December 3, 2023


Your Partner in The Digital Era

Assaults abusing programming APIs grew above 600% in 2021


Security analysts alert of a sharp increase in API assaults over the previous 12 months, with most providers nonetheless following inadequate practices to tackle the trouble.

Far more exclusively, Salt Protection reports a advancement of 681% of API attack website traffic in 2021, when the over-all API site visitors greater by 321%.

These stats underline that as industries adopt API options, assaults against them are rising disproportionally.

Diagrams reflecting rise in API use and API attacks
Diagrams reflecting rise in API use and API attacks (Salt Protection)

All data offered in Salt Security’s report was taken from a survey of a numerous demographic of 250 workforce doing work for organizations of different measurements.

API attacks

API (Application Programming Interface) is a program interface supporting online solutions that count on connections to trade information.

These connections require to be secured from unauthenticated obtain or else, any person would be capable to snatch the written content of the interactions involving end users and programs.

An API assault abuses API specifications to perform data breaches, DDoS, SQL injection, man-in-the-middle attacks, spread malware, or allow for anybody to authenticate as a person.

The threats of these attacks are substantial-scale and dire, which is why 62% of respondents in Salt Security’s survey have delayed the deployment of applications due to API stability problems.

Having the improper method

Salt Security pinpoints the problem is an over-reliance on pre-production API stability and a concentrate on identifying safety issues in the course of the advancement section.

Fact has shown that most API attacks exploit logic flaws that grow to be obvious only when the programs enter the runtime section. Nonetheless, just a quarter of firms however employs protection groups at that remaining point.

Additionally, 34% of firms deficiency any API safety strategy, so they count entirely on the vendor of the API alternative.

(Salt Security)

Ultimately, the details reveals that deploying API gateways or WAFs is not sufficient to detect and quit XSS, SQL, and JSON injection assaults, as these are done only soon after the risk actors have accomplished the essential reconnaissance and discovered usable stability gaps.

Increasing complication

Most organizations need API updates and a particular characteristic enrichment soon after the initial employment, which results in an increasingly difficult challenge to take care of.

Salt Safety reviews that 83% of its study respondents lack self confidence that their inventory and documentation reflect all existing API features.

(Salt Security)

Another 43% reviews problems about outdated API features that are no more time actively made use of in their apps but are still likely offered for abuse by danger actors.

(Salt Protection)

Stability tips

Salt Protection sees indications of a change in how the field perceives and handles API security but warns that we’re not there nevertheless.

The key protection recommendations supplied in the report are the following:

  • Define a sturdy API protection system for the entire lifecycle of APIs.
  • Validate recent API types and present controls and evaluate the present-day level of possibility.
  • Help frictionless API safety throughout all application environments, including on-premise, cloud, containers, legacy, and so forth.
  • Use cloud details to establish designs of malicious reconnaissance steps and continue to be a single step in advance.
  • Minimize your reliance on “shift-left” code review practices, and spend much more in runtime stability.