API Security Weekly: Issue 162

This week, we have details of compromised Google Cloud accounts being used to mine cryptocurrency (mainly with weak or no passwords on API connections), there’s an article on how GraphQL can be used as an API gateway (including security controls), a very comprehensive guide to all things relating to API security, and a new API security training course from AppSecEngineer.

Vulnerability: Compromised Google Cloud Accounts Used to Mine Cryptocurrency

The main story this week comes from HackerNews and describes how attackers are able to exploit improperly secured Google Cloud Platform (GCP) tenants. The impact on affected users included compromising their cloud resources, like uploading cryptocurrency mining software, and ransomware and phishing attacks.

Of greatest concern is that the accounts could be compromised due to a lack of basic hygiene on the cloud tenants. The most common issue as well as exploit — affecting 48% of the instances — was weak or no password on user accounts and API connections that allowed attackers easy access to the cloud instances. Other exploits included installing third-party software in the cloud instances and leaking credentials through GitHub repositories.

The key takeaway here is that whilst cloud platforms are a great business enabler, their complexity frequently leads to misconfiguration which results in potentially vulnerable deployments. Additionally, many skilled attackers will know what the common misconfigurations are and home in on them, allowing them to easily exploit them in the attacks on systems.

Article: GraphQL as an API Gateway

An interesting article this week by Tj Blogumas describes a novel approach to using GraphQL as an API gateway.

Blogumas describes a typical design problem encountered in the adoption of a microservices architecture: how to present a single fronted to consumers without exposing the complexity of the backing microservices mesh. Traditionally, this has been the domain of the API gateways, but Blogumas demonstrates how a GraphQL frontend can achieve the same effect.

Of interest here is how you can implement security controls at the GraphQL gateway level rather than in the backing microservice APIs. The key advantage to this approach is that key security controls are centralized in one place — implemented only once at the gateway level, rather than at in individual APIs. This reduces the burden on development teams and reduces the likelihood that such controls get accidentally omitted.

Blogumas provides several examples of the type of security controls that can be implemented, such as:

  • Depth limiting: Reduce the depth of allowed queries to reduce the impact of Denial of Service (DoS) based attacks.
  • Rate limiting: Reduce the rate at which requests can be made to specific API endpoints to mitigate the effect of DoS or brute force attacks.
  • Query cost limitations: Reduce excessively complex queries to mitigate DoS attacks.

An interesting take on API architecture that we will surely hear more about.

Guide: “Awesome API Security” Guide

We have featured some excellent API security guides in this newsletter (such as the one last week by Inon Shkedy), and this week it is the turn of the "Awesome API Security" guide by André Rainho.

This vastly comprehensive guide covers, for example, the following topics:

  • Tools
  • Mind mapping
  • Checklists and cheatsheets
  • Training, walkthroughs, and laboratories
  • Enumeration and scanning
  • Fuzzing and API keys
  • Firewalls
  • Presentations, videos, playlists, and podcasts
  • Design and architecture
  • Specifications

This is bound to prove an invaluable resource for anyone working in or around API security — thanks to André for this great resource!

Training: AppSecEngineer’s 2021 Guide to API Security

Finally, for this week, we have news of upcoming API security training courses by the AppSecEngineer team, featured in their review of API security in 2021.

The course includes a deep dive into both offensive and defensive techniques for API developers. On offense, it covers typical vulnerabilities specific to REST APIs and how malicious actors can exploit them. On defense, it focuses on defensive techniques in a hands-on laboratory environment that follows the OWASP API Security Top 10 as a content outline.

It’s always good to see new API security training and — based on previous AppSecEngineer courses — this should prove to be a great success.

You can subscribe to this newsletter at APIsecurity.io.

文章来源于互联网:API Security Weekly: Issue 162

发布者:小站,转转请注明出处:http://blog.gzcity.top/4280.html

(1)
打赏 微信扫一扫 微信扫一扫 支付宝扫一扫 支付宝扫一扫
上一篇 2022年5月3日 18:16
下一篇 2022年5月3日 18:17

相关推荐

  • Spring Boot Security + JWT ”Hello World” Example

    In this tutorial, we will be developing a Spring Boot application that makes use of JWT authentication for securing an exposed REST API. In this example, we will be making use of h…

    2022年5月3日
    1.4K40
  • An Introduction to PCI Compliance

    There are plenty of reasons for enterprises that work with cardholder data to care about payment card industry (PCI) compliance. For starters, maintaining PCI compliance is an esse…

    安全 2022年5月3日
    1.7K230
  • XSS Prevention Cheatsheet

    XSS, or Cross-Site Scripting, is one of the most common vulnerabilities found in applications. In bug bounty programs of different organizations, XSS consistently ranks as the most…

    安全 2022年5月3日
    1.2K360
  • 针对越南上市公司的新SPECTRALVIPER后门

    越南上市公司已成为一项正在进行的活动的一部分,该活动部署了一种名为SPECTRALVIPER的新型后门。 “SPECTRALVIPER 是一个严重混淆的、以前未公开的 x64 后门,它带来了 PE 加载和注入、文件上传和下载、文件和目录操作以及令牌模拟功能,”Elastic 安全实验室在周五的一份报告中表示。 这些攻击归因于它跟踪的名为REF2754的行为者…

    2023年6月11日
    49.8K29130
  • 关于Apache log4j存在远程代码执行漏洞的预警

    12月9日晚,互联网上公开了Apache log4j2的一个严重级别的远程代码执行漏洞。由于Apache log4j2某些功能存在递归解析功能,攻击者可直接构造恶意请求触发远程代码执行漏洞,而无需特殊配置。Apache Struts2、Apache Solr、Apache Druid、Apache Flink等均受此漏洞影响。鉴于该框架应用范围极广,且漏洞利…

    2022年8月3日
    841120

回复 Kennethmak

您的邮箱地址不会被公开。 必填项已用 * 标注

评论列表(916条)