Page 16 - GS200302
P. 16

Views





                                                                to accommodate thousands of transactions per second.
               The very point of salery point of sale           Consumers and merchants who are conscious of where
               The ve
                                                                these attacks will likely occur can protect vulnerable
                                                                endpoints and minimize exposure, he noted, adding that
                                                                people don't have any idea of how easily a hacker can crack
                                                                usernames and passwords.
                                                                "The challenge is that this type of vulnerability is often
        Passwords are so passé                                  considered low risk because it is up to the user to have
                                                                a  good  password,  change  it  regularly,  include  special
                                                                characters, etc.," Kent said. "In this case it's easy to see that
        By Dale S. Laszig                                       even though the user has some responsibility, the system
                                                                shouldn't be built in such a way that an attacker can test
                                                                credentials and later construct and automated attack that
                    ost mobile app users know passwords alone   isn't noticed."
                    are insufficient protection against automated
                    attacks, but old habits die hard. The recent   To further illustrate mobile app vulnerability, Kent recalled
        M attack on J. Crew is one more wake-up call in         that API layers were originally created for internal traffic,
        a litany of worst case scenarios that highlight the need for   before mobile traffic  became  widespread. During this
        multilayered security, according to Jason Kent, hacker in   simple  jump  from  internal  to  external  use,  developers
        residence at Cequence Security. Kent told The Green Sheet   weren't looking at the vulnerabilities of high-speed
        that  he sees automated  attacks  on mobile applications   transaction models. Failure to follow security basics in an
        every day.                                              architecture that supported a huge transaction load gave
                                                                automated attackers a great environment for efficient
        These attacks typically throw massive swaths of usernames   testing, he said.
        against an application to see if the application prompts
        for  a  password.  When  the  app  recognizes  a  username,   How can we be safe?
        hackers begin the second attack phase by trying different   Kent noted that mobile app developers and deployers can
        password combinations. "Eventually the attacker learns   take steps to build more secure apps and detect anomalous,
        the usernames and passwords of several accounts and in   automated attacks. He provided the following guidelines:
        the next phase they attack," Kent said. "Both the testing and
        the attack are noisy but often we find organizations aren't   •  Know your network: The first step is having a
        instrumented to see the testing and attack phases."          thorough knowledge and updated inventory of all
                                                                     network endpoints and APIs to figure out what is
        As mobile app adoption grows, we need stronger               needed,  Kent  stated.  This  includes  APIs  that  have
        authentication methods. A recent Harris Poll conducted by    recently been changed or up-versioned and old APIs
        Ondot Systems showed 64 percent of U.S. consumers believe    that  are  left  on.  Just  adding  security  to  new API
        technology companies can significantly improve financial     endpoints doesn't go far enough because attackers
        products and services. Survey respondents between the        look at all the old applications to see which APIs are
        ages of 18 and 44 would consider purchasing a financial      still on or have changed.
        product from a tech company for the following reasons:
        tech companies make products that are more convenient     •  Understand API resilience: Next, understand what
        to  use  (35  percent),  have  built-in  tools  to  control  budget/  abuse the API can take. Can I login 500 times in a
        spending (30 percent) and provide better technology/         row? Can I take my session tokens and use them to get
        digital features (28 percent).                               another  user's  information?  What  does  registration
                                                                     and password resetting look like? Attackers can
        "Technology companies have spent years and billions of       and will exploit these simple mechanisms to attack,
        dollars designing customer-centric platforms that deliver    Kent said. Familiarity with abuse cases can mitigate
        an easy user experience, Apple Card's instant issuance       attacks.
        feature being a recent example," said Vaduvur Bharghavan,
        CEO of Ondot Systems. "As a result, consumers have        •  Watch  out for bots: Organizations that detect
        incredibly high expectations of the companies with which     anomalous behavior and bot activities can mitigate
        they do business, including financial institutions."         numerous attacks because they will understand if a
                                                                     request is coming from a known bad actor or location,
        High expectations, high crimes                               or trying to use an old session, such as Consumer
                                                                     A using a token assigned to Consumer B. Having
        Kent pointed out that their agile and user-friendly design   this type of intelligence can make the difference
        makes mobile app APIs particularly vulnerable to massive,    between exposing an API for attackers to play with
        orchestrated attacks, and such automated attacks can be      at will and having a protected application that takes
        difficult to detect because APIs are designed to be fast and   attackers on a journey they weren't expecting, Kent

        16
   11   12   13   14   15   16   17   18   19   20   21