APIs Are Now Target Of Choice For Cyber-criminals Attacking Financial Services Organizations: Reports

Akamai Technologies today published the Akamai 2020 State of the Internet/Security: Financial Services – Hostile Takeover Attempts report. The research findings reveal that from May 2019 and continuing on until the end of the year, there was a dramatic shift by criminals who started targetting APIs, in an effort to bypass security controls. According to data from Akamai, up to 75 per cent of all credential abuse attacks against the financial services industry targeted APIs directly.

According to the report’s findings, from December 2017 through November 2019, Akamai observed 85,422,079,109 credential abuse attacks. Nearly 20 percent, or 16,557,875,875, were against host names that were clearly identified as API end points. Of these, 473,518,955 attacked organizations in the financial services industry.

But not all attacks were exclusively API focused. On August 7, 2019, Akamai recorded the single largest credential stuffing attack against a financial services firm, in our company's history, consisting of 55,141,782 malicious login attempts. This attack was a mix of API targetting and other methodologies. On August 25, in a separate incident, the criminals targeted APIs directly, in a run that consisted of more than 19 million credential abuse attacks.

“Criminals are getting more creative and hyper-focussed on how they go about obtaining access to the things they need to conduct their crimes,” said Steve Ragan, Akamai security researcher and principal author of the State of the Internet/Security report. “Criminals targetting the financial services industry pay close attention to the defenses used by these organizations, and adjust their attack patterns accordingly.”

Indicative of this fluid attack dynamic, the report shows that criminals continue to seek to expose data through a number of methods, in order to gain a stronger foothold on the server and ultimately achieve success in their attempts.

SQL Injection (SQLi) accounted for more than 72 per cent of all attacks when looking at all verticals during the 24-month period observed by the report. That rate is halved to 36 per cent when looking at financial services attacks alone. The top attack type against the financial services sector was Local File Inclusion (LFI), with 47 per cent of observed traffic.

LFI attacks exploit various scripts running on servers, and as a consequence, these types of attacks can be used to force sensitive information disclosure. LFI attacks can also be leveraged for client-side command execution (such as a vulnerable JavaScript file), which could lead to Cross-Site Scripting (XSS) and Denial of Service (DoS) attacks. XSS was the third-most common type of attack against financial services, with a recorded 50.7 million attacks, or 7.7 per cent of the observed attack traffic.

The report also shows that criminals continue to leverage Distributed Denial of Service (DDoS) attacks as a core component of their attack arsenal, particularly as it relates to targetting financial services organizations. Akamai’s observations from November 2017 until October 2019, show the financial services industry ranking third in attack volume, with gaming and high tech being the most common targets. However, more than forty per cent of the unique DDoS targets were in the financial services industry, which makes this sector the top target when considering unique victims.

“Security teams need to constantly consider policies, procedures, workflows, and business needs – all while fighting off attackers that are often well organized and well-funded,” Ragan concluded. “Our data shows that financial services organizations are constantly improving by adopting fluid security postures, forcing criminals to change their tactics.”

For additional information, the security community can access, engage with, and learn from Akamai’s threat researchers and the insight that the Akamai Intelligent Edge Platform affords into the evolving threat landscape, visit Akamai’s Threat Research Hub.

Also Read

Stay in the know with our newsletter