March 22nd, 2022: CyberHoot is investigating a potential breach at Okta, developers of a cloud-based identity and access management solution used by thousands of companies world-wide. Okta is currently investigating, and has released an incident summary on their website here. This blog entry states:
"The potential impact to Okta customers is limited to the access that support engineers have. These engineers are unable to create or delete users, or download customer databases. Support engineers do have access to limited data - for example, Jira tickets and lists of users - that were seen in the screenshots. Support engineers are also able to facilitate the resetting of passwords and multi-factor authentication factors for users, but are unable to obtain those passwords."
Reuters first reported that Okta was looking into reports of a possible digital breach after a hacking group known as Lapsus$ claimed responsibility for the incident and published screenshots claiming access to an Okta internal administrative account and the firm’s Slack channel.
The hacking group Lapsus$ first emerged in December, alleged to have stolen source code and other valuable data from increasingly prominent companies, including Nvidia, Microsoft, Samsung, and Ubisoft. They have backed up their claims by leaking portions of critical code in apparent extortion attempts. Early investigations by security researchers broadly reported they seemed to be using phishing to compromise their victims. Now it seems possible that some of those high-profile breaches stemmed from the group’s Okta compromise.
Lapsus$ today corrected the claim by Okta that a laptop was compromised stating they had “access to a thin client rather than a laptop” and “that it found Okta storing AWS keys in Slack channels”.
With the idea that this is an evolving situation and we could learn more that requires additional action, CyberHoot is making the following early recommendations for anyone using Okta for their Identity and Access Management needs:
If you’re a subscriber to CyberHoot’s services, you’ll have access to our Policy and Process library which contains the vulnerability alert management process document. This document prescribes how to respond to situations like this and in what time frame. If your company has not yet adopted a VAMP-like process, now is a great time to get started.
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreA recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.