{"id":363294,"date":"2025-09-18T10:40:40","date_gmt":"2025-09-18T14:40:40","guid":{"rendered":"https:\/\/tech.co\/?p=363294"},"modified":"2025-09-18T10:40:40","modified_gmt":"2025-09-18T14:40:40","slug":"massive-api-cyber-attack-spike-observed","status":"publish","type":"post","link":"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed","title":{"rendered":"40,000+ API-Based Cyberattacks Identified in Massive 2025 Spike"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column]\n<\/p><div class=\"verdict-box inform-box\" data-eventcategory=\"verdictbox\" data-component=\"verdict-box\" data-total-positions=\"3\">\n\n <div class=\"verdict-box-wrap inform-box-wrap\">\n <h3 class=\"verdict-box-title\">Key Takeaways<\/h3>\n \n <div class=\"verdict-box-info\">\n<ul>\n<li>A new report from Thales has identified a massive spike in API-based cyberattacks, with <strong>more than 40,000 detected<\/strong> across 4,000 environments in the first half of 2025.<\/li>\n<li>APIs enable two pieces of software to talk to each other, and they&rsquo;re<strong> an integral technology component<\/strong> of modern business.<\/li>\n<li>Data is still the most desirable asset for cybercriminals, with access to information <strong>targeted in 37% of cases<\/strong>.<\/li>\n<li>Overwhelmingly, bots are now <strong>targeting APIs<\/strong> &mdash; despite API-based attacks making up a relatively small fraction of overall cyberattacks.<\/li>\n<li>Businesses face a race against time to <strong>improve their defenses<\/strong> &mdash; or they could pay a heavy price.<\/li>\n<\/ul>\n<p>\n<\/p><\/div>\n <\/div>\n\n <div class=\"verdict-box-footer inform-box-buttons\">\n <div class=\"container\">\n <div class=\"row\">\n <\/div>\n <\/div>\n <\/div>\n\n<\/div>\n[vc_column_text css=&rdquo;&rdquo;]There&rsquo;s been an alarming surge in API-based cyberattacks during the first half of 2025, with researchers from Thales observing more than 40,000 such incidents across 4,000 monitored environments since the start of the year.\n<p>APIs are becoming the preferred attack vector of cybercriminals because they can be fully automated, meaning that attackers can execute millions of malicious requests with ease. The attacks in question are often highly sophisticated in nature, and thus, harder to detect and deter.<\/p>\n<p>Security experts face an unprecedented challenge. In 2025, the threat landscape is constantly shifting, with bad actors deploying new and increasingly complex methods to dupe unsuspecting businesses and individuals. And with most institutions <a href=\"https:\/\/tech.co\/news\/study-workplace-phishing-tests-success-rate\"><strong>woefully underprepared<\/strong><\/a> for this worsening situation, things could get a lot worse before they start getting better.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&rdquo;2\/3&Prime;][vc_column_text css=&rdquo;&rdquo;]<\/p>\n<h2>More Than 40,000 API-Based Attacks Have Been Detected<\/h2>\n<p>New research from Thales finds that over 40,000 API-based cyberattacks have been detected since the start of the year, heralding a massive spike in attacks of this kind. Examining over 4,000 different environments during the first half of 2025, the <em>API Threat Landscape Report&nbsp;<\/em>concludes that APIs are the new attack vector of choice for many cybercriminals.<\/p>\n<p>APIs, or application programming interfaces, enable two different pieces of software to communicate with one another. They&rsquo;re the bedrock of modern technology organizations &mdash; and thus particularly valuable targets for illicit actors.[\/vc_column_text][\/vc_column][vc_column width=&rdquo;1\/3&Prime;]<\/p><p>&nbsp;<\/p>\n<p style=\"text-align: center\"><a class=\"js-aw-brand-link\" href=\"https:\/\/compare.tech.co\/software-deals-live\/\" data-feed=\"XuPuf49GEEm4y0PaIQDZ0dEjkEf760Vv\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-333457\" src=\"https:\/\/images.tech.co\/wp-content\/uploads\/2024\/06\/18114043\/About-Techco-video.jpg\" alt=\"About Tech.co Video Thumbnail Showing Lead Writer Conor Cawley Smiling Next to Tech.co Logo\" width=\"200\" height=\"200\"><\/a><strong>This just in! View<\/strong><br>\n<strong><a href=\"https:\/\/compare.tech.co\/software-deals-live\/\">the top business tech deals<\/a> for 2026 &#128104;&zwj;&#128187;<br>\n<\/strong><a class=\"js-aw-brand-link\" href=\"https:\/\/compare.tech.co\/software-deals-live\/\" data-feed=\"XuPuf49GEEm4y0PaIQDZ0dEjkEf760Vv\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-348272 aligncenter\" src=\"https:\/\/images.tech.co\/wp-content\/uploads\/2024\/09\/09122654\/ok-1.png\" alt=\"See the list button\" width=\"200\" height=\"85\"><\/a><\/p>\n[\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&rdquo;&rdquo;]What&rsquo;s more, targeting APIs doesn&rsquo;t require the same degree of human interaction, so attackers can launch fully automated campaigns to execute a high volume of malicious requests with minimal involvement.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&rdquo;&rdquo;]\n<h2>Findings Indicate That Attack Vectors Are Shifting<\/h2>\n<p>Among the other findings, the Thales report concludes that data is still king, with <strong>cybercriminals seeking data access in 37% of cases<\/strong>. The next most popular targets are checkout and payment (32%) and authentication (16%).<\/p>\n<p>The report also finds that attackers are harnessing bot activity to carry out an extraordinarily high portion of their campaigns. According to the data, 44% of &ldquo;advanced bot activity&rdquo; now targets APIs &mdash; despite API-based attacks comprising just 14% of all attacks. This disproportionate focus suggests that they recognize that APIs represent a potential goldmine &mdash; and points to a future in which they double down on their efforts.<\/p>\n<p>What&rsquo;s more, Thales researchers observed situations in which individual campaigns were able to generate application-layer distributed <a href=\"https:\/\/tech.co\/news\/what-ddos-attack-how-prevent\"><strong>denial-of-service attacks<\/strong><\/a> that reached 15 million requests per second. In other words, today&rsquo;s bad actors are exhibiting a high level of ambition and coordination in their campaigns.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&rdquo;&rdquo;]<\/p>\n<h2>Cybersecurity Landscape Going From Bad to Worse<\/h2>\n<p>It&rsquo;s a tough time to be a cybersecurity employee. Week after week, the evidence grows that attacks are becoming more frequent and harder to detect. It was recently reported that attempted <a href=\"https:\/\/tech.co\/news\/cyberattacks-us-education-sector-rise\"><strong>breaches of educational facilities<\/strong><\/a> were on the rise, while at the same time, scammers are <a href=\"https:\/\/tech.co\/news\/scammers-impersonating-cyber-crime-agents\"><strong>impersonating cybercrime agents<\/strong><\/a> themselves.<\/p>\n<p>To make matters worse, the business world is unable to cope with this surge in illicit activity. Insufficient cybersecurity budgets, coupled with a yawning talent gap, have stranded many companies with a problem that is becoming harder and harder to cope with.<\/p>\n<p>A good place to start is upskilling your existing workforce. As our own research indicates, there&rsquo;s a shocking lack of cybersecurity acumen across the tech landscape, with <a href=\"https:\/\/tech.co\/news\/bosses-cant-identify-phishing-scams\"><strong>98% of senior leaders<\/strong><\/a> unable to identify all the signs of a phishing scam. One thing is certain: the current situation is unsustainable, and without drastic action, the results could be catastrophic.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A new report from Thales has found that API-based cyberattacks have spiked in the first half of 2025.<\/p>\n","protected":false},"author":9765,"featured_media":363295,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"single-sidebar.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-363294","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","col-12"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Report: Massive Spike in API-Based Cyberattacks in 2025<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Report: Massive Spike in API-Based Cyberattacks in 2025\" \/>\n<meta property=\"og:description\" content=\"A new report from Thales has found that API-based cyberattacks have spiked in the first half of 2025.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed\" \/>\n<meta property=\"og:site_name\" content=\"Tech.co\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-18T14:40:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.tech.co\/wp-content\/uploads\/2025\/09\/18064552\/AdobeStock_1641769920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gus Mallett\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gus Mallett\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed#article\",\"isPartOf\":{\"@id\":\"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed\"},\"author\":{\"name\":\"Gus Mallett\",\"@id\":\"https:\/\/tech.co\/#\/schema\/person\/6c045f5fc6b965203e457d019be8d668\"},\"headline\":\"40,000+ API-Based Cyberattacks Identified in Massive 2025 Spike\",\"datePublished\":\"2025-09-18T14:40:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed\"},\"wordCount\":764,\"image\":{\"@id\":\"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed#primaryimage\"},\"thumbnailUrl\":\"https:\/\/images.tech.co\/wp-content\/uploads\/2025\/09\/18064552\/AdobeStock_1641769920.jpg\",\"keywords\":[\"Privacy and Security\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2025\",\"copyrightHolder\":{\"@id\":\"https:\/\/tech.co\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed\",\"url\":\"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed\",\"name\":\"Report: Massive Spike in API-Based Cyberattacks in 2025\",\"isPartOf\":{\"@id\":\"https:\/\/tech.co\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed#primaryimage\"},\"thumbnailUrl\":\"https:\/\/images.tech.co\/wp-content\/uploads\/2025\/09\/18064552\/AdobeStock_1641769920.jpg\",\"datePublished\":\"2025-09-18T14:40:40+00:00\",\"author\":{\"@id\":\"https:\/\/tech.co\/#\/schema\/person\/6c045f5fc6b965203e457d019be8d668\"},\"breadcrumb\":{\"@id\":\"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed#primaryimage\",\"url\":\"https:\/\/images.tech.co\/wp-content\/uploads\/2025\/09\/18064552\/AdobeStock_1641769920.jpg\",\"contentUrl\":\"https:\/\/images.tech.co\/wp-content\/uploads\/2025\/09\/18064552\/AdobeStock_1641769920.jpg\",\"width\":1920,\"height\":960,\"caption\":\"Person working at laptop with data breach on screen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tech.co\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"40,000+ API-Based Cyberattacks Identified in Massive 2025 Spike\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tech.co\/#website\",\"url\":\"https:\/\/tech.co\/\",\"name\":\"Tech.co\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tech.co\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tech.co\/#\/schema\/person\/6c045f5fc6b965203e457d019be8d668\",\"name\":\"Gus Mallett\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tech.co\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f0bdaea7a3ca5dc0e1780575ff2129c3edd8001d56277ea5a8202b101515cccc?s=96&d=blank&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f0bdaea7a3ca5dc0e1780575ff2129c3edd8001d56277ea5a8202b101515cccc?s=96&d=blank&r=pg\",\"caption\":\"Gus Mallett\"},\"description\":\"Gus is a Senior Writer at Tech.co. Since completing his studies, he has pursued a career in fintech and technology writing which has involved writing reports on subjects including web3 and inclusive design. His work has featured extensively on 11:FS, The Fold Creative, and Morocco Bound Review. Outside of Tech.co, he has an avid interest in US politics and culture.\",\"url\":\"https:\/\/tech.co\/author\/gus-mallett\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Report: Massive Spike in API-Based Cyberattacks in 2025","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed","og_locale":"en_US","og_type":"article","og_title":"Report: Massive Spike in API-Based Cyberattacks in 2025","og_description":"A new report from Thales has found that API-based cyberattacks have spiked in the first half of 2025.","og_url":"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed","og_site_name":"Tech.co","article_published_time":"2025-09-18T14:40:40+00:00","og_image":[{"width":1920,"height":960,"url":"https:\/\/images.tech.co\/wp-content\/uploads\/2025\/09\/18064552\/AdobeStock_1641769920.jpg","type":"image\/jpeg"}],"author":"Gus Mallett","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Gus Mallett","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed#article","isPartOf":{"@id":"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed"},"author":{"name":"Gus Mallett","@id":"https:\/\/tech.co\/#\/schema\/person\/6c045f5fc6b965203e457d019be8d668"},"headline":"40,000+ API-Based Cyberattacks Identified in Massive 2025 Spike","datePublished":"2025-09-18T14:40:40+00:00","mainEntityOfPage":{"@id":"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed"},"wordCount":764,"image":{"@id":"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed#primaryimage"},"thumbnailUrl":"https:\/\/images.tech.co\/wp-content\/uploads\/2025\/09\/18064552\/AdobeStock_1641769920.jpg","keywords":["Privacy and Security"],"articleSection":["News"],"inLanguage":"en-US","copyrightYear":"2025","copyrightHolder":{"@id":"https:\/\/tech.co\/#organization"}},{"@type":"WebPage","@id":"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed","url":"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed","name":"Report: Massive Spike in API-Based Cyberattacks in 2025","isPartOf":{"@id":"https:\/\/tech.co\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed#primaryimage"},"image":{"@id":"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed#primaryimage"},"thumbnailUrl":"https:\/\/images.tech.co\/wp-content\/uploads\/2025\/09\/18064552\/AdobeStock_1641769920.jpg","datePublished":"2025-09-18T14:40:40+00:00","author":{"@id":"https:\/\/tech.co\/#\/schema\/person\/6c045f5fc6b965203e457d019be8d668"},"breadcrumb":{"@id":"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed#primaryimage","url":"https:\/\/images.tech.co\/wp-content\/uploads\/2025\/09\/18064552\/AdobeStock_1641769920.jpg","contentUrl":"https:\/\/images.tech.co\/wp-content\/uploads\/2025\/09\/18064552\/AdobeStock_1641769920.jpg","width":1920,"height":960,"caption":"Person working at laptop with data breach on screen"},{"@type":"BreadcrumbList","@id":"https:\/\/tech.co\/news\/massive-api-cyber-attack-spike-observed#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tech.co\/"},{"@type":"ListItem","position":2,"name":"40,000+ API-Based Cyberattacks Identified in Massive 2025 Spike"}]},{"@type":"WebSite","@id":"https:\/\/tech.co\/#website","url":"https:\/\/tech.co\/","name":"Tech.co","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tech.co\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tech.co\/#\/schema\/person\/6c045f5fc6b965203e457d019be8d668","name":"Gus Mallett","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tech.co\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f0bdaea7a3ca5dc0e1780575ff2129c3edd8001d56277ea5a8202b101515cccc?s=96&d=blank&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f0bdaea7a3ca5dc0e1780575ff2129c3edd8001d56277ea5a8202b101515cccc?s=96&d=blank&r=pg","caption":"Gus Mallett"},"description":"Gus is a Senior Writer at Tech.co. Since completing his studies, he has pursued a career in fintech and technology writing which has involved writing reports on subjects including web3 and inclusive design. His work has featured extensively on 11:FS, The Fold Creative, and Morocco Bound Review. Outside of Tech.co, he has an avid interest in US politics and culture.","url":"https:\/\/tech.co\/author\/gus-mallett"}]}},"_links":{"self":[{"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/posts\/363294","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/users\/9765"}],"replies":[{"embeddable":true,"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/comments?post=363294"}],"version-history":[{"count":0,"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/posts\/363294\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/media\/363295"}],"wp:attachment":[{"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/media?parent=363294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}