Zombie APIs: the resident evil in too many businesses
Many zombie films convey the message that the real monsters are not the shambling horde outside but right here among us. Fear, mistrust, betrayal, bad decisions…that's what leads to everyone being picked off one at a time.
The same can be said with Zombie APIs. Okay, maybe not fear, mistrust and betrayal, but bad decisions certainly contribute to unused, abandoned APIs offering a route for threat actors looking to breach a perimeter.
The State of API Security Q1 2023 report from Salt Labs shows the magnitude of this problem. The use of Zombie APIs in cyberattacks is four times as common as it was six months ago and is increasingly seen by attackers as an easy way in. It's vital that businesses identify this problem and shore up their defences. But what exactly is a Zombie API?
They're coming to get you, Barbara
APIs are indispensable, powerful interfaces that connect our world and mean we can share data in simple, streamlined ways. The creation of Open Banking APIs in the UK is just one example, allowing new fintechs to flourish and giving consumers new ways to link up their different financial products. Remote and hybrid working has also had an effect on the number of APIs, thanks to an increased need for software integration.
The usefulness of the APIs means they are more widespread than many people realise. According to Noname Security, the average organisation uses more than 15,000, and this number increases to 25,000 for large enterprises.
It's a seemingly impossible number, and that's for good reason—a much smaller number of APIs are in active use. Some may be used for testing, others for abandoned projects, and many others are simply forgotten about once they are no longer needed or have been supplanted by another. This isn't unusual—many businesses that have been around a while have documents or code hanging around on servers that are no longer needed.
Aside from taking up space, these vestiges aren't usually a problem, but APIs are different, designed to allow open communication between programs and often left wide open for functionality and ease of use. If not properly decommissioned, an API can be an access point, potentially to an entire system. With hundreds, or even thousands, of dormant APIs to try and exploit, it's no wonder that threat actors are 're-animating' Zombie APIs for their own advantage.
The Marsh McLennan Cyber Risk Analytics Center has estimated that API vulnerabilities cost businesses anywhere up to $75 billion annually. Clearly, businesses should be decommissioning those old APIs. What's stopping them?
Remove the head, or destroy the brain