Issue 99: API flaws in the Mercedes-Benz app and Russian inter-bank money transfer

The Latest API Security News, Vulnerabilities and Best Practices
Issue: #99
API flaws in the Mercedes-Benz app and Russian inter-bank money transfer
This week, we check out the API vulnerabilities in the Mercedes-Benz connected cars and the Russian inter-bank money transfer system. We also have the upcoming ASC 2020 conference next week, as well as a recording of IIoT Cybersecurity panel discussion from the recent IIoT World event.
Vulnerability: Mercedes-Benz car control
 

The conference Black Hat USA has posted the slides and the full research paper from the session “Security Research on Mercedes-Benz: From Hardware to Car Control” by Minrui Yan, Jiahao Li, and Guy Harpak. Too bad there’s no video recording.

Researchers got access to the backend intranet through the eSIM of a Mercedes-Benz E-Class connected car. To get connected, they had to reuse the APN settings, spoof IMEI numbers, and locate and reuse certificates. However, once they got through these hurdles and managed to established the connection, they found that the APIs themselves were not protected at all.

The researchers could issue commands to any cars of the same model in the same region (China in this case, so estimated 2 million connected cars), such as:

  • Locking or unlocking doors
  • Opening or closing the roof
  • Switching lights on or off
  • Making the car beep
  • Starting or stopping the engine (limited)

Quite a list of things, then. Lessons learned here:

  • Never trust the API client: no matter how protected your client and network are, there is a chance that someone breaks through.
  • Always implement both authentication (to prevent unauthorized access once attackers found your API) and authorization (to prevent IDOR/BOLA style scope expansion like in this case).
Vulnerability: Russian inter-bank transfer system
 

The Russian inter-bank money transfer system got hacked through the mobile app of one of the member banks.

Attackers located the vulnerable API by proxying the calls. They found that they could simply replace the source account ID parameter in money transfer calls and the backend would transfer the money, without checking whether the source account belonged to the person invoking the API.

So, how did the attackers get valid account IDs in the first place, then? To make things worse, there was another API endpoint that allowed attackers to enumerate accounts in the bank, creating a list of possible victims.

Unfortunately, the attack was identified only after the vulnerability had already been exploited, and Russian Central Bank had to send banks a warning about the attack. The story (unfortunately in Russian, so you might need Google Translate) does not contain the details on how many accounts got compromised or the total volume of funds stolen.

Storyline from a heist movie, this one. Lessons learned:

Conference: API Specification Conference
 

Next week, September 9—10, is API Specification Conference (ASC) 2020, the annual event by the OpenAPI Initiative (OAI). This year, it is all online, very reasonably priced (just $39, of which $10 goes to charity), and has lots of great content.

The conference is all about API standards: the OpenAPI Specification (OAS), RAML, Blueprint, gRPC, OData, JSON Schema, GraphQL, AsyncAPI, OAuth – and a great opportunity to meet the geniuses behind them.

This year, I found at least two security sessions on the agenda:

Video: IIoT Cybersecurity Challenges
 

Industrial Internet of Things (IIoT) is a big driver of what is now called Industry 4.0. IIoT takes automation to the next level and allows industry to become agile and scalable at unprecedented levels.

The conference IIoT World has published the recording of the IIoT cybersecurity panel discussion recorded at the event this summer. Here’s the quick abstract:

The Industry 4.0 revolution brings with it a new operational risk for connected, smart manufacturers and digital supply networks: cyber. Industrial Cybersecurity should be an integral part of the strategy, design, and operations from the beginning of any new connected, Industry 4.0–driven initiative.

In light of Industry 4.0, our expert line up of panelists will examine visibility, control, and situational awareness in relation to your cyber security strategy – and their impact on the future of digital manufacturing.

This panel, originally presented at IIoT World Days on July 1, 2020, discusses:

  • Top trends impacting today’s manufacturers security strategy
  • What are the cyber security-specific technical issues associated with Industry4.0?
  • What are the cyber security-specific training and education issues associated with Industry4.0?

The member of the panel were:

  • Joe Weiss (Moderator), PE, CISM, CRISC, ISA Fellow, IEEE Senior Member, Managing Director ISA99; Applied Control Solutions, LLC
  • Pamela Gupta, President, OutSecure, Inc.
  • Dmitry Sotnikov, Chief Product Officer, 42Crunch
  • Chuck Brooks, President, Brooks Consulting International
  • Bryan Skene, CTO and VP of Product Development, Tempered

I loved participating in the panel discussion and would recommend it to anyone interested in the cyber security aspects of IoT.

 
dmitry_apisec-1  

Dmitry Sotnikov

APIsecurity.io

 
Thanks for reading.

That's it for today. If you have any feedback or stories to share, simply reply to this email.

Please forward the newsletter to your friends and colleagues who might benefit from it.

 
42Crunch Ltd   71-75 Shelton Street  Covent Garden  London  Greater London   WC2H 9JQ   United Kingdom
You received this email because you are subscribed to API Security News from 42Crunch Ltd.

Update your email preferences to choose the types of emails you receive or Unsubscribe from all future emails  
 
 

Older messages

Issue 98: APIs as the next frontier in cybercrime

Thursday, August 27, 2020

Hi, today we look at a couple recent vulnerabilities, what makes APIs such a target, an APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #98 APIs as the next

Issue 97: How to not leak API keys

Thursday, August 20, 2020

Hi, today we look at 2 recent API vulnerabilities, a CTF breakdown, and a DEF CON talk APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #97 Gym apps & home

Issue 96: Vulnerabilities at Cisco and MGM Grand Resort 🏖️, tutorial on Chrome DevTools and pentesting with GraphQL

Thursday, August 13, 2020

Hi, today we look at a couple of API vulnerabilities and two pentesting video tutorials APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #96 Vulnerabilities at

Issue 95: Vulnerabilities at Zoom and OkCupid 💘, progress on OAuth 2.1, API Information Disclosure tutorial

Wednesday, August 5, 2020

Hi, today we look at a couple recent vulnerabilities, a video on locating leaky APIs & APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #95 Vulnerabilities at

Issue 94: Two-day API security training at Black Hat USA 🎩

Wednesday, July 29, 2020

Hi, today we look at the possible API exploit for Wordpress, new stats on WAFs and API APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #94 Two-day API security

You Might Also Like

Tuesday Triage #200 and giveaway

Tuesday, May 14, 2024

Your weekly crème de la crème of the Internet is here! The 200th edition featuring annual subscriptions giveaway, thoughts on nearly four years of ... ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

🎮 How AI Tools Are Changing Game Development — Grab a Pixel 8a Instead of Waiting for Pixel 9

Tuesday, May 14, 2024

Also: Sharing Your Google Maps Trip Progress, and More! How-To Geek Logo May 14, 2024 Did You Know In a bid to keep the ingredients secret, WD-40 was never patented. 🤖 The New GPT It's Tuesday!

Meta shuts down Workplace

Tuesday, May 14, 2024

Plus: Everything that happened at Google I/O and AWS CEO steps down View this email online in your browser By Christine Hall Tuesday, May 14, 2024 Hello, and welcome back to TechCrunch PM. The team

Flattening Lists of Lists, Python 3.13, Sets, and More

Tuesday, May 14, 2024

Flattening a List of Lists in Python #629 – MAY 14, 2024 VIEW IN BROWSER The PyCoder's Weekly Logo Flattening a List of Lists in Python In this video course, you'll learn how to flatten a list

Daily Coding Problem: Problem #1441 [Easy]

Tuesday, May 14, 2024

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Google. UTF-8 is a character encoding that maps each symbol to one, two, three, or four

Noonification: 3 Quick Ways to Optimize RecyclerView

Tuesday, May 14, 2024

Top Tech Content sent at Noon! Get Algolia: AI Search that understands How are you, @newsletterest1? 🪐 What's happening in tech today, May 14, 2024? The HackerNoon Newsletter brings the HackerNoon

Using 97 fewer cores thanks to PGO

Tuesday, May 14, 2024

Plus an HNSW indexed vector store library, a new Go game hits the Steam store, and is 'ok' ok?. | #​507 — May 14, 2024 Unsub | Web Version Together with Stytch logo Go Weekly Reclaiming CPU for

Ranked | The Top 6 Economies by Share of Global GDP (1980-2024) 📈

Tuesday, May 14, 2024

Gain a unique perspective on the world's economic order from this graphic showing percentage share of global GDP over time. View Online | Subscribe Presented by: Data that drives the

Free online event this Thursday: Getting ahead with time series data

Tuesday, May 14, 2024

Free Online Event Do you know how your competitors use time series data to get ahead? Join us on Thursday, May 16 at 10am PT/1pm ET for a free, hour-long online fireside chat called “Unleash the Full

Here's the deal

Tuesday, May 14, 2024

We wanted you to be among the first to know about our plans to relaunch the Gigantic training courses that Product Collective now powers! Here's the deal: From May 20th - May 31st, anybody that