Privacy - Surge in Exposed API Keys and Machine Identities
Basically, a report shows a big increase in stolen digital keys that hackers use to access systems.
A new report reveals a significant rise in exposed API keys and machine identities. This surge affects billions of records, posing serious risks for organizations. Companies must act fast to protect their data and systems.
What Changed
A recent report from SpyCloud has unveiled a troubling trend: a 23% increase in exposed API keys and machine identities. This surge brings the total number of recaptured identity records to a staggering 65.7 billion. The report highlights how attackers are shifting their focus from traditional credentials to non-human identities (NHIs), which include API keys and session tokens. These identities are often less protected and can lead to significant security breaches.
In 2025 alone, 18.1 million exposed API keys and tokens were captured. This alarming trend indicates that cybercriminals are increasingly targeting these non-human identities, which frequently lack essential security measures like multi-factor authentication. The implications of this shift are profound, as attackers can gain persistent access to critical systems and supply chains.
How This Affects Your Data
The rise in exposed API keys and machine identities raises serious concerns for organizations. With nearly half of the 28.6 million phished identity records belonging to corporate users, the risk of identity theft is more pronounced than ever. The report also highlights the ongoing threat of session theft, with 8.6 billion stolen cookies and session artifacts recovered. These stolen items can provide attackers with unauthorized access to sensitive information and systems.
Moreover, the report points to the role of infostealer malware, which has led to the recovery of over 642.4 million credentials from 13.2 million infections. This malware continues to be a significant source of identity exposure, further complicating the landscape for cybersecurity professionals.
Who's Responsible
The responsibility for these breaches often falls on organizations that do not implement robust security measures for their non-human identities. Many of these identities have broad permissions and lack the necessary protections, making them easy targets for cybercriminals. As companies increasingly rely on cloud infrastructure and AI systems, the need for effective identity management becomes critical.
Organizations must recognize that phishing remains a major threat, as attackers continue to exploit weak points in identity management. This trend emphasizes the importance of adopting comprehensive security protocols and educating employees about the risks associated with identity exposure.
How to Protect Your Privacy
To safeguard against these threats, organizations should take immediate action. Implementing multi-factor authentication for all identities, including non-human ones, is crucial. Regularly auditing API keys and machine identities can help identify and mitigate risks before they lead to significant breaches.
Additionally, organizations should invest in advanced monitoring solutions to detect unusual activity related to identity access. Training employees on the importance of recognizing phishing attempts and securing their credentials can also reduce the likelihood of falling victim to these attacks. By prioritizing identity security, organizations can better protect themselves against the rising tide of cyber threats.
SC Media