Article Details
Scrape Timestamp (UTC): 2023-10-23 22:39:36.067
Original Article Text
Click to Toggle View
1Password discloses security incident linked to Okta breach. 1Password, a popular password management platform used by over 100,000 businesses, suffered a security breach after hackers gained access to its Okta ID management tenant. "We detected suspicious activity on our Okta instance related to their Support System incident. After a thorough investigation, we concluded that no 1Password user data was accessed," reads a very brief security incident notification from 1Password CTO Pedro Canahuati. "On September 29, we detected suspicious activity on our Okta instance that we use to manage our employee-facing apps." "We immediately terminated the activity, investigated, and found no compromise of user data or other sensitive systems, either employee-facing or user-facing." On Friday, Okta disclosed that threat actors breached its support case management system using stolen credentials. As part of these support cases, Okta routinely asks customers to upload HTTP Archive (HAR) files to troubleshoot customer problems. However, these HAR files contain sensitive data, including authentication cookies and session tokens that can be used to impersonate a valid Okta customer. Okta first learned of the breach from BeyondTrust, who shared forensics data with Okta, showing that their support organization was compromised. However, it took Okta over two weeks to confirm the breach. Cloudflare also detected malicious activity on their systems on October 18th, two days before Okta disclosed the incident. Like BeyondTrust, the threat actors used an authentication token stolen from Okta's support system to pivot into Cloudflare's Okta instance and gain Administrative privileges. 1Password breach linked to Okta In a report released Monday afternoon, 1Password says threat actors breached its Okta tenant using a stolen session cookie for an IT employee. "Corroborating with Okta support, it was established that this incident shares similarities of a known campaign where threat actors will compromise super admin accounts, then attempt to manipulate authentication flows and establish a secondary identity provider to impersonate users within the affected organization," reads the 1Password report. According to the report, a member of the 1Password IT team opened a support case with Okta and provided a HAR file created from the Chrome Dev Tools. This HAR file contains the same Okta authentication session used to gain unauthorized access to the Okta administrative portal. Using this access, the threat actor attempted to perform the following actions: 1Password's IT team learned of this breach on September 29 after receiving a suspicious email about the requested administrative report that was not official requested by employees. "On September 29, 2023 a member of the IT team received an unexpected email notification suggesting they had initiated an Okta report containing a list of admins," explained 1Password in the report. "Since then, we’ve been working with Okta to determine the initial vector of compromise. As of late Friday, October 20, we’ve confirmed that this was a result of Okta’s Support System breach," Canahuati said. However, there appears to be some confusion about how 1Password was breached, as Okta claims that their logs do not show that the IT employee's HAR file was accessed until after 1Password’s security incident. 1Password states that they have since rotated all of the IT employee's credentials and modified their Okta configuration, including denying logins from non-Okta IDPs, reducing session times for administrative users, tighter rules on MFA for administrative users, and reducing the number of super administrators. BleepingComputer contacted 1Password with further questions about the incident, but a reply was not immediately available.
Daily Brief Summary
1Password, a major password management platform, reported a security breach resulting from hackers compromising its Okta ID management tenant.
Despite detecting suspicious activity on their Okta instance, the company confirmed no user data had been accessed following a thorough investigation and swift termination of the unauthorized activity.
The breach comes after Okta announced that its own support case management system had been penetrated by hackers using stolen credentials. The threat actors in Okta's case leveraged HTTP Archive (HAR) files that contained sensitive data to mimic a legitimate Okta customer.
Threat actors breached 1Password's Okta tenant by using a stolen session cookie belonging to an IT employee, using similar tactics to those observed in Okta's prior incident.
The threat actors used their access to manipulate the organization's authentication flows and set up a secondary identity provider to impersonate users within the organization.
1Password consequently tightened security protocols around its Okta configuration, including credential changes for the affected IT employee, restrictions on non-Okta IDP logins, shorter session times for administrative users, and stricter multi-factor authentication rules for administrative users.
Okta and 1Password's accounts of the incident timeline differ, with Okta asserting that logs show the IT employee's HAR file wasn't accessed until after 1Password’s noted security incident.