Issue 99: API flaws in the Mercedes-Benz app and Russian inter-bank money transfer

The Latest API Security News, Vulnerabilities and Best Practices
Issue: #99
API flaws in the Mercedes-Benz app and Russian inter-bank money transfer
This week, we check out the API vulnerabilities in the Mercedes-Benz connected cars and the Russian inter-bank money transfer system. We also have the upcoming ASC 2020 conference next week, as well as a recording of IIoT Cybersecurity panel discussion from the recent IIoT World event.
Vulnerability: Mercedes-Benz car control
 

The conference Black Hat USA has posted the slides and the full research paper from the session “Security Research on Mercedes-Benz: From Hardware to Car Control” by Minrui Yan, Jiahao Li, and Guy Harpak. Too bad there’s no video recording.

Researchers got access to the backend intranet through the eSIM of a Mercedes-Benz E-Class connected car. To get connected, they had to reuse the APN settings, spoof IMEI numbers, and locate and reuse certificates. However, once they got through these hurdles and managed to established the connection, they found that the APIs themselves were not protected at all.

The researchers could issue commands to any cars of the same model in the same region (China in this case, so estimated 2 million connected cars), such as:

  • Locking or unlocking doors
  • Opening or closing the roof
  • Switching lights on or off
  • Making the car beep
  • Starting or stopping the engine (limited)

Quite a list of things, then. Lessons learned here:

  • Never trust the API client: no matter how protected your client and network are, there is a chance that someone breaks through.
  • Always implement both authentication (to prevent unauthorized access once attackers found your API) and authorization (to prevent IDOR/BOLA style scope expansion like in this case).
Vulnerability: Russian inter-bank transfer system
 

The Russian inter-bank money transfer system got hacked through the mobile app of one of the member banks.

Attackers located the vulnerable API by proxying the calls. They found that they could simply replace the source account ID parameter in money transfer calls and the backend would transfer the money, without checking whether the source account belonged to the person invoking the API.

So, how did the attackers get valid account IDs in the first place, then? To make things worse, there was another API endpoint that allowed attackers to enumerate accounts in the bank, creating a list of possible victims.

Unfortunately, the attack was identified only after the vulnerability had already been exploited, and Russian Central Bank had to send banks a warning about the attack. The story (unfortunately in Russian, so you might need Google Translate) does not contain the details on how many accounts got compromised or the total volume of funds stolen.

Storyline from a heist movie, this one. Lessons learned:

Conference: API Specification Conference
 

Next week, September 9—10, is API Specification Conference (ASC) 2020, the annual event by the OpenAPI Initiative (OAI). This year, it is all online, very reasonably priced (just $39, of which $10 goes to charity), and has lots of great content.

The conference is all about API standards: the OpenAPI Specification (OAS), RAML, Blueprint, gRPC, OData, JSON Schema, GraphQL, AsyncAPI, OAuth – and a great opportunity to meet the geniuses behind them.

This year, I found at least two security sessions on the agenda:

Video: IIoT Cybersecurity Challenges
 

Industrial Internet of Things (IIoT) is a big driver of what is now called Industry 4.0. IIoT takes automation to the next level and allows industry to become agile and scalable at unprecedented levels.

The conference IIoT World has published the recording of the IIoT cybersecurity panel discussion recorded at the event this summer. Here’s the quick abstract:

The Industry 4.0 revolution brings with it a new operational risk for connected, smart manufacturers and digital supply networks: cyber. Industrial Cybersecurity should be an integral part of the strategy, design, and operations from the beginning of any new connected, Industry 4.0–driven initiative.

In light of Industry 4.0, our expert line up of panelists will examine visibility, control, and situational awareness in relation to your cyber security strategy – and their impact on the future of digital manufacturing.

This panel, originally presented at IIoT World Days on July 1, 2020, discusses:

  • Top trends impacting today’s manufacturers security strategy
  • What are the cyber security-specific technical issues associated with Industry4.0?
  • What are the cyber security-specific training and education issues associated with Industry4.0?

The member of the panel were:

  • Joe Weiss (Moderator), PE, CISM, CRISC, ISA Fellow, IEEE Senior Member, Managing Director ISA99; Applied Control Solutions, LLC
  • Pamela Gupta, President, OutSecure, Inc.
  • Dmitry Sotnikov, Chief Product Officer, 42Crunch
  • Chuck Brooks, President, Brooks Consulting International
  • Bryan Skene, CTO and VP of Product Development, Tempered

I loved participating in the panel discussion and would recommend it to anyone interested in the cyber security aspects of IoT.

 
dmitry_apisec-1  

Dmitry Sotnikov

APIsecurity.io

 
Thanks for reading.

That's it for today. If you have any feedback or stories to share, simply reply to this email.

Please forward the newsletter to your friends and colleagues who might benefit from it.

 
42Crunch Ltd   71-75 Shelton Street  Covent Garden  London  Greater London   WC2H 9JQ   United Kingdom
You received this email because you are subscribed to API Security News from 42Crunch Ltd.

Update your email preferences to choose the types of emails you receive or Unsubscribe from all future emails  
 
 

Older messages

Issue 98: APIs as the next frontier in cybercrime

Thursday, August 27, 2020

Hi, today we look at a couple recent vulnerabilities, what makes APIs such a target, an APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #98 APIs as the next

Issue 97: How to not leak API keys

Thursday, August 20, 2020

Hi, today we look at 2 recent API vulnerabilities, a CTF breakdown, and a DEF CON talk APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #97 Gym apps & home

Issue 96: Vulnerabilities at Cisco and MGM Grand Resort 🏖️, tutorial on Chrome DevTools and pentesting with GraphQL

Thursday, August 13, 2020

Hi, today we look at a couple of API vulnerabilities and two pentesting video tutorials APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #96 Vulnerabilities at

Issue 95: Vulnerabilities at Zoom and OkCupid 💘, progress on OAuth 2.1, API Information Disclosure tutorial

Wednesday, August 5, 2020

Hi, today we look at a couple recent vulnerabilities, a video on locating leaky APIs & APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #95 Vulnerabilities at

Issue 94: Two-day API security training at Black Hat USA 🎩

Wednesday, July 29, 2020

Hi, today we look at the possible API exploit for Wordpress, new stats on WAFs and API APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #94 Two-day API security

You Might Also Like

📧 Unit Testing Clean Architecture Use Cases

Saturday, January 4, 2025

​ Unit Testing Clean Architecture Use Cases Read on: m​y website / Read time: 7 minutes The .NET Weekly is brought to you by: Introducing Depot Cache, the powerful way to make incremental builds up to

iOS Dev Weekly - Issue 693

Friday, January 3, 2025

Happy New Year, and here's to a cracking 2025! 🎊 View on the Web Archives ISSUE 693 January 3rd 2025 Comment Happy New Year, everyone! 🎊 I hope you all had a restful and relaxing break if you took

JSK Daily for Jan 3, 2025

Friday, January 3, 2025

JSK Daily for Jan 3, 2025 View this email in your browser A community curated daily e-mail of JavaScript news Optimizing Productivity: Integrate Salesforce with JavaScript Scheduler Syncfusion

Daily Coding Problem: Problem #1657 [Easy]

Friday, January 3, 2025

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Airbnb. Given a linked list and a positive integer k , rotate the list to the right by k

🍎 How I Use Trackpad Gestures to Manage my Mac — Are You Wearing Your Smartwatch Correctly?

Friday, January 3, 2025

Also: I Used a Temporary eSIM While Traveling and Have Thoughts How-To Geek Logo January 3, 2025 Did You Know There might never have been a Star Wars if not for George Lucas' lead foot and diabetes

SWLW #632: On avoiding pile-ups, The Chief Architect role, and more.

Friday, January 3, 2025

Weekly articles & videos about people, culture and leadership: everything you need to design the org that makes the product. A weekly newsletter by Oren Ellenbogen with the best content I found

Ranked | The World's Top Companies by Revenue in 2024 💵

Friday, January 3, 2025

Walmart, Amazon, and China's State Grid generate over half a trillion dollars in annual revenue, driven by their vast global presence. View Online | Subscribe | Download Our App FEATURED STORY

Issue #574: Web gaming strikes back, Doom Captcha, and Phaser Box2D

Friday, January 3, 2025

View this email in your browser Issue #574 - January 3rd 2025 Weekly newsletter about Web Game Development. If you have anything you want to share with our community please let me know by replying to

Could AI make you a billionaire?

Friday, January 3, 2025

Siri's secret recordings; Is streaming still worth it?; Transform your doodles with AI -- ZDNET ZDNET Tech Today - US January 3, 2025 lm-email-verifaction-tool Could AI make you a billionaire in

⚙️ The grid can't handle AI

Friday, January 3, 2025

Plus: Anthropic's guardrails ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌