search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
Retail


Protection


through the killchain


James Sherlow, director field services engineer, EMEA, for Cequence Security discusses how tech retailers can use the ecommerce killchain to protect their APIs.


O


nline sales have risen four fold in the last ten years and are set to overtake instore purchasing by 2028, according to Retail


Economics. Tis is in no small part due to retailers embracing a digital-first strategy that prioritises the use of Application Programming Interfaces (APIs), using these to access backend systems and tie multiple ecommerce systems together to create new products and services. It’s these APIs that deliver browsing or search


results, by handling calls to the backend database. Tey verify inventory status at the click of a mouse, loading a digital shopping cart. And they generate the checkout process, complete with credit card validation and email and shipping confirmation of purchase via third party APIs. In fact, they’re now seen as so fundamental that APIs have been described as key to creating and supporting significant revenue opportunities. Te flip side of this explosion in API use is that they are also


increasingly attracting the attention of attackers. Te same characteristics that developers love about APIs – flexibility, speed, ease of use – are also loved by attackers who either find coding errors to exploit, or use bots to attack perfectly coded APIs, or a combination of both. API attacks have surged over recent years, with attackers using tactics, techniques and procedures (TTPs) to abuse API functionality


34 | November/December 2023


with these types of attack documented in the OWASP API Security Top Ten Treats.


Automated attacks Attacks against retailers are usually automated or carry out business logic abuse which sees the functionality of the API used against itself. Tis means that even securely coded APIs can be subjected to attack. Tese can lead to Account Takeover (ATO) which sees the attack carried out against log-in APIs and can lead to card or points theſt, fraudulent purchases, or items being resold for profit. Or it might result in content scraping for attack reconnaissance or data exfiltration purposes,


whereby APIs are used to call inventory and pricing databases enabling the extraction of the desired content, such as pricing, part numbers, product descriptions. Te business impact of content scraping includes loss of intellectual property, increased competitive pressure on sales margins, and compute resource cost overruns. Technology retailers are a prime target for online fraud and scalpers


due to the high-value items they ship. APIs have made it much easier for these retailers to spin up APIs to launch special promotions and flash sales which naturally lead to traffic spikes. ‘Te API Protection Report’ found that there was a 550% increase in the unique TTPs used by attackers against sites during the second half of the year, rising


www.pcr-online.biz


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52