Radware Research: API Abuse is a Leading Threat

Global organizations are struggling to maintain consistent application security across multiple platforms, and they are also losing visibility with the emergence of new architectures and the adoption of APIs, explained Radware in their “2020-2021 State of Web Application Security” report.

A major factor in these challenges was the need to adjust rapidly to a new remote working and customer engagement model that resulted from the pandemic, leaving decision makers little or no time to conduct adequate security planning.

Key Findings from Radware’s Report

API’s Are the Next Big Threat

There is a growing dependence on, and increased reliance on, web-enabled applications in the form of APIs. A wide variety of sensitive data types are processed by APIs, such as user credentials, payment information, social security numbers, etc. API abuses are expected to become the most frequent attack vector. As such, API security is the most critical hole enterprises should patch in 2021.

Nearly 40% of organizations surveyed reported that more than one-half of their applications are exposed to the internet or third-party services via APIs. Some 55% of organizations experience a DoS attack against their APIs at least monthly, 49% experience some form of injection attack at least monthly, and 42% experience an element/attribute manipulation at least monthly.

Enterprises Unprepared for Bot Traffic

Bot management is also a major concern because enterprises are not prepared to properly manage bot traffic. While web application firewalls offer important defensive capabilities to detect and prevent attacks against APIs and the like, bot management tools offer a robust defense against sophisticated bot attacks. And they give security teams a better grasp on dealing with a variety of threats and attacks.

The report revealed that only 24% of organizations have a dedicated solution to distinguish between a real user and a bot. Moreover, only 39% of those surveyed have confidence in their understanding of what’s going on with sophisticated bad bots.

Mobile Apps Far Less Secure

Mobile apps played a critical role during 2020 as most information workers were shifted to at-home work, and as most use mobile apps for entertainment, social interaction, education, and shopping. However, mobile app development is highly insecure. This is true, in part, because mobile apps are more commonly developed by third parties.

This research found that only 36% of mobile apps have security fully integrated, and a large proportion have either minimal or no security (22%). As a result, until mobile apps security is treated seriously, more – and more serious – incidents that use the mobile channel for attacks. That in turn will likely put more pressure on enterprises to secure mobile apps and not leave consumer data exposed to hackers.

Security Staff Is Not the Prime Decision Maker

Despite the threats outlined in the report, security is not a first priority in application development practices. In approximately 90% of surveyed organizations, security staff are not the prime influencer on application development architecture nor the budget. Some 43% of companies surveyed said security should not interrupt the end-to-end automation of the release cycle. This creates a situation in which the very people responsible for security have little control over how apps are developed.

DDoS Attacks Aren’t Going Away

The most common Bot attack is Denial-of-Service, taking different shapes. Some 86% said they have experienced such an attack, with a third of them reporting weekly occurrences and 5% seeing them daily. Denial-of-service at the application layer is frequently in the form of HTTP/S floods. Nearly 60% of organizations experience an HTTP flood at least once per month or more.

Check out the full report.