problem.
Re:No API's (Score:4, Interesting)
Re: (Score:2)
Re: (Score:2)
Re: (Score:3)
Re: (Score:3)
Re: (Score:2)
Re: (Score:3)
Re: (Score:3)
I have assets. They are spread among many institutions.
I do not want to have to spend a ridiculous amount of time collecting the information I need in order to manage those assets from many different institutions, all using many different and diverse systems. I want to be able to have a dashboard of my current assets across those institutions and be able to discuss it with my financial advisor.
In a world with no APIs for financial institutions, you will never have an up-to-date view, because you will be r
Re:No API's (Score:4)
Do you want control or just monitoring though? API logins should be independent of user logins, utilize key pairs, have limited data access, and sensitive information should be abstracted.
I have more bank accounts and brokerage accounts than I would prefer, and I am going to have to make it worse soon. There is no way I would grant API access to the data though; I sure as hell don’t trust Intuit with my account data. I will go through the tedium of duplicating data in a spreadsheet or something if I need to aggregate information.
Re: (Score:1)
They usually are.
Re: No API's (Score:3)
Re: (Score:2)
Exactly.
Also, how does he think all those phone apps work? They don't have a special VPN to the bank's network, they have to access a public API just like everything else.
APIs are easier to secure than web pages, because they're typically simpler. Smarter designs make the web page version also just use the same API under the covers. That way you can completely enforce all your security in one easy to review server-side set of code.
In terms of attacks, they have to balance between being vulnerable to denial-
Re: (Score:2)
Re: (Score:2)
It shouldn't be possible, for example, to wire transfer thousands of dollars out of your account without either an agreed-upon pattern and usual destinations, or else separate confirmation which doesn't involve the API.
Yeah, good luck with that. The savings accounts of both my parents are now frozen because one has dementia, the other has mobility issues and either has the appropriate digital ID. And I did try to get one for my dad only to realize their offices are barely open Monday-Friday when I'm at work. Fortunately their regular account is with another bank so I haven't been forced to deal with it but a physical encounter with my bank is currently an extreme inconvenience. Maybe it's cause and effect but practically
Re: (Score:2)
Re: (Score:2)
How do you suppose their own approved portals would communicate?
Re: (Score:2)
Fuck you.
APIs are fine if they are well thought out, limited in what they expose to only what is designed, and above all use authentication schemes more reliable than a username and password, or some shared secret nonsense.
The interoperability of systems is something we should want, not arbitrarily decry.
No, Bad Security/Programming Is (Score:5, Insightful)
Use best practices, require certs/two factor authentication for all calls, don't allow expired certs, don't allow universal passwords, etc.
If you use bad security practices because you're too busy to implement good ones, or you'll fix it in release, or because your customer complains that it's too hard to use good practices, or because you have too high privileges than the API call actually needs, etc., then sooner or later that will come back to bite you on the ass.
Nine times out of ten, it's not the fault of the APIs, it's the way you've implemented them.
Re: (Score:2)
Mod parent up.
Permitting access without authentication, ACLs and long session persistence is clearly insane, but coders aren't responsible for the outcome in terms of actual liability. No one will pressure API guards because, also insanely, we limit the liability in breaches to a pittance of actual damages.
If liability could be bestowed on organizations (who was it this week, MGM, the USPOTUS, and others) that would ransack their assets and put them in jail, then people would respect protecting access to th
Re: No, Bad Security/Programming Is (Score:2)
Re: (Score:2)
Um, sure. And when's the last time you heard of a successful litigation under CCPA? Yes, I know this is brand new legislation.
It's not even a matter of pride. No one falls on their sword, gets publicly sacked and castigated, or probably even loses their job. It's in the lawyer's hand, here, have a nice credit report service (from people whose site's been jacked).
At one time, long ago, Target Stores were breached, and it hurt their sales for a long time, along with Marshalls/TJMaxx/etc. Now we all shrug, bec
Re: No, Bad Security/Programming Is (Score:2)
Re: (Score:2)
It's laudable legislation, but my first paragraph's intent remains. Seen litigation? Seen massive fines? It's not nonsense. Where is the nexus of litigation under the CCPA? Is it at the AWS server where the data leaked? Was it a citizen of CA who is an injured party? Is the nexus a programmer in San Jose? Who owned the data at the time, or was managing it?
No, California State can sue. Show me the litigation. Show me organizations slammed with fines for each and every record lost.
Read my first paragraph. Rea
Re: (Score:2)
Seen litigation? Seen massive fines? It's not nonsense.
The attorney general is prohibited from initiating lawsuits related to CCPA before July 1st, 2020. What exactly are you expecting to see?
Re: (Score:2)
So in other words, the legislation is completely toothless at this time.
Re: (Score:2)
Re: No, Bad Security/Programming Is (Score:2)
GP told you to read the Wikipedia page. You should have. Instead youâ(TM)ve shown only your bare ignorance of the topic at hand.
Well done sir.
Use of unverified code puts financial APIs at risk (Score:2)
When I hinted my supervisors to the risk, pointing out actual cases that already happened where malware was injected into web services via public NPM repositories (with other repositories like PIP, Gems, CPAN being no less risky), I was just told that it is industry standard to use those
Re: Use of unverified code puts financial APIs at (Score:2)
Re: (Score:2)
Totally unrelated to the topic, but a comment/question about your signature:
"If you find yourself hating a group of people, you are the problem."
I overwhelmingly agree with this, but....I hate Nazis. Am I the problem?
I don't hate anyone based on their skin color, race, ethnicity, religious beliefs, country of origin, sexual orientation, etc etc etc...but I've gotta say, I hate Nazis.
Honestly, I'm not trying to be snarky, but how does that make me the problem? It seems to me that sometimes there are good rea
Re: Use of unverified code puts financial APIs at (Score:2)
Re: (Score:2)
Yeah, that's a small problem. Hating them won't help them become better people, and in any case your hate is mostly in you, not them: clouding your vision, not theirs.
Yes, some of the hate is certainly within me, but they also seem pretty hateful by any reasonable standard.
I'm not sure there's anything I can do to help them become better people. And I hate them the same way I hate cancer cells: I regard them as an invasive species intent on destroying the host.
Am I supposed to love or tolerate them? I'm not trolling you, I'm curious to know your thoughts on how to live on the same planet as them. Nazis (and their ilk) seem to be all or nothing- accept them and join them
Re: (Score:2)
Re: (Score:2)
Is this a real problem, like, do you ever have interactions with Nazis?
A few times in person, they were just as repulsive as I thought they'd be. I'm more concerned with the damage they're doing by poisoning society in general than through personal interactions. The same way I'm more concerned about pollution or disease, even though I may not be dealing with it on a strictly personal level.
You didn't answer any of my questions, and I would sincerely appreciate hearing your thoughts on what I said.
1) Am I supposed to love or tolerate them?
2) How can I coexist with them when the
Re: (Score:2)
1) Am I supposed to love or tolerate them?
You have to tolerate them, unless you're planning on hitting them with a Hanukkah hammer. If you can love them, that's hard, but try to not hate them. That's just contributing more hate to the world.
2) How can I coexist with them when they openly admit that they would like nothing better than to kill me and my entire family?
You've been coexisting with them for decades now. I don't understand the question.
Re: (Score:2)
You have to tolerate them
I wouldn't tolerate a cancerous tumor that is going to kill me, why would I tolerate a group of people who eagerly want to do the same thing?
Tolerance is great until it's used to crush or kill you. And that is their openly stated goal.
If tolerance doesn't run both ways, then it ends up as a fatal weakness of those who are tolerant. If they won't 'tolerate' me, why should I tolerate them?
You've been coexisting with them for decades now. I don't understand the question.
Not by their choice and not by mine. They'd eradicate me if they could. FFS, we fought a World War against them because of
Re: (Score:2)
The hate hurts yourself more than anyone, because it's in you. And your aim won't be good if you are blinded by anger.
Re: (Score:2)
I appreciate you answering me and sharing your thoughts.
I think we'll have to agree to disagree on this one, though.
I sincerely hope that you or your loved ones never become the focus of the kind of hate these sorts of people produce, and again, I thank you for sharing your thoughts.
Re: (Score:2)
I think we'll have to agree to disagree on this one, though.
Oh yeah? Do you have any reasoning to support you disagreement, or is it just a "gut reaction?"
Re: (Score:2)
I think we'll have to agree to disagree on this one, though.
Oh yeah? Do you have any reasoning to support you disagreement, or is it just a "gut reaction?"
You're free to disagree if you like. :)
Re: (Score:2)
Sounds like their development and operations practices are fucked if at the very least you aren't setting up an internal repository where your deploys come from, from a reliability perspective alone. It just so happens that you can version control all your dependencies this way as well, because you are no longer dependent on the npm / python / rubygems guys to have their shit working, or not to publish broken new package versions (which happens all the time).
This is stupid. (Score:2)
Thinking that people should have to access their information through a proprietary site interface is stupid. You might as well declare all standardization to be bad for security and that every financial site have it's own browser plugin.
If your credentials have been compromised then doing anything besides changing them is just hand-waving.
Re: (Score:2)
If it's something as important as financial information, why not?
Re: (Score:2)
Because I (for example), routinely interact with a dozen financial institutions and would prefer not to give control of my computer over to all of them when it's safer for them to use standard vetted code on the server-side instead.
Re: (Score:2)
For the same reason that it's idiotic to install a bank's (or any company's) app on your phone - it's just an excuse for that bank/company to install spyware in your phone or browser.
You may be their customer, but they want you to be their product too.
apart from all the other problems with such spyware (your bank doesn't need to know where you are or where you travel to/from, or who you communicate with, or what web sites you visit etc), that creates a conflict of interest WRT security - they have an incent
Re: (Score:2)
For a long time, Bank of America enforced your final point for me - their login would always say I had an incorrect password if I used Chrome, but it worked fine in Safari or Firefox. So, if I needed to deal with my mortgage, I would have to use a separate browser.
I think at some point they fixed it.
Re: (Score:2)
yeah, i switched banks once in the 90s because their website stopped working on firefox on linux - it had been working fine for a few years. closed my accounts and transferred to another bank. well, that was part of the reason - the final straw. that bank sucked anyway.
---
BTW, I worded my original post badly. Changing browsers isn't necessary if the user switches to a different login account, or reboots to linux for banking (because running random software as Administrator is "normal" in windows - "it doe
Re: (Score:2)
Because security through obscurity isn't security at all.
Re: (Score:2)
An endpoint is an endpoint is an API (Score:2)
The user-facing login page has always been an API. Just because there is a different API now available means nothing.
A "user-facing" login page is just a client (or even proxy) to the existing login API. It makes no difference if that API parses data from a HTML form request, XML or JSON. It is all the same. The underlying authentication method is all that matters. In most cases the APIs meant for server-side consumption are much more secure. Especially when it comes to a brute for attack.
I don't see the pr
Re: (Score:2)
The user-facing login page has always been an API. Just because there is a different API now available means nothing.
A "user-facing" login page is just a client (or even proxy) to the existing login API. It makes no difference if that API parses data from a HTML form request, XML or JSON. It is all the same.
This was my thought too- everything is an API when you get right down to it. The internet itself is little more than an API, regardless of all the graphical crap and eye candy.
Hell, now that I think about it, my wife is kinda like an API. The inputs and outputs are often mysterious and inconsistent and seem to vary from day to day, but still...
Client-side vs. server-side (Score:2)
As far as web applications are concerned, I think the larger problem is the move towards client-side programming.
Client-side web apps expose huge amounts of application logic and schema that would otherwise be kept secret in a server-side application. Certainly, the requests for data can be restricted and secured, but a client-side app provides a detailed roadmap to bad actors about all the potential resources available to them. A server-side application would only output a view.
I find it ironic that many s
Re: (Score:2)
Client side if done right offloads much of the complexity to the client, and keeps the minimum server side...
It's the server which must implement all the security controls, and the client implements everything related to presentation. If you separate it out properly, then you keep the server side as simple as possible which makes it easier to verify that each call does exactly what its supposed to do and cannot be circumvented or otherwise abused.
Knowing how a system works doesn't make it insecure, it does
Bewitched (Score:2)
And just how do these absolute fucking morons think the logon data gets from the silly point and clock user presented screen into the god damn fucking program that is actually using it? Do they think Samantha is wriggling her nose?
What a fucking bunch of asshole time wasters. The whole fucking lot that had anything to do with this article should be taken out behind the barn and beaten to death with baseball bats!
Hopefully no money was wasted on this assinine drivel!
Glad I use a decent password everywhere (Score:2)
Still betting at least 50% of the passwords will be brute force cracked before mine is.
API limited by Operating system permissions (Score:2)
Stop brute force attacks with false positives (Score:2)
Re: (Score:2)
Just like with robocalls, if everyone answered them and wasted a real person's time then they would stop doing it because it would be too expensive for them.
I do this, and I fuck with them and waste their time relentlessly. It's a lot of fun to waste their time and hear the excitement building in their voices until I stop and ask, "So, does anyone really buy this bullshit?" Then I laugh while they rage impotently.
My favorite targets are the IRS/SSA scammers- you can lead those dipshits on for the better part of an hour or more. And they get sooooooooooooo pissed when they realize that I've been scamming them.
The way I look at it is that every minute I spend scr
No (Score:2)
What puts data at risk are shoddy security practices and no accountability for those that employ them. If, say, the CEO would go to prison for a large data-breach, unless there is solid proof of having followed sound security practices and external reviews, the problem would vanish. A blanket compensation of $1000 for everybody that has their data stolen, payable unconditionally and without the victim having to ask for it, would also do the trick.
As it is, no/bad security is just massively cheaper for the o
security through obscurity (Score:2)
These financial guys have clearly come up with a new and important security model. They just need a catchy name... Something like "security through obscurity".
Those dealing with security over the last decades have obviously never come up with this new security methodology. This is a wonderful example of how someone outside a field can jump in and make a significant contribution. I think that these financial experts should patent the idea and charge for anyone who uses it.