CloudSEK, a firm which offers AI technology for combatting digital threats, said it has uncovered 3,207 apps leaking Twitter API keys that can be used to take over Twitter accounts.
One of the biggest concerns is the potential to build a bot army for spreading misinformation, malware, and spam, CloudSEK said in a report.
">CloudSEK* researchers said key findings include:
Some of those sensitive actions include reading Direct Messages, retweeting, deleting messages, liking messages, and getting account settings.
The Twitter API provides direct access to a Twitter account and OAuth tokens are used by the Twitter API for authentication. OAuth ("Open Authorization") is an open standard for authorization and is commonly used to grant API access. It works over HTTPS and authorizes devices, APIs, servers, and applications.
This standard is also used by Amazon, Google, Facebook, and Microsoft.
--How Leaked Twitter API Keys Can be Used to Build a Bot Army, CloudSEK
The vulnerability in mobile applications often is the result of an error on the part of the developer, the report said.
--CloudSEK
The valid API keys and tokens can be embedded in a script to perform a variety of attack scenarios, CloudSEK said.
Scenarios include:
Comparing July 2021 to July 2022, overall API traffic per customer grew 168%, indicating that API usage is also exploding, according to the Q3 2022 State of API Security report.
“Malicious API attack traffic surged 117% over the past year, from an average of 12.22M malicious calls per month to an average of 26.46M calls,” the report said.
Because of the growing importance of APIs to business, API security is a crucial element of an organization’s cybersecurity strategy. Despite that, organizations seem to lag in API security according to the latest API Security Report by Salt Security. Poor API authentication remains one of the top issues that facilitate attacks. API authentication and authorization rely on machine identities and API keys that can be vulnerable to theft and misuse.
“While the potential impact of this incident could significantly impact Twitter’s end-users, this type of vulnerability is one of the easiest to prevent,” said Ray Kelly, Fellow at Synopsys Software Integrity Group, a Mountain View, Calif.-based provider of integrated software solutions in a statement.
“When assessing a mobile app for security gaps, it is important to test the backend server, the network layer and in this case, the device itself. Failure to encrypt API secrets on the device is akin to wrapping your ATM card in a Post-It note with your PIN written on it,” Kelly said.
This is similar to reported issues of mistakenly leaked API keys in the past, says Yaniv Balmas, Vice President of Research at Salt Security, a Palo Alto, Calif.-based provider of API security.
But there is an important difference.
“The main difference between this case and most of the previous ones is that usually when an API key is left exposed the major risk is to the application/vendor – a good example for that will be AWS S3 API keys exposed on Github,” said Balmas.
“In this case however since users permit the mobile application to use their own Twitter accounts, the issue actually puts them at the same risk level as the application itself,” according to Balmas.
“This adds up to a long list of possible abuses and attack scenarios that are exposed due to the extensive growth of the API and SaaS domains. With such a huge growth rate, it is hard for security practitioners to keep up to speed - and I wouldn’t be surprised if we see more of these and other types of vulnerabilities emerge in the near future.”
----
NOTES:
*CloudSEK inspected the mobile apps uploaded to its BeVigil security search engine for mobile apps.
Related Posts