Cryptographic Failures, number two on OWASP’s Top 10, is one of the easiest to find real&ndashworld examples of damaging attacks. But what exactly are they and where can you start in preventing them.
🤓 Download the Cryptographic Failures cheatsheet ↓
–
01 – What are cryptographic failures?
Cryptographic failures occur when encryption, hashing, or other cryptographic methods are misused, typically leading to sensitive data exposure. These failures undermine the CIA trifecta (confidentiality, integrity, and authenticity), making it easier for attackers to steal, alter, or forge data. Also, failing to encrypt sensitive data can result in compliance violations under GDPR, PCI DSS, and HIPAA, leading to legal and financial consequences.
There are a lot of possible causes (too many to cover here), but common ones include using weak encryption algorithms, reusing or hardcoding cryptographic keys, transmitting sensitive data in plaintext (yep, it still happens), and using insecure encryption modes.
Cryptographic failures aren’t just a hypothetical risk – real-world breaches have exposed billions of records due to poor encryption practices.
–
02 – How is it exploited?
Attackers can take advantage of weak cryptography in several ways, including:
Examples of these in the real–world are many and various. In 2014, an OpenSSL flaw known as Heartbleed exposed encryption keys, login credentials, and sensitive data. That followed Adobe’s exposure of 153 million accounts in 2013 due to improper encryption of customer credentials. More recently, Facebook were found to be storing millions of passwords in plain text, accessible to internal employees.
–
03 – How do you prevent cryptographic failures?
Taking a Secure by Design approach you can ensure cryptographic risks are mitigated before attackers can exploit them. Here’s a few top tips:
–
Cryptographic failures don’t just expose data, they break customer trust. By embedding strong cryptographic practices from day one, you can secure your sensitive information, protect your users, and avoid costly breaches.
Posted 06 Mar 25
A monthly digest of useful info about Secure by Design – what it is, why it matters, and tips on proactive security.
11 Mar 25
Built in the UK. Securing products worldwide.
Logical Peak Ltd. ©