Subscribe to the Salt blog to learn about the latest developments in API Security

Blog Post

Salt Labs

Another API Security Breach: Life360

Hadar Freehling
Jul 26, 2024

It’s not always Logical

Another day, another API breach in the news. The latest breach occurred on the Life360 platform where an advisory was able to gleam 400k user phone numbers, based on the article written on Bleepingcomputer.com.

Known only by their 'emo' handle, they said the unsecured API endpoint used to steal the data provided an easy way to verify each impacted user's email address, name, and phone number.

"When attempting to login to a life360 account on Android, the login endpoint would return the first name and phone number of the user; this existed only in the API response and was not visible to the user," emo said.

"If a user had verified their phone number it would instead be returned as a partial number like +1******4830."

In other words, the attacker was able to take advantage of the API providing too much information. I’m sure that the Android development team never thought that someone would use an emulator or proxy to look at the actual traffic being returned by the API. Instead, they figured that by not displaying this information in the app, though it was in the API, they would be secure. Security by obfuscation is not good security. This would be classified as an OWASP API Top 10, #3 attack “Excessive Data Exposure.”

Breaches like this happen more often than we care to admit. Often, mobile apps leverage their environment limitations to hide data instead of preventing that data from being released in the first place. In a very similar case, an app called 3Fun (more info here) exposed the location and private pictures of its users through their API, though the mobile app did not show this information.

Salt Detection

In this specific situation, I asked our VP of security research, Yaniv Balmas, what would Salt have been able to detect.

Yaniv stated that Salt could detect one of several opportunities, but the most relevant ones would probably have been parameter enumeration (specifically enumeration that also returns sensitive data). He also stated that since this would be seen by Salt as a unique activity for this attacker that deviates from the normal user behavior, it would have triggered a Single-ID BOLA alert.  

The capability of Salt to detect and correlate this type of activity is not something easily done. It's like trying to find a needle in a stack of needles in a stay of hay in a barn full of hay. Our unique architecture and patented detection modules are the reason why we help some of the largest enterprises protect their APIs.

If you would like to learn more about Salt and how we could provide you with API discovery, governance, and protection, please contact us, schedule a demo, or check out our website.

Tags

Salt Security Blog

Sign up for the Salt Newsletter for the latest resources and blog posts.

August 28, 2024

Eric Schwake
Head of Product Marketing

Technical

Mastering API Compliance in a Regulated World

Learn about the relationship between API posture governance, API security, and the constantly changing regulatory compliance landscape.

Read more

August 23, 2024

Eric Schwake
Head of Product Marketing

Technical

The Hidden Dangers of Zombie and Shadow APIs—and Why Only Salt Security Can Tackle Them

Learn why zombie and shadow APIs are so dangerous and why Salt Security is the only solution capable of securing your entire API ecosystem

Read more

August 21, 2024

Eric Schwake
Head of Product Marketing

Technical

Hybrid API Security: The Best of Both Worlds

Salt Security's hybrid deployment option balances the advantages of SaaS and on-premises solutions.

Read more

Download this guide for advice on evaluating key capabilities in API Security

Get the guide
Back