Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 1 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Okta confirms hack, 2.5% of customers affected

The company has confirmed that a "small percentage" of customers may have their data viewed or acted on

by Josh.Breaker-Rolfe
March 25, 2022
in Cyber Bites
hand typing on keyboard
Share on FacebookShare on Twitter

Okta has confirmed that they were hacked by LAPSUS$ ransomware group.

LAPSUS$ ransomware posted screenshots which they claimed were of Okta’s internal company environment yesterday. Today, the authentication services provider has updated a blog post confirming the breach:

“After a thorough analysis of these claims, we have concluded that a small percentage of customers — approximately 2.5% — have potentially been impacted and whose data may have been viewed or acted upon. We have identified those customers and are contacting them directly,” Okta CSO David Bradbury said.

2.5% equates to 375 of Okta’s customers.

“If you are an Okta customer and were impacted, we have already reached out directly by email,” Bradbury continued.

It’s believed that the incident took place in January 2022.

In a subsequent statement, Okta published a series of updated blog posts providing more detail.

Chief security officer David Bradbury revealed the hackers had accessed the computer of a customer-support engineer working for the sub-processor, over a five-day period in mid-January.

The attack had been “analogous to walking away from your computer at a coffee shop, whereby a stranger has – virtually, in this case – sat down at your machine and is using the mouse and keyboard”, he said.

Discussing the breach, Jon Andrews, VP of EMEA at Gurucul, stated:

“The concern here is that Lapsus$ seems to be after sourcing code, which is a huge risk for all of Okta’s customers, who will find themselves with a factor of risk on their systems. In fact, once it’s leaked, source code could allow attackers to tailor their tactics and to make their activity look like legitimate, normal behaviour, which is not flagged by most security systems.

Okta, on the other hand, is doing a good job at responding promptly, with an investigation being launched and released to customers within 48 hours. The speed of response reflects the critical nature of this kind of compromises, which are becoming ever more common. Attackers such as Lapsus$ spend a long time within their victims’ network, looking for the pieces of information that, if released, will hurt the company the most.

Lapsus$ is interesting also because they seem to use different attack vectors every time – sometimes it’s a spear phishing email, some others it’s exploiting a dormant identity. This is proving effective because often organisations have different security systems that cover individual vectors within their infrastructure, but these security solutions don’t necessary communicate well with each other and fail to offer a holistic view of the environment and the threats within. It is for this reason that it is paramount to have a multi-layered security programme that can cover the entire attack surface and speed up detection… Two months is a long time to have an attacker poking around your systems.”

FacebookTweetLinkedIn
ShareTweet
Previous Post

New attack technique makes phishing near undetectable

Next Post

Anonymous leaks 10GB of Nestle Data

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information