Okta got hacked. Leading to impact for CloudFlare, 1Password, and BeyondTrust.
Here's everything we know about it:
Okta’s support system was compromised, allowing unauthorized access to sensitive files uploaded by customers.
Notably, Okta did not discover the breach themselves; it was independently detected by BeyondTrust and Cloudflare.
BeyondTrust detected an identity-centric attack on October 2, 2023, which led them to believe that Okta’s support system was compromised.
They alerted Okta, but it took until October 19 for Okta to confirm the breach.
Cloudflare discovered attacks traced back to Okta on October 18, 2023. They were able to contain the attack, ensuring no customer information or systems were impacted.
Cloudflare contacted Okta about the breach before Okta had notified them.
1Password has released an incident report that goes into a lot of detail about what they saw and how they responded.
I'm a bit concerned that a privileged member of 1Password staff's endpoint didn't have Yubikey enforced until post this incident.
And free version of Malwarebytes also doesn't instill a ton of confidence.
What led to the breach to begin with?
Speculation beyond "stolen credentials," but it all started on their support portal.
Okta support often requests customers to upload HTTP Archive (HAR) files for troubleshooting.
HAR files can contain sensitive info like session tokens.
Upon being notified of the incident, Okta revoked any of the embedded session tokens.
Okta also advised users to sanitize HAR files by removing sensitive data before sharing.
My opinion: This HAR file sanitization is not the burden of the customer.
Okta needs to have a better process here.
The breach primarily affected Okta’s support case management system.
Other systems, including the Okta service and the Auth0/CIC case management system, remain unaffected by this incident.
It is reported that 170 of Okta's customers were impacted as a way to downplay the impact.
But we know about 3 of them and they are CloudFlare, BeyondTrust, and 1Password - not a small impact even if many Okta customers weren't involved.
Okta has provided IoCs to help customers identify potential malicious activity.
This includes a list of IP addresses and user agents that might be associated with the malicious activities.
Remaining Questions - Who are the other companies impacted?
Did they respond as well as CloudFlare, BeyondTrust, and 1Password?
Want to stay on top of news like this?
Join over 5k pros who trust me to give them what they need to know every week in cybersecurity:
🚨BREAKING: Genetics firm 23andMe confirms user data theft in a credential stuffing attack.
The hackers released 1 million lines of data targeting Ashkenazi Jews.
23andMe, a renowned U.S. biotech & genomics firm, offers genetic testing services.
A threat actor recently leaked data samples from the firm and is now selling 23andMe customer data packs.
TARGETED LEAK: The initial data leak was limited but deeply concerning.
The threat actor released 1 million lines of data specifically for Ashkenazi people.
This targeted attack raises serious questions about the motive behind the breach.
🚨 Woah. An intentional backdoor discovered in encrypted radio comms used globally for over 25 years.
Buckle up!
The technology in question is a European radio standard called TETRA (Terrestrial Trunked Radio).
It's used in radios made by Motorola, Damm, Hytera, and others and is embedded in critical infrastructure like pipelines, railways, and the electric grid.
TETRA is also used in specialized systems sold exclusively to police forces, prison personnel, military, intelligence agencies, and emergency services.
This includes the C2000 system used by Dutch police, fire, ambulance, and the Ministry of Defense. 🚓🚑