HomeSample Page

Sample Page Title


Okta: October data breach affects all customer support system users

Okta’s investigation into the breach of its Assist Middle atmosphere final month revealed that the hackers obtained knowledge belonging to all buyer help system customers.

The corporate notes that the menace actor additionally accessed further studies and help circumstances with contact info for all contact info of all Okta licensed customers.

Originally of November, the corporate disclosed {that a} menace actor had gained unauthorized entry to recordsdata inside its buyer help system and that early proof indicated a restricted knowledge breach.

In line with particulars uncovered on the time, the hacker accessed HAR recordsdata with cookies and session tokens for 134 prospects – lower than 1% of the corporate’s prospects, that could possibly be used to hijack Okta periods of reputable customers.

Additional investigation of the assault revealed that the menace actor additionally “downloaded a report that contained the names and electronic mail addresses of all Okta buyer help system customers.”

“All Okta Workforce Identification Cloud (WIC) and Buyer Identification Resolution (CIS) prospects are impacted besides prospects in our FedRamp Excessive and DoD IL4 environments (these environments use a separate help system NOT accessed by the menace actor). The Auth0/CIC help case administration system was additionally not impacted by this incident” – Okta

In line with the corporate, the stolen report included fields for full identify, username, electronic mail, firm identify, person kind, handle, final password change/reset, function, cellphone quantity, cell quantity, time zone, and SAML Federation ID.

Nonetheless, Okta clarifies that for 99.6% of the customers listed within the report the one contact info out there have been full identify and electronic mail handle. Additionally, the corporate assured that no credentials have been uncovered.

Okta’s assertion notes that most of the uncovered customers are directors and 6% of them haven’t activated the multi-factor authentication protection towards unauthorized login makes an attempt.

The corporate states that the intruders additionally accessed knowledge from “Okta licensed customers and a few Okta Buyer Identification Cloud (CIC) buyer contacts” together with Okta worker particulars.

“We additionally recognized further studies and help circumstances that the menace actor accessed, which comprise contact info of all Okta licensed customers and a few Okta Buyer Identification Cloud (CIC) buyer contacts, and different info. Some Okta worker info was additionally included in these studies. This contact info doesn’t embody person credentials or delicate private knowledge” – Okta

More often than not, names and emails are sufficient for a menace actor to launch phishing or social engineering assaults that might serve them in reconnaissance phases or may assist them get hold of extra particulars to arrange a extra subtle assault.

To guard towards potential assaults, Okta recommends the next:

  1. Implement MFA for admin entry, ideally utilizing phishing-resistant strategies like Okta Confirm FastPass, FIDO2 WebAuthn, or PIV/CAC Sensible Playing cards.
  2. Allow admin session binding to require re-authentication for admin periods from new IP addresses.
  3. Set admin session timeouts to a most of 12 hours with a 15-minute idle time, as per NIST tips.
  4. Improve phishing consciousness by staying vigilant towards phishing makes an attempt and reinforcing IT Assist Desk verification processes, particularly for high-risk actions.

Okta has been a goal of credential theft and social engineering assaults over the previous two years, as hackers final December accessed supply code from the corporate’s personal GitHub repositories.

In January 2022, hackers gained entry to the laptop computer of an Okta help engineer with privileges to provoke password resets for purchasers. The incident impacted about 375 prospects, representing 2.5% of the corporate’s shopper base.

The Lapsus$ extortion group claimed the assault and leaked screenshots displaying that that they had “superuser/admin” entry to Okta.com and will entry buyer knowledge.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles