Offense as Defense.
Using Autonomous AI to Expose Weaknesses in Financial Services APIs.
Using Autonomous AI to Expose Weaknesses in Financial Services APIs.
From the U.S. Intelligence Community to Hollywood — two decades breaking financial systems, connected cars, and critical infrastructure, and writing the playbook on how to fix them.
Broken Object Level Authorization. The vulnerability that quietly powers most modern financial-services API breaches — and the one your SAST, DAST, and WAF will never catch.
An API endpoint exposes an object identifier — an account number, a card ID, a customer GUID — and trusts the client to only request their own. The server authenticates the user but never authorizes the object.
Change the ID in the URL. Get someone else's bank account, statements, transfers, KYC documents, loan applications. No exploit required — just a number.
Every banking workflow is object-centric: accounts, cards, beneficiaries, transactions, loans, devices. Every microservice re-implements authorization. One miss = full data exposure.
It's the #1 vulnerability on the OWASP API Security Top 10 — and the one I find in virtually every bank, fintech, and neobank I've ever tested.
GET /api/v2/accounts/102847/statements // works — it's my account GET /api/v2/accounts/102848/statements // also works. That's not my account. GET /api/v2/accounts/000001/statements // works too. So does every account in between.
Not scanners. Not pen-testing tools. Not "AI-assisted" SAST with a chatbot bolted on. Goal-driven AI agents that reason, plan, execute, and adapt — like a human red teamer, at machine speed.
If they're using AI to attack you, you have to use AI to attack yourself — first, faster, and harder. That's offense as defense. That's the entire thesis of this talk.
Agentic AI has collapsed the cost of recon, exploit dev, and lateral movement. What used to take a nation-state team a quarter, a small group now does in days. The barrier to entry just fell through the floor.
Annual pentests and quarterly scans cannot match a continuous, autonomous adversary. You need a continuous, autonomous defender — running the same playbooks before the bad guys do. Symmetric tooling, asymmetric advantage.
Three recent incidents prove the curve has already bent. →
Three incidents in the last six months — each one a public, documented milestone in AI-driven offense. This is no longer theoretical.
Google Threat Intelligence disclosed that adversaries used an AI-developed zero-day to bypass 2FA on a widely-used open-source admin tool. Recognized as a major milestone — AI directly creating sophisticated, tailored exploits in the wild.
An unknown adversary used Agentic AI to run a massive, largely automated campaign against Mexican government organizations — including a municipal water utility in Monterrey. AI did 80–90% of the work.
Threat group ShinyHunters used AI to accelerate data extraction — exfiltrating over 2M records from Crunchbase and breaching Instructure (parent of Canvas). AI as a data-mining force multiplier.
The first publicly-documented case of agentic AI running an end-to-end campaign against government and critical-infrastructure targets — and it happened right here, in Mexico.
An unattributed adversary deployed agentic AI against Mexican federal and municipal targets — including a water utility serving Monterrey. The AI analyzed targets, wrote its own code, scanned exfiltrated data, and made operational decisions with minimal human supervision.
ExtraHop estimated AI performed 80–90% of the campaign's workload. The humans were essentially supervisors.
Government & banking infrastructure share the same architecture: sprawling API surfaces, legacy auth, microservices stitched together over decades. The exact same playbook works against financial services — and adversaries now have an AI co-pilot to find every gap.
Source: extrahop.com/blog/mexican-government-breach-ai-tools-cyberattack
This is not a slogan. It's the only viable defensive posture left. The tooling on both sides has converged — the only question is which side deploys it first inside your environment.
An autonomous AI red team platform purpose-built for API security. Goal-driven agents that reason about your endpoints, hunt for BOLA, BFLA, mass assignment, and business-logic flaws — and chain them into real attacks.
Slides don't sell this. You need to see an agent think about your API, change its mind, and find the thing your last pentest missed. So here we go.
Scan to sign up free for Ares. Then watch me put it to work against a real API in front of you.
Gracias, Ciudad de México · CBG 2026