Saturday, September 7, 2024
HomeCyber Security NewsOkta Support System Hacked, Users Sensitive Data Exposed

Okta Support System Hacked, Users Sensitive Data Exposed

Published on

The US-based software firm Okta has discovered malicious activity using a stolen credential to access Okta’s support case management system. An attacker was able to view sensitive files uploaded by Okta customers.

According to the company’s public statement, the Auth0/CIC case management system and the Okta service in production are unaffected by the hack. The firm has contacted each consumer who this issue has impacted.

Document
FREE Demo

Deploy Advanced AI-Powered Email Security Solution

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware

- Advertisement - EHA

Users’ Sensitive Information Exposed

The support case management system compromised in this attack contained HTTP Archive (HAR) files, which facilitates troubleshooting by replicating browser activity.

Cookies and session tokens, among other sensitive data, can be found in HAR files and used by malicious actors to pose as legitimate users.

To safeguard their customers, Okta has investigated with the help of the affected customers and taken steps, such as revoking embedded session tokens.

The two customers who acknowledged they were the target of the most recent attack on Okta’s support system are BeyondTrust and Cloudflare.

“Within 30 minutes of the administrator uploading the file to Okta’s support portal an attacker used the session cookie from this support ticket, attempting to perform actions in the BeyondTrust Okta environment”, BeyondTrust reports.

According to BeyondTrust, on October 2nd, it discovered an identity-centric attack on an internal Okta administrator account and swiftly stopped the attack using its identity security technologies, with no harm or exposure to the company’s infrastructure or its clients.

On October 18, 2023, Cloudflare discovered attacks on their system; they asserted that no customer data or services were compromised. 

“The threat actor was able to hijack a session token from a support ticket that was created by a Cloudflare employee. Using the token extracted from Okta, the threat actor accessed Cloudflare systems on October 18,” Cloudflare reports.

“Our Security Incident Response Team’s (SIRT) real-time detection and prompt response enabled containment and minimized the impact on Cloudflare systems and data.”

Recommendation

Okta advises sanitizing all login information, cookies, and session tokens before sharing a HAR file. In General, enabling Hardware MFA for all user accounts is advised.

As part of the investigation, Okta provided indicators of compromise that included IP addresses and User-Agent info related to the attackers. This helps to assist customers who wish to perform their threat-hunting activity.

“We recommend referring to our previously published advice on how to search System Log for any given suspicious session, user, or IP. Please note that the majority of the indicators are commercial VPN nodes according to our enrichment information”, the company said.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Take advantage of the free trial to ensure 100% security.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions...

Predator Spyware Exploiting “one-click” & “zero-click” Flaws

Recent research indicates that the Predator spyware, once thought to be inactive due to...

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data

Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group,...

NoiseAttack is a Novel Backdoor That Uses Power Spectral Density For Evasion

NoiseAttack is a new method of secretly attacking deep learning models. It uses triggers...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions...

Predator Spyware Exploiting “one-click” & “zero-click” Flaws

Recent research indicates that the Predator spyware, once thought to be inactive due to...

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data

Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group,...