22 Dec 2021 • 10 min read
22 Dec 2021 • 10 min read
Gartner predicts that by 2022, API attacks will become the most-frequent attack vector. As bot technology evolves and APIs become popular among developers, bot attacks on APIs are growing, yet the use of bot management tools lags behind.
APIs are everywhere. Almost every website application today has them. As more enterprises move to the cloud, they tend to share business capabilities with partners and bring in new services and technologies via application programming interfaces (APIs), which allows for quicker integration and faster deployment of new services.
APIs let one of your products or services communicate with other products and services easily without having to know how they’re implemented. Therefore, it enables enterprises to integrate applications and leverage existing technologies easily.
In this digital age we are living in, innovation is vital for the success of business and APIs are beneficial for companies in allowing them to become efficient and competitive in today's market.
Now API threats are at a record high. The prevalent yet poorly protected APIs attract bad actors to exploit weakness in these connection points, such as login, online ordering, comment, and vote etc.
This has already drawn the attention of organizations and security vendors. According to the published data, there are three issues about API that should cause alarm for people.
Around 40% of organizations surveyed reported that more than one-half of their applications are exposed to the internet or third-party services via APIs, while nearly 66% of enterprises don't have a proper security measure for their APIs.
Attacks targeting APIs are increasing at an alarming rate - up 348% in six months by the third quarter of 2021, reported by Salt Labs.
Gartner predicts that by 2022, API attacks will become the most-frequent attack vector, causing data breaches for enterprise web applications.
Due to the popularity of cost-effective and time-saving APIs, API currently account for 83% of all Internet traffic, while HTML traffic has fallen to 17%, citing data from Akamai. While APIs become the foundation of business digital transformation, they also increase chances for malicious actors to access business data at the same time. Once malicious bots take advantage of sensitive data that they extract from APIs, enterprises may suffer significant financial loss or reputational damage.
API bot attacks could affect enterprises from all sectors. Technology, financial service, healthcare, and entertainment companies are widely viewed as at the forefront of API use - accounting for 68% of the surveyed respondents conducted by Salt Labs.
Most common bot attacks on APIs
Bots are evolving rapidly and becoming more sophisticated than ever. The bots we are talking about today are no longer the simple crawlers that are simply executed from automation programs, nor the bots that make use of headless browsers and distribute larger scale attacks. The bots we are looking at are sophisticated ones that can simulate human-like interactions, such as mouse movements and they sometimes look like browsers themselves to bypass client side protections.
In order to notice API bot threats promptly, you could check the symptoms below (citing Redware):
Compared with other bot attacks, attacks aiming APIs are harder to detect, but one thing we've already known is that malicious bots are the main tool for API attacks.
One of the advantages of bot attacks is that they are highly automated. There are three shortcuts that are often taken by attackers in order to make their attacks more efficient and effective in avoiding detection.
To secure APIs from bad bots, GeeTest views this issue from two aspects.
As a crucial advantage of bot attacks is that they are highly automated, in terms of their behavior (automated attacks), identities (countless credentials), and devices (cloud and group control platform), reducing the efficiency of their automation becomes the right path for security vendors.
As long as efficiency is reduced (in terms of behavior, identise and devices), bad actors have to invest more in automated tools and buy more credential data and devices, which undoubtedly rise their cost of bot attacks. When the gap between cost and profit is lower than they expected, profit-happy cybercriminals will stop and turn around to another way, and defenders will cycle the process to curb attackers in another way.
The confrontation between attacker and defender is not simply about one side defeating the other, but a sustainable game in which one keeps trying to outsmart the other.
Based on GeeTest's data, the attacks aiming APIs have one thing in common: massive repetitions and operations. Think about account takeover, scalping, denial of inventory, and so on. They are all automated attacks . In other words, they enjoy high efficiency in taking action by mimicking human behavior.
To help enterprises stop this kind of bot attacks, GeeTest released CAPTCHA v4 - Adaptive CAPTCHA, to tremendously reduce the efficiency of bots' actions.
Unlike legacy CAPTCHAs that detect bot activities simply based on limited parameters, such as image/text recognition (which can no longer stop sophisticated bot). To stop AI-powered bots who are getting better at understanding human interaction and can even mimic human behavior, security vendors should give attackers a taste of their own medicine.
GeeTest CAPTCHA v4 - Adaptive CAPTCHA provides a more intelligent, accurate and user-friendly replacement for legacy CAPTCHA systems. It uses a series of AI algorithms to detect malicious bots from more comprehensive dimensions than others.
One fundamental feature of GeeTest CAPTCHA v4 that makes it distinct from other CAPTCHA systems is modularization.
The common workflow of a CAPTCHA looks like this.
GeeTest CAPTCHA v4 makes every step an independent module and allows clients to decide how to use the modules to best fit their business and current risk control systems. In this way, companies can flexibly use the different modules of GeeTest CAPTCHA v4 to address their risk control needs in different scenarios and at different stages of development. The modular design of GeeTest CAPTCHA v4 provides the most suitable solution for specific requirements.
Here are three examples.
Register to try GeeTest CAPTCHA v4 free version here
Apart from CAPTCHA, there are actually a lot technologies enterprises can use to protect their APIs. Such as WAF, API gateway, cloud based service, dedicated bot management, and so on.
To choose a security tool or solution, enterprises should take these into consideration:
API bot attacks continue to increase and the methods of bot attacks are evolving fast. Protecting API security requires agile tools and dynamically evolving solutions that can spot and stop API attacks before they happen.
One way we recommend is to adopt a tool or system that can handle real time detection and mitigation without interrupting users' experience.
GeeTest
GeeTest
Subscribe to our newsletter