{"id":18570,"date":"2022-03-23T10:45:03","date_gmt":"2022-03-23T18:45:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/03\/23\/news-12303\/"},"modified":"2022-03-23T10:45:03","modified_gmt":"2022-03-23T18:45:03","slug":"news-12303","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/03\/23\/news-12303\/","title":{"rendered":"The Third-Party Okta Hack Leaves Customers Scrambling"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/623a477c28f38333befbabcd\/master\/pass\/Nasdaq-Okta-Sec_AP_17097624872676.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Wed, 23 Mar 2022 00:13:04 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/lily-hay-newman\">Lily Hay Newman<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">The digital extortion<\/span> group <a href=\"https:\/\/www.wired.com\/story\/lapsus-hacking-group-extortion-nvidia-samsung\/\">Lapsus$<\/a> threw the security world into disarray on Monday with <a href=\"https:\/\/www.wired.com\/story\/okta-hack-microsoft-bing-code-leak-lapsus\/\">claims that it had gained access<\/a> to a \u201csuper user\u201d administrative account for the identity management platform Okta. Since so many organizations use Okta as the gatekeeper to their suite of cloud services, such an attack could have major ramifications for any number of Okta customers. While Okta has released new details\u2014including clarifying what \u201csuper user\u201d means and the potential extent of the breach\u2014questions about the incident, and the company&#x27;s handling of it, remain unanswered.<\/p>\n<p class=\"paywall\">Okta said in a short statement early Tuesday morning that in late January it had \u201cdetected an attempt to compromise the account of a third-party customer support engineer working for one of our subprocessors,\u201d but that \u201cthe matter was investigated and contained by the subprocessor.\u201d<\/p>\n<p class=\"paywall\">In an <a data-offer-url=\"https:\/\/www.okta.com\/blog\/2022\/03\/updated-okta-statement-on-lapsus\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.okta.com\/blog\/2022\/03\/updated-okta-statement-on-lapsus\/&quot;}\" href=\"https:\/\/www.okta.com\/blog\/2022\/03\/updated-okta-statement-on-lapsus\/\" rel=\"nofollow noopener\" target=\"_blank\">expanded statement<\/a> on Tuesday afternoon, Okta&#x27;s chief security officer, David Bradbury, said categorically, \u201cThe Okta service has not been breached.\u201d The details that have emerged, though, including from Bradbury&#x27;s statement itself, paint a confusing picture, and the conflicting information has made it difficult for Okta customers and others who depend on them to assess their risk and the extent of the damage.<\/p>\n<p class=\"paywall\">\u201cThere are two big unknowns when it comes to the Okta incident: the specific nature of the incident and how it might impact Okta customers,\u201d says Keith McCammon, chief security officer at the network security and incident-response firm Red Canary. \u201cThis is exactly the type of situation that leads customers to expect more proactive notification of security incidents that impact their product or customers.\u201d<\/p>\n<p class=\"paywall\">On Tuesday evening, about eight hours after posting Bradbury&#x27;s statement, Okta updated the notice with some expanded information. Specifically, the company admitted that roughly 2.5 percent of its customers \u201chave potentially been impacted,\u201d adding that their data \u201cmay have been viewed or acted upon.\u201d In a later update, the company clarified that the \u201cmaximum potential impact\u201d of the breach is 366 customers; Okta <a data-offer-url=\"https:\/\/www.okta.com\/sites\/default\/files\/2022-02\/Businesses-at-Work-2022-Annual-Report.pdf\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.okta.com\/sites\/default\/files\/2022-02\/Businesses-at-Work-2022-Annual-Report.pdf&quot;}\" href=\"https:\/\/www.okta.com\/sites\/default\/files\/2022-02\/Businesses-at-Work-2022-Annual-Report.pdf\" rel=\"nofollow noopener\" target=\"_blank\">reported<\/a> having more than 14,000 customers as of February.\u00a0<\/p>\n<p class=\"paywall\">Bradbury&#x27;s original statement said that the company only received analysis of the January incident this week from the private forensics firm it hired to assess the situation. The timing coincides with Lapsus$&#x27;s decision to release screenshots, via Telegram, that claim to detail its Okta administrative account access from late January.\u00a0<\/p>\n<p class=\"paywall\">The company&#x27;s expanded statement opens by saying that it \u201cdetected an unsuccessful attempt to compromise the account of a customer support engineer working for a third-party provider.\u201d But apparently some attempt was successful, because Bradbury goes on to say that the incident report recently revealed \u201ca five-day window of time between January 16-21, 2022, where an attacker had access to a support engineer\u2019s laptop.\u201d<\/p>\n<p class=\"paywall\">The statement adds that, during those five days, attackers would have had the full access that support engineers are granted, which does not include the ability to create or delete users, download customer databases, or access existing user passwords but does include access to Jira tickets, lists of users, and, crucially, the ability to reset passwords and multifactor authentication (MFA) tokens. The latter is the main mechanism Lapsus$ hackers would likely have abused to take over Okta logins at target organizations and infiltrate.<\/p>\n<p class=\"paywall\">Okta says that it is contacting customers who may have been impacted. On Tuesday, though, companies including the internet infrastructure firm Cloudflare <a data-offer-url=\"https:\/\/blog.cloudflare.com\/cloudflare-investigation-of-the-january-2022-okta-compromise\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/blog.cloudflare.com\/cloudflare-investigation-of-the-january-2022-okta-compromise\/&quot;}\" href=\"https:\/\/blog.cloudflare.com\/cloudflare-investigation-of-the-january-2022-okta-compromise\/\" rel=\"nofollow noopener\" target=\"_blank\">raised the question<\/a> of why they were hearing about the incident from tweets and criminal screenshots rather than from Okta itself. The identity management company seems to maintain, though, that compromising a third-party affiliate in some way is not a direct breach.<\/p>\n<p class=\"paywall\">\u201cIn Okta&#x27;s statement, they said they were not breached and that the attacker&#x27;s attempts were \u2018unsuccessful,\u2019 yet they openly admit that attackers had access to customer data,&quot; says independent security researcher Bill Demirkapi. \u201cIf Okta knew since January that an attacker may have been able to access confidential customer data, why did they never inform any of their customers?\u201d<\/p>\n<p class=\"paywall\">In practice, breaches of third-party service providers are an established attack path to ultimately compromise a primary target, and Okta itself seems to carefully limit its circle of \u201csub-processors.\u201d A <a data-offer-url=\"https:\/\/www.okta.com\/sites\/default\/files\/2021-01\/SUBPROCESSORS_INFORMATION-Jan2021.pdf\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.okta.com\/sites\/default\/files\/2021-01\/SUBPROCESSORS_INFORMATION-Jan2021.pdf&quot;}\" href=\"https:\/\/www.okta.com\/sites\/default\/files\/2021-01\/SUBPROCESSORS_INFORMATION-Jan2021.pdf\" rel=\"nofollow noopener\" target=\"_blank\">list of these affiliates<\/a> from January 2021 shows 11 regional partners and 10 sub-processors. The latter group are well-known entities like Amazon Web Services and Salesforce. The screenshots point to Sykes Enterprises, which has a team located in Costa Rica, as a possible affiliate that may have had an employee Okta administrative account compromised. Okta later confirmed the subprocessor as business services outsourcing company Sitel Group, which <a data-offer-url=\"https:\/\/www.sitel.com\/news\/sitel-group-completes-acquisition-of-sykes\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.sitel.com\/news\/sitel-group-completes-acquisition-of-sykes\/&quot;}\" href=\"https:\/\/www.sitel.com\/news\/sitel-group-completes-acquisition-of-sykes\/\" rel=\"nofollow noopener\" target=\"_blank\">purchased<\/a> Sykes in September 2021. Sitel, Okta said, hired a forensic firm to investigate the breach. Okta said it received a summary report about the incident on March 17 but didn&#x27;t receive the full report until Tuesday afternoon.<\/p>\n<p class=\"paywall\">Sykes, meanwhile, said in a statement, first <a data-offer-url=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2022\/03\/22\/fury-as-okta-the-company-that-manages-100-million-logins-fails-to-tell-customers-about-breach-for-months\/?sh=2db5de1d8734\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.forbes.com\/sites\/thomasbrewster\/2022\/03\/22\/fury-as-okta-the-company-that-manages-100-million-logins-fails-to-tell-customers-about-breach-for-months\/?sh=2db5de1d8734&quot;}\" href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2022\/03\/22\/fury-as-okta-the-company-that-manages-100-million-logins-fails-to-tell-customers-about-breach-for-months\/?sh=2db5de1d8734\" rel=\"nofollow noopener\" target=\"_blank\">reported by <em>Forbes<\/em><\/a> on Tuesday, that it suffered an intrusion in January.\u00a0<\/p>\n<p class=\"paywall\">\u201cFollowing a security breach in January 2022 impacting parts of the Sykes network, we took swift action to contain the incident and to protect any potentially impacted clients,\u201d the company said in a statement. \u201cAs a result of the investigation, along with our ongoing assessment of external threats, we are confident there is no longer a security risk.\u201d<\/p>\n<p class=\"paywall\">The Sykes statement went on to say that the company is \u201cunable to comment on our relationship with any specific brands or the nature of the services we provide for our clients.\u201d<\/p>\n<p class=\"paywall\">As for the \u201csuper user\u201d account Lapsus$ claimed to have accessed, Okta said in an updated statement that SuperUser is an application \u201cused to perform basic management functions of Okta customer tenants,\u201d and doesn&#x27;t provide \u201c&#x27;god mode-like access&#x27; to all its users.&quot;<\/p>\n<p class=\"paywall\">On its Telegram channel, Lapsus$ posted a detailed (and frequently self-congratulatory) rebuttal to Okta\u2019s statement.<\/p>\n<p class=\"paywall\">\u201cThe potential impact to Okta customers is NOT limited, I&#x27;m pretty certain resetting passwords and [multifactor authentication] would result in complete compromise of many clients systems,\u201d the group wrote. \u201cIf you are commited [<em>sic<\/em>] to transparency how about you hire a firm such as Mandiant and PUBLISH their report?&quot;<\/p>\n<p class=\"paywall\">For many Okta customers struggling to understand their potential exposure from the incident, though, all of this does little to clarify the full scope of the situation.<\/p>\n<p class=\"paywall\">\u201cIf an Okta support engineer can reset passwords and multifactor authentication factors for users, this could present real risk to Okta customers,\u201d Red Canary&#x27;s McCammon says. \u201cOkta customers are trying to assess their risk and potential exposure, and the industry at large is looking at this through the lens of preparedness. If or when something like this happens to another identity provider, what should our expectations be regarding proactive notification and how should our response evolve?\u201d<\/p>\n<p class=\"paywall\">Clarity from Okta would be especially valuable in this situation, because Lapsus$&#x27;s general <a href=\"https:\/\/www.wired.com\/story\/lapsus-hacking-group-extortion-nvidia-samsung\/\">motivations are still unclear<\/a>.\u00a0<\/p>\n<p class=\"paywall\">\u201cLapsus$ has expanded their targets beyond specific industry verticals or specific countries or regions,\u201d says Pratik Savla, a senior security engineer at the security firm Venafi. &quot;This makes it harder for analysts to predict which company is most at risk next. It&#x27;s likely an intentional move to keep everyone guessing, because these tactics have been serving the attackers well so far.&quot;<\/p>\n<p class=\"paywall\">As the security community scrambles to get a handle on the Okta situation, Lapsus$ could have even more revelations brewing.<\/p>\n<p class=\"paywall\"><em>Updated Wednesday March 23, 2022, at 12:20am ET to include expanded comment from Okta including the percentage of customers it says were potentially impacted by the breach.<\/em><\/p>\n<p class=\"paywall\"><em>Updated Wednesday March 23, 2022, at 12:10pm ET to include the exact number of customers that could have been impacted by the breach, new details about the third-party subprocessor whose employee&#x27;s account was accessed, and assertions from Okta that SuperUser is an application without \u201cgod mode-like access&quot; to customer accounts.<\/em><\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/okta-hack-customers-lapsus-breach\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/623a477c28f38333befbabcd\/master\/pass\/Nasdaq-Okta-Sec_AP_17097624872676.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Wed, 23 Mar 2022 00:13:04 +0000<\/strong><\/p>\n<p>Authentication firm Okta&#8217;s statements on the Lapsus$ breach fails to answer key questions.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-18570","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18570"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18570\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18570"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}