Most Common Attacks Carried Out On APIs
API Injection Attack
- Injection attacks are carried out by inserting malicious code into the API via a query or request to obtain unauthorized access to data.
- These are most commonly SQL injection attacks, which insert malicious SQL code as a parameter field.
DDoS (Distributed Denial of Service) attack
- This aims to disrupt a server with a large amount of traffic. It essentially creates a traffic jam, with no traffic able to be transferred to and from the server.
- This can break the API by making its data inaccessible to users.
Excessive data exposure
- This is where an API returns unneeded or sensitive data in its responses that could be valuable to hackers.
- This is commonly seen where APIs return complete datasets as they are on backend servers, and the client is relied on to filter the results.
MITM (Man-in-the-middle attack)
- MITM attacks are when a hacker intercepts communication between two programs to obtain the information being transferred between them.
- This risk is much greater if the data in transit is not encrypted, which is why using HTTPS is standard.
Parameter Tampering
- Parameter tampering aims to manipulate parameters sent in API requests, creating access to potentially sensitive information.
- Parameter tampering is done mainly through input forms submitted by clients on the web.