Keamanan Digital dan Privasi di Masa Pandemi
Taro Lay
Cyber Security Evangelist
Pandemic Situation
The Ugly Pictures
Keamanan Digital dan Privasi di Masa Pandemi-Taro Lay (Director-Kalama Cyber)
The “New Normal” Challenges
“New Normal”
with Old
Paradigm
Old Problem in
“New Situation
Almost three-quarters (approximately 72%) of people forced to work
remotely through the Covid-19 coronavirus pandemic believe they are now
more conscious of their organizational cyber security policies than they were
before, but are still happy to break the rules if expedient.
The Beginning of Attack Stories
80%
of security
breaches involve
a weak or stolen
privileged
credential
85%
of cyber attacks
enter through a
compromised
endpoint
Privilege Accounts
● Organizations are facing new challenges as
they rapidly shift to support remote teams
● Passwords may be reused/shared across
multiple people and systems
● Users may install risky applications without
review or approval
● IT has less time for oversight of privileged
accounts
Application Security
Hypervisor, images (VM/Docker)
App level security (libs, code, data)
OS / Network / Physical Access
Intra-services communication (auth, azn,
TLS)
Keamanan Digital dan Privasi di Masa Pandemi-Taro Lay (Director-Kalama Cyber)
Monolithic vs Microservices
JSON Web Token (JWT)
● Based on JSON to generate
access tokens.
● Contain a header, payload, and
signature
● Every microservices can read
the data from the passed JWT
without having to validate
against any other web service.
API Security
● Where do we validate that the data we are receiving is what we expect?
● How do we ensure that we don’t leak data or exceptions?
● Where do we validate that the access tokens are the ones we expect?
● Where do we authenticate/authorize access to business data?
○ Can she/he view a resource with ID 123456 ?
● API Threat Protection
○ Content validation
○ Token validation
○ Traffic management
○ Payload security
○ Threat detection
● API Access Control
○ Access tokens management
○ Autentication
○ Authorization
○ Identity management
API Firewall API/Identity Management
OWASP Top 10 API Security (2019)
A1 Broken Object Level Authorization
A2 Broken User Authentication
A3 Excessive Data Exposure
A4 Lack of Resources & Rate Limiting
A5 Broken Function Level Authorization
A6 Mass Assignment
A7 Security Misconfiguration
A8 Injection
A9 Improper Assets Management
A10 Insufficient Logging & Monitoring
A1: Broken Object Level Authorization
Attacker substitutes ID of their
resource in API call with an ID of a
resource belonging to another user.
USE CASES
● API call parameters use IDs of resourced accessed by the API:
/api/shop1/financial_details
● Attackers replace the IDs of their resources with different ones, which they
guessed:
/api/shop2/financial_details
• The API does not check permissions and lets the call through
• Problem is aggravated if IDs can be enumerated:
/api/123/financial_details
A2: Broken Authentication
Poorly implemented API authentication
allowing attackers to assume other
users’ identities.
USE CASES
● Unprotected APIs that are considered “internal”
● Weak authentication not following industry best practices
● Weak, not rotating API keys
● Weak, plain text, encrypted, poorly hashed, shared/default passwords
● Susceptible to brute force attacks and credential stuffing
● Credentials and keys in URL
● Lack of access token validation (including JWT validation)
● Unsigned, weakly signed, non-expiring JWTs
A3: Excessive Data Exposure
API exposing a lot more data than the
client legitimately needs, relying on the
client to do the filtering. Attacker goes
directly to the API and has it all.
USE CASES
● APIs return full data objects as they are stored by the database
● Client application shows only the data that user needs to see
● Attacker calls the API directly and gets sensitive data
A4: Lack Of Resources & Rate Limiting
API is not protected against an
excessive amount of calls or payload
sizes.
Attackers use that for DoS and brute
force attacks.
USE CASES
● Attacker overloading the API
● Excessive rate of requests
● Request or field sizes
● “Zip bombs”
A5: Broken Function Level Authorization
API relies on client to use user level or
admin level APIs. Attacker figures out
the “hidden” admin API methods and
invokes them directly.
USE CASES
● Some administrative functions are exposed as APIs
● Non-privileged users can access these functions if they
● know how
● Can be a matter of knowing the URL, using a different
● verb or parameter
A6: Mass Assignment
USE CASES
● API working with the data structures
● Received payload is blindly transformed into an object and stored
● Attackers can guess the fields by looking at the GET request data
A7: Broken Function Level Authorization
Poor configuration of the API servers
allows attackers to exploit them.
USE CASES
● Unpatched systems
● Unprotected files and directories
● Unhardened images
● Missing, outdated, misconfigured TLS
● Exposed storage or server management panels
● Missing CORS policy or security headers
● Error messages with stack traces
● Unnecessary features enabled
A8: Injection
Attacker constructs API calls that
include SQL-, NoSQL-, LDAP-, OS- and
other commands that the API or
backend behind it blindly executes.
USE CASES
● Attackers send malicious input to be forwarded to an internal interpreter:
●SQL, NoSQL
●LDAP
●OS commands
●XML parsers
●Object-Relational Mapping (ORM)
A9: Improper Assets Management
Attacker finds non-production versions
of the API: such as staging, testing, beta
or earlier versions - that are not as well
protected, and uses those to launch the
attack.
USE CASES
● DevOps, cloud, containers, make having multiple deployments easy (Dev, Test,
Branches, Staging, Old versions)
● Desire to maintain backward compatibility forces to leave old APIs running
● Old or non-production versions are not properly maintained
● These endpoints still have access to production data
● Once authenticated with one endpoint, attacker may switch to the other
A10: Insufficient Logging & Monitoring
Lack of proper logging, monitoring, and
alerting let attacks go unnoticed.
USE CASES
● Lack of logging, monitoring, alerting allow attackers to go unnoticed
● Logs are not protected for integrity
● Logs are not integrated into Security Information and Event Management
● (SIEM) systems
● Logs and alerts are poorly designed
● Companies rely on manual rather than automated systems
The attack
Account take over for any Uber account from a phone number
The Breach
None. This was a bug bounty.
Core Issues
First Data leakage : driver internal UUID exposed through error message!
Uber (Sept 2019)
A2
A3
A4
A5
A6
A10
A9
A8
A7
A1
https://appsecure.security/blog/how-i-could-have-hacked-your-uber-account
Hacker can access any driver, user, partner profile if they know the UUID
Second Data leakage via the getConsentScreenDetails operation: full account information is returned,
when only a few fields are used by the UI. This includes the mobile token used to login onto the
account
A2
A3
A4
A5
A6
A10
A9
A8
A7
A1Equifax 2017
https://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html
The attack
Remote command injection attack: server executes commands written in ONGL language when a Content-Type
validation error is raised.
Can also be exploited using the Content-Disposition or Content-Length headers
The Breach
One of the most important in history: 147 millions people worldwide, very sensitive data
Equifax got fined $700 million in Sept 2019
Core Issues
Remote command injection vulnerability in Apache Struts widely exploited during months.
Conclusion
● Micro segmentation
● Segregation of duty
● Privilege account management
● Open API and API Contract
Contact:
Taro Lay
email: tarolay@kalama.id
whatsapp: +62 811 189788

More Related Content

PPTX
Kentico 8 EMS API Deep Dive
PPTX
Dog Food Con 2015 Integrate & Automate CMS Deployments
PPTX
How to Wield Kentico 9 in the Real World
PPTX
Introduction to microservices
PPTX
Architecting Reliability and Visibility into Integrations at Airbnb
PPTX
Kentico Connection 2014 Boston Upgrade Like a Pro
PPTX
Architecting Microservices in .Net
PDF
Top Legacy Sins
Kentico 8 EMS API Deep Dive
Dog Food Con 2015 Integrate & Automate CMS Deployments
How to Wield Kentico 9 in the Real World
Introduction to microservices
Architecting Reliability and Visibility into Integrations at Airbnb
Kentico Connection 2014 Boston Upgrade Like a Pro
Architecting Microservices in .Net
Top Legacy Sins

What's hot (20)

PDF
#JaxLondon keynote: Developing applications with a microservice architecture
PDF
Infrastructure for Continuous Delivery & Microservices: PaaS or Docker?
PPTX
Building microservices sample application
PPTX
Integration-Monday-Serverless-Slackbots-with-Azure-Durable-Functions
PPTX
Microservices - Event-driven & the hidden landmines
PDF
Lightening Talk @Symfony Conference 2016
PPTX
The 7 deadly sins of micro services
PDF
70-534: ARCHITECTING MICROSOFT AZURE SOLUTIONS
PDF
Serverless Architecture
PPTX
The Microservices world in. NET Core and. NET framework
PDF
Reactive Architecture
PPT
A journey from monolith to micro services
PDF
Modern Software Architecture - Cloud Scale Computing
PDF
Mule soft mcia-level-1 Dumps
PPT
Agile Development From A Developers Perspective
PDF
MuleSoft Surat Virtual Meetup#6 - MuleSoft API Led Connectivity, SEDA and MUn...
PDF
Istio as an Enabler for Migrating Monolithic Applications to Microservices v1.3
PDF
WSO2Con EU 2016: Identity Management – A Cornerstone for the Connected Enter...
PDF
Microservices: Architecture for Agile Software Development
PPTX
Building a Web Frontend with Microservices and NGINX Plus
#JaxLondon keynote: Developing applications with a microservice architecture
Infrastructure for Continuous Delivery & Microservices: PaaS or Docker?
Building microservices sample application
Integration-Monday-Serverless-Slackbots-with-Azure-Durable-Functions
Microservices - Event-driven & the hidden landmines
Lightening Talk @Symfony Conference 2016
The 7 deadly sins of micro services
70-534: ARCHITECTING MICROSOFT AZURE SOLUTIONS
Serverless Architecture
The Microservices world in. NET Core and. NET framework
Reactive Architecture
A journey from monolith to micro services
Modern Software Architecture - Cloud Scale Computing
Mule soft mcia-level-1 Dumps
Agile Development From A Developers Perspective
MuleSoft Surat Virtual Meetup#6 - MuleSoft API Led Connectivity, SEDA and MUn...
Istio as an Enabler for Migrating Monolithic Applications to Microservices v1.3
WSO2Con EU 2016: Identity Management – A Cornerstone for the Connected Enter...
Microservices: Architecture for Agile Software Development
Building a Web Frontend with Microservices and NGINX Plus
Ad

Similar to Keamanan Digital dan Privasi di Masa Pandemi-Taro Lay (Director-Kalama Cyber) (20)

PDF
OWASP API Security Top 10 - API World
PPTX
API Security Fundamentals
PDF
API Vulnerabilties and What to Do About Them
PDF
API Security Best Practices and Guidelines
PDF
APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...
PDF
apidays LIVE LONDON - Protecting financial-grade APIs - Getting the right API...
PDF
apidays LIVE Paris - Protecting financial grade API: adopting the right secur...
PDF
Guidelines to protect your APIs from threats
PDF
2022 apidays LIVE Helsinki & North_Future proofing API Security
PDF
APIdays London 2019 - API Security Tips for Developers with Isabelle Mauny, 4...
PDF
Black and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
PDF
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
PDF
apidays New York 2023 - A decade of API breaches, courtesy of application fla...
PPTX
How-to-Secure-APIs-to-Defend-Against-Emerging-Cyber-Threats-to-Digital-Web-As...
PDF
OWASP API Security Top 10 Examples
PDF
Akamai_ API Security Best Practices - Real-world attacks and breaches
PPTX
Navigating the Intersection: IAM and OWASP in the Cybersecurity Landscape (Id...
PDF
APIsecure 2023 - Discovery is the Starting Point for Defending APIs, Giora En...
PDF
HowYourAPIBeMyAPI
PDF
apidays Australia 2023 - API Security Breach Analysis & Empowering Devs to M...
OWASP API Security Top 10 - API World
API Security Fundamentals
API Vulnerabilties and What to Do About Them
API Security Best Practices and Guidelines
APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...
apidays LIVE LONDON - Protecting financial-grade APIs - Getting the right API...
apidays LIVE Paris - Protecting financial grade API: adopting the right secur...
Guidelines to protect your APIs from threats
2022 apidays LIVE Helsinki & North_Future proofing API Security
APIdays London 2019 - API Security Tips for Developers with Isabelle Mauny, 4...
Black and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
apidays New York 2023 - A decade of API breaches, courtesy of application fla...
How-to-Secure-APIs-to-Defend-Against-Emerging-Cyber-Threats-to-Digital-Web-As...
OWASP API Security Top 10 Examples
Akamai_ API Security Best Practices - Real-world attacks and breaches
Navigating the Intersection: IAM and OWASP in the Cybersecurity Landscape (Id...
APIsecure 2023 - Discovery is the Starting Point for Defending APIs, Giora En...
HowYourAPIBeMyAPI
apidays Australia 2023 - API Security Breach Analysis & Empowering Devs to M...
Ad

More from DicodingEvent (20)

PDF
Developer Coaching #114.pdf
PDF
Ask Us Anything about Studi Independen Bersertifikat Kampus Merdeka X Dicodin...
PPTX
tantangan menjadi developer di abad 21
PDF
Mengenalkan augmented reality (ar) pada snapchat
PDF
Membangun Aplikasi Serverless di Platfrom AWS
PDF
IDCamp X Madrasah: Pengenalan Computational Thinking
PDF
Membuat Produk Digital Terbaik ala Startup Unicorn
PDF
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
PDF
TechTalk 2021: Peningkatan Performa Software Delivery dengan CI/CD
PDF
Membuat Solusi Bermanfaat dengan Programming - Nur Rohman
PDF
Potensi karier menjadi ios developer di masa depan
PDF
Id camp x dicoding live : persiapan jadi software engineer hebat 101
PDF
Tips sukses berkarir sebagai developer dan programmer 2021
PPTX
Teknologi Baru Android di Google I/O 2021 - Andrew Kurniadi
PDF
Dicoding Developer Coaching #38: Android | 5 Library Android yang Patut Kamu ...
PDF
Dicoding Developer Coaching #37: Android | Kesalahan yang Sering Terjadi pada...
PDF
Pengantar Cloud Computing dengan AWS - Petra Novandi Barus
PDF
Dicoding Developer Coaching #36: Android | Pentingnya Performa pada Aplikasi ...
PDF
Dicoding Developer Coaching #34: Android | Modular Android App dengan Dynamic...
PDF
Dicoding Developer Coaching #35: Android | Setup Continuous Integration di An...
Developer Coaching #114.pdf
Ask Us Anything about Studi Independen Bersertifikat Kampus Merdeka X Dicodin...
tantangan menjadi developer di abad 21
Mengenalkan augmented reality (ar) pada snapchat
Membangun Aplikasi Serverless di Platfrom AWS
IDCamp X Madrasah: Pengenalan Computational Thinking
Membuat Produk Digital Terbaik ala Startup Unicorn
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
TechTalk 2021: Peningkatan Performa Software Delivery dengan CI/CD
Membuat Solusi Bermanfaat dengan Programming - Nur Rohman
Potensi karier menjadi ios developer di masa depan
Id camp x dicoding live : persiapan jadi software engineer hebat 101
Tips sukses berkarir sebagai developer dan programmer 2021
Teknologi Baru Android di Google I/O 2021 - Andrew Kurniadi
Dicoding Developer Coaching #38: Android | 5 Library Android yang Patut Kamu ...
Dicoding Developer Coaching #37: Android | Kesalahan yang Sering Terjadi pada...
Pengantar Cloud Computing dengan AWS - Petra Novandi Barus
Dicoding Developer Coaching #36: Android | Pentingnya Performa pada Aplikasi ...
Dicoding Developer Coaching #34: Android | Modular Android App dengan Dynamic...
Dicoding Developer Coaching #35: Android | Setup Continuous Integration di An...

Recently uploaded (20)

PPTX
Go Kiss the World book review presentation.pptx
PPTX
RP Virtual Session One intro to workplace readiness
PPTX
1_055gggggggggggh054_مراجعهالاختبار.pptx
PDF
Pitch Style Data Report Template Preview
PPTX
Enterprise Network Design and Implementation Project using Cisco ASA, FortiGa...
PPTX
Swadesh sapthaha - Athma Nirbhar Bharath.
PPTX
export_1a21b709-15ab-43fc-88b3-50ecde18572d.pptx
PPTX
Basics of Stereotypes and Prejudice(1).pptx
PPTX
Training for Village Watershed Volunteers.pptx
PPTX
All important rules of procedure for any upcoming MUN
PPTX
Ease_of_Paying_Taxes_Act_Presentation.pptx
PPTX
2025-08-24 Joseph 04 (shared slides).pptx
PPTX
Ruth Week 1 - Hope in Barren Places.pptx
PDF
_INVITATIONS AND REPLIES.pdffhihgushfuhug
PPTX
ECO VAULT AUTOMATIC DIAPER DISPENSER AND SHREDDER
PPTX
08mendelian-genetics-punnett-square.pptx
PPTX
Introduction to DATIS a foundation stone for ISSP in Greece
PPTX
Staff WelFare Presentation for Larger Organizations
PPTX
2025-08-31 Joseph 05 (shared slides).pptx
PDF
The History of COBSI, a Community-based Smallholder Irrigation, and its Regio...
Go Kiss the World book review presentation.pptx
RP Virtual Session One intro to workplace readiness
1_055gggggggggggh054_مراجعهالاختبار.pptx
Pitch Style Data Report Template Preview
Enterprise Network Design and Implementation Project using Cisco ASA, FortiGa...
Swadesh sapthaha - Athma Nirbhar Bharath.
export_1a21b709-15ab-43fc-88b3-50ecde18572d.pptx
Basics of Stereotypes and Prejudice(1).pptx
Training for Village Watershed Volunteers.pptx
All important rules of procedure for any upcoming MUN
Ease_of_Paying_Taxes_Act_Presentation.pptx
2025-08-24 Joseph 04 (shared slides).pptx
Ruth Week 1 - Hope in Barren Places.pptx
_INVITATIONS AND REPLIES.pdffhihgushfuhug
ECO VAULT AUTOMATIC DIAPER DISPENSER AND SHREDDER
08mendelian-genetics-punnett-square.pptx
Introduction to DATIS a foundation stone for ISSP in Greece
Staff WelFare Presentation for Larger Organizations
2025-08-31 Joseph 05 (shared slides).pptx
The History of COBSI, a Community-based Smallholder Irrigation, and its Regio...

Keamanan Digital dan Privasi di Masa Pandemi-Taro Lay (Director-Kalama Cyber)

  • 1. Keamanan Digital dan Privasi di Masa Pandemi Taro Lay Cyber Security Evangelist
  • 5. The “New Normal” Challenges
  • 7. Old Problem in “New Situation Almost three-quarters (approximately 72%) of people forced to work remotely through the Covid-19 coronavirus pandemic believe they are now more conscious of their organizational cyber security policies than they were before, but are still happy to break the rules if expedient.
  • 8. The Beginning of Attack Stories 80% of security breaches involve a weak or stolen privileged credential 85% of cyber attacks enter through a compromised endpoint
  • 9. Privilege Accounts ● Organizations are facing new challenges as they rapidly shift to support remote teams ● Passwords may be reused/shared across multiple people and systems ● Users may install risky applications without review or approval ● IT has less time for oversight of privileged accounts
  • 10. Application Security Hypervisor, images (VM/Docker) App level security (libs, code, data) OS / Network / Physical Access Intra-services communication (auth, azn, TLS)
  • 13. JSON Web Token (JWT) ● Based on JSON to generate access tokens. ● Contain a header, payload, and signature ● Every microservices can read the data from the passed JWT without having to validate against any other web service.
  • 14. API Security ● Where do we validate that the data we are receiving is what we expect? ● How do we ensure that we don’t leak data or exceptions? ● Where do we validate that the access tokens are the ones we expect? ● Where do we authenticate/authorize access to business data? ○ Can she/he view a resource with ID 123456 ?
  • 15. ● API Threat Protection ○ Content validation ○ Token validation ○ Traffic management ○ Payload security ○ Threat detection ● API Access Control ○ Access tokens management ○ Autentication ○ Authorization ○ Identity management API Firewall API/Identity Management
  • 16. OWASP Top 10 API Security (2019) A1 Broken Object Level Authorization A2 Broken User Authentication A3 Excessive Data Exposure A4 Lack of Resources & Rate Limiting A5 Broken Function Level Authorization A6 Mass Assignment A7 Security Misconfiguration A8 Injection A9 Improper Assets Management A10 Insufficient Logging & Monitoring
  • 17. A1: Broken Object Level Authorization Attacker substitutes ID of their resource in API call with an ID of a resource belonging to another user. USE CASES ● API call parameters use IDs of resourced accessed by the API: /api/shop1/financial_details ● Attackers replace the IDs of their resources with different ones, which they guessed: /api/shop2/financial_details • The API does not check permissions and lets the call through • Problem is aggravated if IDs can be enumerated: /api/123/financial_details
  • 18. A2: Broken Authentication Poorly implemented API authentication allowing attackers to assume other users’ identities. USE CASES ● Unprotected APIs that are considered “internal” ● Weak authentication not following industry best practices ● Weak, not rotating API keys ● Weak, plain text, encrypted, poorly hashed, shared/default passwords ● Susceptible to brute force attacks and credential stuffing ● Credentials and keys in URL ● Lack of access token validation (including JWT validation) ● Unsigned, weakly signed, non-expiring JWTs
  • 19. A3: Excessive Data Exposure API exposing a lot more data than the client legitimately needs, relying on the client to do the filtering. Attacker goes directly to the API and has it all. USE CASES ● APIs return full data objects as they are stored by the database ● Client application shows only the data that user needs to see ● Attacker calls the API directly and gets sensitive data
  • 20. A4: Lack Of Resources & Rate Limiting API is not protected against an excessive amount of calls or payload sizes. Attackers use that for DoS and brute force attacks. USE CASES ● Attacker overloading the API ● Excessive rate of requests ● Request or field sizes ● “Zip bombs”
  • 21. A5: Broken Function Level Authorization API relies on client to use user level or admin level APIs. Attacker figures out the “hidden” admin API methods and invokes them directly. USE CASES ● Some administrative functions are exposed as APIs ● Non-privileged users can access these functions if they ● know how ● Can be a matter of knowing the URL, using a different ● verb or parameter
  • 22. A6: Mass Assignment USE CASES ● API working with the data structures ● Received payload is blindly transformed into an object and stored ● Attackers can guess the fields by looking at the GET request data
  • 23. A7: Broken Function Level Authorization Poor configuration of the API servers allows attackers to exploit them. USE CASES ● Unpatched systems ● Unprotected files and directories ● Unhardened images ● Missing, outdated, misconfigured TLS ● Exposed storage or server management panels ● Missing CORS policy or security headers ● Error messages with stack traces ● Unnecessary features enabled
  • 24. A8: Injection Attacker constructs API calls that include SQL-, NoSQL-, LDAP-, OS- and other commands that the API or backend behind it blindly executes. USE CASES ● Attackers send malicious input to be forwarded to an internal interpreter: ●SQL, NoSQL ●LDAP ●OS commands ●XML parsers ●Object-Relational Mapping (ORM)
  • 25. A9: Improper Assets Management Attacker finds non-production versions of the API: such as staging, testing, beta or earlier versions - that are not as well protected, and uses those to launch the attack. USE CASES ● DevOps, cloud, containers, make having multiple deployments easy (Dev, Test, Branches, Staging, Old versions) ● Desire to maintain backward compatibility forces to leave old APIs running ● Old or non-production versions are not properly maintained ● These endpoints still have access to production data ● Once authenticated with one endpoint, attacker may switch to the other
  • 26. A10: Insufficient Logging & Monitoring Lack of proper logging, monitoring, and alerting let attacks go unnoticed. USE CASES ● Lack of logging, monitoring, alerting allow attackers to go unnoticed ● Logs are not protected for integrity ● Logs are not integrated into Security Information and Event Management ● (SIEM) systems ● Logs and alerts are poorly designed ● Companies rely on manual rather than automated systems
  • 27. The attack Account take over for any Uber account from a phone number The Breach None. This was a bug bounty. Core Issues First Data leakage : driver internal UUID exposed through error message! Uber (Sept 2019) A2 A3 A4 A5 A6 A10 A9 A8 A7 A1 https://appsecure.security/blog/how-i-could-have-hacked-your-uber-account Hacker can access any driver, user, partner profile if they know the UUID Second Data leakage via the getConsentScreenDetails operation: full account information is returned, when only a few fields are used by the UI. This includes the mobile token used to login onto the account
  • 28. A2 A3 A4 A5 A6 A10 A9 A8 A7 A1Equifax 2017 https://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html The attack Remote command injection attack: server executes commands written in ONGL language when a Content-Type validation error is raised. Can also be exploited using the Content-Disposition or Content-Length headers The Breach One of the most important in history: 147 millions people worldwide, very sensitive data Equifax got fined $700 million in Sept 2019 Core Issues Remote command injection vulnerability in Apache Struts widely exploited during months.
  • 29. Conclusion ● Micro segmentation ● Segregation of duty ● Privilege account management ● Open API and API Contract