{"id":18568,"date":"2022-03-23T09:10:05","date_gmt":"2022-03-23T17:10:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/03\/23\/news-12301\/"},"modified":"2022-03-23T09:10:05","modified_gmt":"2022-03-23T17:10:05","slug":"news-12301","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/03\/23\/news-12301\/","title":{"rendered":"Okta admits 366 customers may have been impacted by LAPSUS$ breach"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Wed, 23 Mar 2022 16:42:34 +0000<\/strong><\/p>\n<p>Through its usual means of communication, its Telegram channel, the LAPSUS$ group has posted screenshots of what appears to be superuser access to the Okta management console. As such, the group claims to have acquired &#8220;superuser\/admin&#8221; access to Okta.com and gained access to Okta&#8217;s customer data, saying on Telegram:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>BEFORE PEOPLE START ASKING: WE DID NOT ACCESS\/STEAL ANY DATABASES FROM OKTA &#8211; our focus was ONLY on okta customers.<\/p>\n<\/blockquote>\n<p>Yesterday morning, an Okta spokesperson said the company was investigating the matter, and <a href=\"https:\/\/twitter.com\/toddmckinnon\/status\/1506184721922859010\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">admitted an attempted breach<\/a> in late January 2022 in which customers were exposed for five days. The date visible in the LAPSU$ screenshots is 21 January, 2022. Okta provided a <a href=\"https:\/\/www.okta.com\/blog\/2022\/03\/oktas-investigation-of-the-january-2022-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">more detailed update<\/a> later in the day, which we have summarised below.<\/p>\n<p>Importantly, neither Okta nor LAPSU$ are claiming that Okta&#8217;s software has been compromised. Both are saying that the criminal hacking group acquired access to a user account with access to some customer data.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" data-attachment-id=\"55252\" data-permalink=\"https:\/\/blog.malwarebytes.com\/awareness\/2022\/03\/okta-admits-366-customers-may-have-been-impacted-by-lapsus-breach\/attachment\/okta-breach\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/okta-breach.jpg\" data-orig-size=\"1200,643\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"okta-breach\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/okta-breach-300x161.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/okta-breach-600x322.jpg\" loading=\"lazy\" width=\"600\" height=\"322\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/okta-breach-600x322.jpg\" alt=\"\" class=\"wp-image-55252\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/okta-breach-600x322.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/okta-breach-300x161.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/okta-breach.jpg 1200w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><figcaption>A screeshot of the alleged Okta breach shared on the LAPSU$ Telegram channel<\/figcaption><\/figure>\n<\/div>\n<h2>Okta<\/h2>\n<p>Okta is an access management company based in San Francisco. According to its own website, Okta serves over 15,000 organizations. Essentially, Okta software allows employees to log in using single sign-on\u2014a central platform where employees can log in once in order to access resources that have been assigned to them by an organization\u2019s IT staff. The kind of indentity-first approach to security is seen by some as an important underpinning of a <a href=\"https:\/\/blog.malwarebytes.com\/explained\/2020\/01\/explained-the-strengths-and-weaknesses-of-the-zero-trust-model\/\">Zero Trust<\/a> security model.<\/p>\n<h2>LAPSUS$<\/h2>\n<p>LAPSUS$ is a relative newcomer to the cybercrime scene that first appeared in the summer of 2021. It has made a name for itself by leaking sensitive information from some big targets. The group is believed to hail from South America, based on its earliest targets and the near-native use of Spanish and Portuguese.<\/p>\n<p>In recent events, LAPSUS$ claims to have hacked:<\/p>\n<ul>\n<li>Samsung (source code has been leaked)<\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2022\/03\/nvidia-the-ransomware-breach-with-some-plot-twists\/\">Nvidia<\/a> (at least limited access has been proven)<\/li>\n<li>Mercado Libre (confirmed)<\/li>\n<li>Microsoft (under investigation)<\/li>\n<li>Okta (under investigation)<\/li>\n<\/ul>\n<h2>Okta&#8217;s statement<\/h2>\n<p>In an <a href=\"https:\/\/www.okta.com\/blog\/2022\/03\/oktas-investigation-of-the-january-2022-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">article on Okta&#8217;s website<\/a>, CSO David Bradbury provided a timeline of the incidents which took place in January. According to Bradbury, a forensic examination identified a five-day window between January 16 and January 21 when a threat actor &#8220;had access to the Sitel environment&#8221;. Sitel is what Okta calls a &#8220;sub-processor&#8221;\u2014a company that provides contract workers for Okta&#8217;s Customer Support Organization.<\/p>\n<p>According to that post, the intruder &#8220;obtained remote access using RDP&#8221; to a Sitel-owned machine that was logged into Okta. The company says the access permissions of the user were limited, and that the tools support engineers have access to include Jira, Slack, Splunk, RingCentral, Salesforce, and an internally-built application called SuperUser.<\/p>\n<p>The group has not explained how it got access to an RDP session. <a href=\"https:\/\/blog.malwarebytes.com\/explained\/2022\/03\/blunting-rdp-brute-force-attacks-with-rate-limiting\/\">Brute-force attacks against RDP are common<\/a>, as is phishing, but LAPSU$ is also known to bribe insiders for access. For example, on 10 March, it said it was looking to recruit tech company &#8220;employees\/insiders&#8221; who were prepared to provide remote access, such as VPN or Citrix access.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" data-attachment-id=\"55257\" data-permalink=\"https:\/\/blog.malwarebytes.com\/awareness\/2022\/03\/okta-admits-366-customers-may-have-been-impacted-by-lapsus-breach\/attachment\/lapsus-recruits\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/lapsus-recruits.png\" data-orig-size=\"600,353\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"lapsus-recruits\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/lapsus-recruits-300x177.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/lapsus-recruits.png\" loading=\"lazy\" width=\"600\" height=\"353\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/lapsus-recruits.png\" alt=\"\" class=\"wp-image-55257\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/lapsus-recruits.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/lapsus-recruits-300x177.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><figcaption>LAPSU$ attempts to recruit insiders<\/figcaption><\/figure>\n<\/div>\n<p>To understand the scope of the breach, Bradbury says Okta examined all of the access performed by all Sitel employees to the SuperUser application for the five-day period in question. His conclusion was that the maximum potential impact of the breach is 366 (approximately 2.5% of) customers whose Okta tenant was accessed by Sitel. Affected customers are promised &#8220;&#8230;a report that shows the actions performed on their Okta tenant by Sitel during that period of time&#8221;, so they can perform their own analysis.<\/p>\n<p>In what is fast becoming a bizarre back-and-forth, LAPSU$ took to Telegram to respond to Okta&#8217;s assertions. Although the group doesn&#8217;t dispute that support engineers are limited to the applications Bradbury listed, it does take issue with whether that access is as benign as he suggests, commenting that it&#8217;s &#8220;&#8230;rather a bad security practice to store AWS keys in Slack channels&#8221;, and &#8220;The potential impact to Okta customers is NOT limited, I&#8217;m pretty certain resetting passwords and MFA would result in complete compromise of many clients systems&#8221;.<\/p>\n<h2>Advice for Okta customers<\/h2>\n<p>What Okta customers can do to keep any damage contained is hard to say while we are still waiting for details. But here are a few pointers:<\/p>\n<ul>\n<li>Keep an extra pair of eyes on your access logs.<\/li>\n<li>Same for threat hunting and other logs.<\/li>\n<li>Change the privileged Okta passwords.<\/li>\n<li>Wait for more information.<\/li>\n<li>Inform your customers that you are on the case.<\/li>\n<\/ul>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/awareness\/2022\/03\/okta-admits-366-customers-may-have-been-impacted-by-lapsus-breach\/\">Okta admits 366 customers may have been impacted by LAPSUS$ breach<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/awareness\/2022\/03\/okta-admits-366-customers-may-have-been-impacted-by-lapsus-breach\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Wed, 23 Mar 2022 16:42:34 +0000<\/strong><\/p>\n<p>The LAPSUS$ group claims to have breached access management provider Okta.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/awareness\/2022\/03\/okta-admits-366-customers-may-have-been-impacted-by-lapsus-breach\/\">Okta admits 366 customers may have been impacted by LAPSUS$ breach<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[15496,11510,25215,20354],"class_list":["post-18568","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-awareness","tag-breach","tag-lapsus","tag-okta"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18568"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18568\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18568"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}