Okta Support System Hacked, Users Sensitive Data Exposed

The US-based software firm Okta has discovered malicious activity using a stolen credential to access Okta’s support case management system. An attacker was able to view sensitive files uploaded by Okta customers.

According to the company’s public statement, the Auth0/CIC case management system and the Okta service in production are unaffected by the hack. The firm has contacted each consumer who this issue has impacted.

Document
FREE Demo

Deploy Advanced AI-Powered Email Security Solution

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware

Users’ Sensitive Information Exposed

The support case management system compromised in this attack contained HTTP Archive (HAR) files, which facilitates troubleshooting by replicating browser activity.

Cookies and session tokens, among other sensitive data, can be found in HAR files and used by malicious actors to pose as legitimate users.

To safeguard their customers, Okta has investigated with the help of the affected customers and taken steps, such as revoking embedded session tokens.

The two customers who acknowledged they were the target of the most recent attack on Okta’s support system are BeyondTrust and Cloudflare.

“Within 30 minutes of the administrator uploading the file to Okta’s support portal an attacker used the session cookie from this support ticket, attempting to perform actions in the BeyondTrust Okta environment”, BeyondTrust reports.

According to BeyondTrust, on October 2nd, it discovered an identity-centric attack on an internal Okta administrator account and swiftly stopped the attack using its identity security technologies, with no harm or exposure to the company’s infrastructure or its clients.

On October 18, 2023, Cloudflare discovered attacks on their system; they asserted that no customer data or services were compromised. 

“The threat actor was able to hijack a session token from a support ticket that was created by a Cloudflare employee. Using the token extracted from Okta, the threat actor accessed Cloudflare systems on October 18,” Cloudflare reports.

“Our Security Incident Response Team’s (SIRT) real-time detection and prompt response enabled containment and minimized the impact on Cloudflare systems and data.”

Recommendation

Okta advises sanitizing all login information, cookies, and session tokens before sharing a HAR file. In General, enabling Hardware MFA for all user accounts is advised.

As part of the investigation, Okta provided indicators of compromise that included IP addresses and User-Agent info related to the attackers. This helps to assist customers who wish to perform their threat-hunting activity.

“We recommend referring to our previously published advice on how to search System Log for any given suspicious session, user, or IP. Please note that the majority of the indicators are commercial VPN nodes according to our enrichment information”, the company said.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Take advantage of the free trial to ensure 100% security.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

INE Security Alert: Expediting CMMC 2.0 Compliance

INE Security, a leading global provider of cybersecurity training and certifications, today announced a new…

14 hours ago

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a colleague…

3 days ago

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a grave…

3 days ago

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS) advisories…

3 days ago

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with a…

3 days ago

Beware of Fake Captcha Verifications Spreading Lumma Malware

In January, Netskope Threat Labs uncovered a sophisticated global malware campaign leveraging fake CAPTCHA pages…

3 days ago