Carding 4 Carders
Professional
- Messages
- 2,730
- Reaction score
- 1,467
- Points
- 113
Okta, which provides identity tools such as multiple authentication and single sign-on for thousands of businesses, has experienced a security breach in its customer support department. According to information from KrebsOnSecurity, the incident affected a "very small number" of customers. However, it appears that the attackers had access to the Okta support platform for at least two weeks before the company completely eliminated the consequences of the intrusion.
In a tip sent to customers on October 19, Okta said it detected hostile activity using access to stolen credentials to log in to the Okta support call management system. The attacker was able to view files uploaded by some Okta clients as part of recent support calls.
When Okta solves problems with clients, it often asks for a web browser session record. These files are sensitive, as they include cookies and client session tokens, which violators can use to simulate real users.
BeyondTrust, one of Okta's clients, received a notification from Okta. Mark Maifret, chief technology officer of BeyondTrust, emphasized that the notification came more than two weeks after his company alerted Okta to a possible problem.
In an interview with KrebsOnSecurity, Okta's deputy chief information security officer Charlotte Wiley said that the company initially believed that the warning from BeyondTrust on October 2 was not the result of a breach in its systems. However, by October 17, the company identified and localized the incident.
The disclosure from Okta came shortly after Caesar's Entertainment and MGM Resorts casinos were hacked. In both cases, the attackers were able to convince employees to reset multiple login requirements for Okta administrator accounts.
In March 2022, Okta disclosed information about a security breach from the hacker group LAPSUS$. Wiley declined to answer questions about how long the intruder may have had access to the company's account or who may have been behind the attack. However, she said that the company believes that this is an opponent that they have encountered before.
Okta published a post about the incident that includes some "compromise indicators" that customers can use to find out if they have been affected. But the company stressed that "all affected customers have been notified."
BeyondTrust published a blog post about its findings.
In a tip sent to customers on October 19, Okta said it detected hostile activity using access to stolen credentials to log in to the Okta support call management system. The attacker was able to view files uploaded by some Okta clients as part of recent support calls.
When Okta solves problems with clients, it often asks for a web browser session record. These files are sensitive, as they include cookies and client session tokens, which violators can use to simulate real users.
BeyondTrust, one of Okta's clients, received a notification from Okta. Mark Maifret, chief technology officer of BeyondTrust, emphasized that the notification came more than two weeks after his company alerted Okta to a possible problem.
In an interview with KrebsOnSecurity, Okta's deputy chief information security officer Charlotte Wiley said that the company initially believed that the warning from BeyondTrust on October 2 was not the result of a breach in its systems. However, by October 17, the company identified and localized the incident.
The disclosure from Okta came shortly after Caesar's Entertainment and MGM Resorts casinos were hacked. In both cases, the attackers were able to convince employees to reset multiple login requirements for Okta administrator accounts.
In March 2022, Okta disclosed information about a security breach from the hacker group LAPSUS$. Wiley declined to answer questions about how long the intruder may have had access to the company's account or who may have been behind the attack. However, she said that the company believes that this is an opponent that they have encountered before.
Okta published a post about the incident that includes some "compromise indicators" that customers can use to find out if they have been affected. But the company stressed that "all affected customers have been notified."
BeyondTrust published a blog post about its findings.