, ,

Breaking down online shopping’s silent threat

Application Programming Interfaces (APIs) have long served as the invisible backbone of online retail. They empower retailers to seamlessly integrate the intricate web of ecommerce systems, orchestrating everything from payment processing to shipping logistics and inventory management. This interconnectedness, however, has also made the retail sector a lucrative target for threat actors. Facing a barrage of 19 billion malicious API requests in 2023 alone, retailers suffered relentless attempts to exploit vulnerabilities in any link of the API chain, potentially leading to data theft, operational disruption, or financial damage.

Back-to-school season is prime time for threat actors. Retailers have recognized this for years, typically amping up security during peak buying times. However, this approach is no longer foolproof. Sophisticated attackers launch “attack runs” earlier in the year to lay the groundwork for seasonal sales, effectively circumventing retailers' security lockdowns.

Playing the long game

In the past, threat actors favored “smash and grab” cybercrime: simple, opportunistic schemes targeting readily accessible vulnerabilities. Today, however, they're evolving. Investing more time and resources in stealth, they spread attacks over longer periods, aiming to fly under the radar and inflict greater damage at peak times.

Threat actors are outsmarting security lockdowns by creating high volumes of valid accounts via standard APIs earlier in the year. This calculated move aims to establish trust and credibility within the market, fostering increased social sharing and expanded reach far ahead of peak shopping seasons. Threat actors employ sophisticated tooling and automation to bolster the accounts' legitimacy to mimic normal user activity, including communication with other accounts, liking content, and subscribing to services. 

However, the sheer scale of these operations often surpasses human capabilities, raising red flags. The resulting inundation of activity crowds out legitimate users and jeopardizes the company's and its marketplace's integrity. This type of attack exemplifies modern retail attacks' meticulous planning and persistence.

Beyond the long game, threat actors frequently deploy a real-time tactic: account takeovers (ATOs). Instead of spending time crafting thousands of “legitimate” accounts, ATOs involve targeting and seizing control of existing customer accounts, offering a much faster path to success. This threat is constant, but unsurprisingly, activity surges during the peak shopping periods, with a staggering 410-fold increase in ATOs during the second half of the year.

Bot attacks remain a threat

Another tried-and-true tactic in the retailer's digital battlefield is the ever-evolving bot attack. Remember the concert ticket frenzy or the fleeting TikTok trends snatched up by automated scripts? These are just the tip of the iceberg. The ease with which bots manipulate systems is alarming: detailed Reddit threads, how-to guides, and even “top bot” rankings readily proliferate online. The numbers paint a stark picture: of 154 billion API requests, a staggering 22 billion originated from bots.

Here's how these bot attacks unfold: Threat actors leverage tooling and automation to flood the system with a high volume of actions. They add large quantities of in-demand items to their carts to corner the market and block legitimate customers from purchasing. Successful attacks result in attackers reselling these items elsewhere at exorbitant markups, further fueling customer and seller frustration.

What can retailers do to prepare

The old model of scrambling to tighten cybersecurity before large sales won't suffice anymore. As threat actors prepare well in advance, retailers must do the same. Establishing a comprehensive and year-round security strategy is essential to effectively combat the surge of fake accounts and other threats during peak seasons.

Given the vital role of APIs in the retail industry, companies must fully grasp their usage and implement comprehensive defensive strategies. Exposed and unmanaged APIs, or shadow APIs, are seen as low-hanging fruit to threat actors employing the “smash and grab” tactics. Visibility is paramount in the realm of API security. By diligently cataloging internal and external APIs, retailers can gain a comprehensive view of the entire attack surface, empowering them to enforce compliance with security standards across every API. This comprehensive visibility is crucial to effectively defend against rapid attacks and more insidious long-game maneuvers, safeguarding retail operations and fortifying customer trust.

We list the best payment gateway.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

https://www.techradar.com/pro/breaking-down-online-shoppings-silent-threat


Leave a Reply

Your email address will not be published. Required fields are marked *

August 2024
M T W T F S S
 1234
567891011
12131415161718
19202122232425
262728293031  

About Us

Welcome to encircle News! We are a cutting-edge technology news company that is dedicated to bringing you the latest and greatest in everything tech. From automobiles to drones, software to hardware, we’ve got you covered.

At encircle News, we believe that technology is more than just a tool, it’s a way of life. And we’re here to help you stay on top of all the latest trends and developments in this ever-evolving field. We know that technology is constantly changing, and that can be overwhelming, but we’re here to make it easy for you to keep up.

We’re a team of tech enthusiasts who are passionate about everything tech and love to share our knowledge with others. We believe that technology should be accessible to everyone, and we’re here to make sure it is. Our mission is to provide you with fun, engaging, and informative content that helps you to understand and embrace the latest technologies.

From the newest cars on the road to the latest drones taking to the skies, we’ve got you covered. We also dive deep into the world of software and hardware, bringing you the latest updates on everything from operating systems to processors.

So whether you’re a tech enthusiast, a business professional, or just someone who wants to stay up-to-date on the latest advancements in technology, encircle News is the place for you. Join us on this exciting journey and be a part of shaping the future.

Podcasts

TWiT 992: Why Not Pudding? – Google's Monopoly, Net Neutrality, AI Phishing This Week in Tech (Audio)

Former YouTube CEO Susan Wojcicki dies after 2 years with lung cancer Google (GOOGL) Loses DOJ Antitrust Suit Over Search Engine on Phone Browsers Will Google's historic monopoly lawsuit be the death knell for Mozilla and Firefox? Google pulls Olympics AI ad 'Dear Sydney' Brands should avoid this popular term. It's turning off customers US court blocks Biden administration net neutrality rules The KOSA Internet Censorship Bill Just Passed The Senate—It's Our Last Chance To Stop It Judge tosses challenge to Louisiana's age verification law aimed at porn websites CNET to Be Sold to Ziff Davis in Sign of Possible Media Deals to Come Intel announces two extra years of warranty amid chip crashing and instability issues — longer warranty applies to 13th- and 14th-Gen Core processors Canadian news engagement down significantly one year after Meta's ban: study Microsoft's AI Can Be Turned Into an Automated Phishing Machine 'The Godmother of AI' says California's well-intended AI bill will harm the U.S. ecosystem Scoop: X files antitrust lawsuit against ad industry group GARM Scientists Say Secret to Fusion May Lie in Hellmann's Mayonnaise Host: Leo Laporte Guests: Abrar Al-Heeti, Shoshana Weissmann, and Andrew Chow Download or subscribe to this show at https://twit.tv/shows/this-week-in-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: ziprecruiter.com/twit mintmobile.com/twit bitwarden.com/twit expressvpn.com/twit NetSuite.com/TWIT
  1. TWiT 992: Why Not Pudding? – Google's Monopoly, Net Neutrality, AI Phishing
  2. TWiT 991: This Show Is Securities Fraud – Intel Layoffs, KOSA, Don Lemon
  3. TWiT 990: Dogecoin Fort Knox – AI Cheese, SearchGPT, "Free" Facebook
  4. TWiT 989: Executive Laundry Folding Disorder – Crowdstrike, Prime Day, Streaming the Olympics
  5. TWiT 988: Flaming Corn Maze – AT&T Breach, Galaxy Z Fold6, Olympic Disinfo