Monday, October 23, 2023
HomeCyber SecurityOkta's Help System Breach Exposes Buyer Information to Unidentified Menace Actors

Okta’s Help System Breach Exposes Buyer Information to Unidentified Menace Actors


Oct 21, 2023NewsroomInformation Breach / Cyber Assault

Id companies supplier Okta on Friday disclosed a brand new safety incident that allowed unidentified risk actors to leverage stolen credentials to entry its assist case administration system.

“The risk actor was in a position to view recordsdata uploaded by sure Okta clients as a part of current assist instances,” David Bradbury, Okta’s chief safety officer, mentioned. “It ought to be famous that the Okta assist case administration system is separate from the manufacturing Okta service, which is totally operational and has not been impacted.”

The corporate additionally emphasised that its Auth0/CIC case administration system was not impacted by the breach, noting it has straight notified clients who’ve been affected.

Nonetheless, it mentioned that the shopper assist system can be used to add HTTP Archive (HAR) recordsdata to duplicate finish consumer or administrator errors for troubleshooting functions.

Cybersecurity

“HAR recordsdata may also comprise delicate information, together with cookies and session tokens, that malicious actors can use to impersonate legitimate customers,” Okta warned.

It additional mentioned it labored with impacted clients to make sure that the embedded session tokens had been revoked to forestall their abuse.

Okta didn’t disclose the size of the assault, when the incident happened, and when it detected the unauthorized entry. As of March 2023, it has greater than 17,000 clients and manages round 50 billion customers.

That mentioned, BeyondTrust and Cloudflare are among the many two clients who’ve confirmed they had been focused within the newest assist system assault.

“The threat-actor was in a position to hijack a session token from a assist ticket which was created by a Cloudflare worker,” Cloudflare mentioned. “Utilizing the token extracted from Okta, the threat-actor accessed Cloudflare methods on October 18.”

Describing it as a complicated assault, the online infrastructure and safety firm mentioned the risk actor behind the exercise compromised two separate Cloudflare worker accounts throughout the Okta platform. It additionally mentioned that no buyer data or methods had been accessed because of the occasion.

Cybersecurity

BeyondTrust mentioned it notified Okta of the breach on October 2, 2023, however the assault on Cloudflare means that the adversary had entry to their assist methods at the least till October 18, 2023.

The identification administration companies agency mentioned its Okta administrator had uploaded a HAR file to the system on October 2 to resolve a assist situation, and that it detected suspicious exercise involving the session cookie inside half-hour of sharing the file. The tried assaults in opposition to BeyondTrust had been finally unsuccessful.

“BeyondTrust instantly detected and remediated the assault via its personal identification instruments, Id Safety Insights, leading to no affect or publicity to BeyondTrust’s infrastructure or to its clients,” a spokesperson for the corporate advised The Hacker Information.

The event is the most recent in a protracted listing of safety mishaps which have singled out Okta over the previous few years. The corporate has develop into a high-value goal for hacking crews for the truth that its single sign-on (SSO) companies are utilized by among the largest corporations on this planet.

Replace:

In a press release shared with The Hacker Information, a spokesperson for Okta mentioned the “breach solely affected round 1% of our 18,400 clients.”

Discovered this text attention-grabbing? Observe us on Twitter and LinkedIn to learn extra unique content material we submit.





Supply hyperlink

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments