API Security: Frontline Insights from the Vehicle SOC

SHAKED EDRI

Data Analyst Team Leader

August 1, 2024

The following content was delivered as part of a keynote during the recent APISEC CON Automotive, which focused on the impact of API security on the automotive ecosystem and highlighted the importance of ensuring safe and available APIs for the industry. A big thank you to APISEC for the opportunity to share these insights as we build a more secure and resilient future for the automotive and smart mobility ecosystem.

In the rapidly evolving automotive industry, safeguarding connected vehicles and smart mobility applications against API-based threats is paramount. Drawing from our Vehicle Security Operations Center (vSOC), this blog post delves into the critical role of vSOCs in protecting against these threats and provides practical insights into enhancing automotive API security.

The Growing Importance of vSOCs

As the automotive industry expands, so do the threats targeting connected vehicles and mobility IoT devices. Unlike traditional IT infrastructure, vehicles are constantly on the move, interacting with external systems and applications thousands of times per minute. This dynamic environment necessitates a dedicated vSOC to monitor and mitigate these unique threats effectively.

A vSOC focuses on the specific challenges of the automotive sector, protecting products such as vehicles or mobility IoT devices from cyber threats and attacks. It continuously monitors and analyzes the cybersecurity posture of vehicles and related infrastructure, aiming to detect and respond to cybersecurity threats in near real-time. By integrating systems, processes, and professional expertise, a vSOC ensures operational continuity and safety for connected vehicles and smart mobility applications.

Real-World API Threats As Seen in the vSOC

Our vSOC has encountered several API-based threats, demonstrating the need for robust API security measures. Here are some notable examples and the strategies employed to mitigate them:

Credential Stuffing Attacks

Credential stuffing involves attackers using stolen usernames and passwords from one breach to gain unauthorized access to other accounts. Our API security solution detected a spike in authentication requests, revealing an attempt to exploit reused credentials. The vSOC quickly mitigated this by blocking unsecured accounts and invalidating compromised tokens, preventing potential data leaks and unauthorized vehicle commands.

Unauthenticated API Calls

Unauthenticated API calls occur when security measures are insufficient, often due to oversight or rapid development processes. Our vSOC discovered internal APIs with unauthenticated endpoints, exposing sensitive data. Taking a shift-left approach, this risk was mitigated by requiring tokens for access.

Broken Object Level Authorization (BOLA)

BOLA exploits vulnerabilities in authorization, allowing attackers to access unauthorized data. Our vSOC identified a threat actor manipulating IDs to bypass security checks and access vehicle data. By detecting this activity and promptly addressing the vulnerability that allowed access, we prevented potential data breaches and unauthorized vehicle commands.

Enumeration Attacks

Enumeration attacks involve systematically querying a system to discover valid identifiers, like Vehicle Identification Numbers (VINs). Our vSOC detected an attacker inputting sequential VINs in an attempt to uncover user identifiers. By identifying and mitigating this attack, we protected sensitive user information and internal systems.

As the automotive industry continues to innovate, the need for robust cybersecurity measures becomes increasingly critical. By implementing a dedicated vSOC, organizations can effectively monitor and protect their vehicles and infrastructure from evolving cyber threats. Through real-world examples and mitigation strategies, we have highlighted the importance of API security and the comprehensive approach required to safeguard the future of mobility.

Newsletter Icon

The After-Sales Quality Report, Zooming in on the Power of AI

Newsletter Icon

Subscribe
to our newsletter

Stay up-to-date on the latest trends, emerging risks, and updates

The Grinch Who Stole X-MIS

2026 After-Sales Quality New Year Resolution: AI-Powered Pre-Claim Detection As the automotive industry closes another year defined by rapid innovation, software maturity, continuous focus on…

Read more

Supply Chain Cyber Risk Visibility for Automotive OEMs

Upstream AutoThreat® PRO Enables End-to-End Insight and Action As the automotive industry transitions into a software-defined, hyperconnected ecosystem, its attack surface expands exponentially across vehicles,…

Read more

On Fire, and Not in a Good Way: Predictive Quality Analytics is a Game Changer

Electric and hybrid vehicles are transforming the industry, but they’re also introducing new quality and safety challenges. As automakers push toward electrification, the complexity of…

Read more

When Cars’ Data Complains Before Drivers Do: The AI Shift from Reactive to Proactive Investigations of Vehicle Quality

Automakers are waking up to a new reality: proactive pre-claim quality detection, powered by continuous monitoring and advanced AI Automotive after-sales has traditionally operated in…

Read more