Article Details

Original Article Text

Click to Toggle View

Okta breach: 134 customers exposed in support system hack. Okta says attackers who breached its customer support system last month gained access to files belonging to 134 customers, five of them later being targeted in session hijacking attacks with the help of stolen session tokens. "From September 28, 2023 to October 17, 2023, a threat actor gained unauthorized access to files inside Okta's customer support system associated with 134 Okta customers, or less than 1% of Okta customers," Okta revealed. "Some of these files were HAR files that contained session tokens which could in turn be used for session hijacking attacks. The threat actor was able to use these session tokens to hijack the legitimate Okta sessions of 5 customers, 3 of whom have shared their own response to this event." The three Okta customers that already disclosed they were targeted due to the company's October security breach are 1Password, BeyondTrust, and Cloudflare. They all notified Okta of suspicious activity after detecting unauthorized attempts to log into in-house Okta administrator accounts.  Despite being alerted about session hijacking attempts on September 29, Okta took over two weeks to officially confirm the breach in their support system after multiple meetings with the three affected customers. To breach Okta's support system, the threat actors used credentials for a support service account stolen from an employee's personal Google account after they logged into their personal Google profile while using an Okta-managed laptop. While Okta didn't share how the attackers stole the service account credentials, the company said that "the most likely avenue for exposure of this credential is the compromise of the employee's personal Google account or personal device." In response to the breach, Okta took multiple measures to prevent similar incidents in the future, including disabling the compromised service account, blocking the use of personal Google profiles with Google Chrome on Okta-managed devices, deploying additional detection and monitoring rules for its customer support system, and binding Okta administrator session tokens based on network location. Multiple hits over the last two years Earlier this week, Okta warned nearly 5,000 current and former employees that their personal information was exposed after its healthcare coverage provider, Rightway Healthcare, was breached on September 23. Sensitive information exposed in this third-party breach includes employees' full names, their social security numbers (SSNs), and Health or Medical Insurance plan numbers. Over the last two years, Okta has experienced several other breaches due to credential theft and social engineering attacks. In December 2022, Okta acknowledged a security breach where hackers accessed confidential source code information stored within its private GitHub repositories.  The Lapsus$ extortion group had previously claimed a similar hack in March 2022, an incident later verified by Okta. The breach affected approximately 2.5% of the company's customer base. Okta subsidiary Auth0 also disclosed that the contents of some older source code repositories were stolen by unknown attackers using an unknown method.

Daily Brief Summary

DATA BREACH // Okta Breach Exposes Records of 134 Customers, Triggers Hijacking Attacks

Okta confirmed that an attacker breached its customer support system from 28 September to 17 October 2023, gaining access to the files of 134 customers, or less than 1% of its total customer base.

Some of these files were HAR files that had session tokens inside. The threat actor used these tokens to hijack sessions belonging to five customers, three of which have publicly responded to the incident: 1Password, BeyondTrust, and Cloudflare.

This security breach was facilitated by the theft of credentials for a support service account. An employee had accessed their personal Google account via an Okta-managed laptop, and it is speculated that this was how the cyber attacker accessed the account credentials.

In responses, Okta has implemented measures to prevent similar attacks. Steps include disabling the compromised service account, banning personal Google accounts from Okta devices, deploying more detection rules for its support system, and tying administrator session tokens to network location.

This breach is the latest in a series of cyber attacks Okta has faced. In December 2022, Okta confirmed a breach, where confidential source code from its private GitHub repositories was accessed. In March 2022, an attack by the Lapsus$ group compromised about 2.5% of its customers.

Recently, Okta warned almost 5,000 employees about exposure of personal data following a breach at its healthcare provider, Rightway Healthcare, in September.