October knowledge breach impacts all buyer assist system customers


Okta: October data breach affects all customer support system users

Okta’s investigation into the breach of its Assist Middle atmosphere final month revealed that the hackers obtained knowledge belonging to all buyer assist system customers.

The corporate notes that the risk actor additionally accessed further studies and assist circumstances with contact data for all contact data of all Okta licensed customers.

At the start of November, the corporate disclosed {that a} risk actor had gained unauthorized entry to information inside its buyer assist system and that early proof indicated a restricted knowledge breach.

In line with particulars uncovered on the time, the hacker accessed HAR information with cookies and session tokens for 134 prospects – lower than 1% of the corporate’s prospects, that may very well be used to hijack Okta classes of respectable customers.

Additional investigation of the assault revealed that the risk actor additionally “downloaded a report that contained the names and e-mail addresses of all Okta buyer assist system customers.”

“All Okta Workforce Identification Cloud (WIC) and Buyer Identification Answer (CIS) prospects are impacted besides prospects in our FedRamp Excessive and DoD IL4 environments (these environments use a separate assist system NOT accessed by the risk actor). The Auth0/CIC assist case administration system was additionally not impacted by this incident” – Okta

In line with the corporate, the stolen report included fields for full title, username, e-mail, firm title, person kind, handle, final password change/reset, function, telephone quantity, cell quantity, time zone, and SAML Federation ID.

Nonetheless, Okta clarifies that for 99.6% of the customers listed within the report the one contact data obtainable had been full title and e-mail handle. Additionally, the corporate assured that no credentials had been uncovered.

Okta’s assertion notes that lots of the uncovered customers are directors and 6% of them haven’t activated the multi-factor authentication protection towards unauthorized login makes an attempt.

The corporate states that the intruders additionally accessed knowledge from “Okta licensed customers and a few Okta Buyer Identification Cloud (CIC) buyer contacts” together with Okta worker particulars.

“We additionally recognized further studies and assist circumstances that the risk actor accessed, which include contact data of all Okta licensed customers and a few Okta Buyer Identification Cloud (CIC) buyer contacts, and different data. Some Okta worker data was additionally included in these studies. This contact data doesn’t embody person credentials or delicate private knowledge” – Okta

More often than not, names and emails are sufficient for a risk actor to launch phishing or social engineering assaults that would serve them in reconnaissance phases or might assist them receive extra particulars to arrange a extra subtle assault.

To guard towards potential assaults, Okta recommends the next:

  1. Implement MFA for admin entry, ideally utilizing phishing-resistant strategies like Okta Confirm FastPass, FIDO2 WebAuthn, or PIV/CAC Good Playing cards.
  2. Allow admin session binding to require re-authentication for admin classes from new IP addresses.
  3. Set admin session timeouts to a most of 12 hours with a 15-minute idle time, as per NIST tips.
  4. Improve phishing consciousness by staying vigilant towards phishing makes an attempt and reinforcing IT Assist Desk verification processes, particularly for high-risk actions.

Okta has been a goal of credential theft and social engineering assaults over the previous two years, as hackers final December accessed supply code from the corporate’s non-public GitHub repositories.

In January 2022, hackers gained entry to the laptop computer of an Okta assist engineer with privileges to provoke password resets for patrons. The incident impacted about 375 prospects, representing 2.5% of the corporate’s consumer base.

The Lapsus$ extortion group claimed the assault and leaked screenshots displaying that that they had “superuser/admin” entry to Okta.com and will entry buyer knowledge.

Leave a Reply

Your email address will not be published. Required fields are marked *

Back To Top