{"id":23262,"date":"2023-10-30T16:12:41","date_gmt":"2023-10-31T00:12:41","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/10\/30\/news-16992\/"},"modified":"2023-10-30T16:12:41","modified_gmt":"2023-10-31T00:12:41","slug":"news-16992","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/10\/30\/news-16992\/","title":{"rendered":"1Password reports security incident after breach at Okta"},"content":{"rendered":"\n<p>Password manager 1Password says it\u2019s been affected by&nbsp;a&nbsp;<a href=\"https:\/\/www.beyondtrust.com\/blog\/entry\/okta-support-unit-breach\" target=\"_blank\" rel=\"noreferrer noopener\">breach at Okta<\/a>, but it reports no user data has been stolen.<\/p>\n<p>In a&nbsp;<a href=\"https:\/\/blog.1password.com\/files\/okta-incident\/okta-incident-report.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">security incident report<\/a>, 1Password says that a member of&nbsp;its IT team received an unexpected email suggesting they had initiated an Okta report&nbsp;of a list of admins.&nbsp;They hadn&#8217;t&nbsp;requested it so they reported the email to the security department.<\/p>\n<p>An internal investigation showed unsolicited activity in the Okta environment which was traced to a suspicious IP address. Later it was confirmed that an attacker had accessed 1Password\u2019s Okta environment&nbsp;using&nbsp;administrative privileges. 1Password says it took action straight away:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>&#8220;We immediately terminated the activity, investigated, and found no compromise of user data or other sensitive systems, either employee-facing or user-facing.&#8221;<\/p>\n<\/blockquote>\n<h2 class=\"wp-block-heading\" id=\"h-okta-breach\">Okta breach<\/h2>\n<p>On Friday,&nbsp;<a href=\"https:\/\/sec.okta.com\/harfiles\" target=\"_blank\" rel=\"noreferrer noopener\">Okta said<\/a>&nbsp;it spotted&nbsp;an attacker using a stolen credential to access Okta&#8217;s support case management system. This allowed them to view files uploaded by certain Okta customers as part of recent support cases.<\/p>\n<p>It&#8217;s normal for Okta support to&nbsp;ask customers to upload an HTTP Archive (HAR) file, which allows the team to troubleshoot issues by replicating what&#8217;s going on in the browser. As such, a&nbsp;HAR file can contain sensitive data, including cookies and session tokens, that&nbsp;cybercriminals can use to impersonate valid users.<\/p>\n<p>A member of 1Password\u2019s IT team was engaged with Okta support, and at their request, created and uploaded such a HAR file to the Okta Support Portal.<\/p>\n<p>In the early morning hours of Friday, September 29, 2023 an unknown actor used the same Okta session that was used to create the HAR file to access the Okta administrative portal.<\/p>\n<p>If the 1Password incident is a consequence of the same Okta breach, this puts the Okta breach which was&nbsp;<a href=\"https:\/\/www.beyondtrust.com\/blog\/entry\/okta-support-unit-breach\" target=\"_blank\" rel=\"noreferrer noopener\">discovered by BeyondTrust<\/a>&nbsp;on October 2, 2023 in a new light as regards to the timeline. BeyondTrust says it had to persist with escalations within Okta until October 19, when Okta security leadership notified BeyondTrust that&nbsp;it had indeed experienced a breach and that&nbsp;BeyondTrust&nbsp;were one of the affected customers.<\/p>\n<p>Okta says it has now notified all impacted customers.<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cAll customers who were impacted by this have been notified. If you\u2019re an Okta customer and you have not been contacted with another message or method, there is no impact to your Okta environment or your support tickets.\u201d<\/p>\n<\/blockquote>\n<p>1Password suspects that the attackers were merely looking for information that would allow them to attack on a larger scale. They tried, for example, to access the IT team member\u2019s user dashboard, but that attempt was blocked by Okta. They also requested a report of administrative users, which was the action that triggered the investigation.<\/p>\n<p>A thorough investigation of the circumstances and the device that was used to upload the HAR file, did not reveal any reasons for the information to be captured. It did reveal which vendor 1Password relies on in a crisis though.<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cThe IT team member\u2019s macOS laptop that was used is currently offline, and was scanned with the free version of Malwarebytes, which reported no findings.\u201d<\/p>\n<\/blockquote>\n<p>It wasn\u2019t until after Okta revealed&nbsp;it&#8217;d had a security incident,&nbsp;that 1Password realized that the information was stolen during that incident.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-data-breach\">Data breach<\/h2>\n<p>There are some actions you can take if you are, or suspect you may have been, the victim of a data breach.<\/p>\n<ul>\n<li>Check the vendor&#8217;s advice. Every breach is different, so check with the vendor to find out what&#8217;s happened, and follow any specific advice they offer.<\/li>\n<li>Change your password. You can make a stolen password useless to thieves by changing it. Choose a&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/computer\/how-to-create-a-strong-password\" target=\"_blank\" rel=\"noreferrer noopener\">strong password<\/a>&nbsp;that you don&#8217;t use for anything else. Better yet, let a&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/what-is-password-manager\" target=\"_blank\" rel=\"noreferrer noopener\">password manager<\/a>&nbsp;choose one for you.<\/li>\n<li>Enable two-factor authentication (2FA). If you can, use a FIDO2-compliant hardware key, laptop or phone as your second factor. Some forms of&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/glossary\/multi-factor-authentication-mfa\" target=\"_blank\" rel=\"noreferrer noopener\">two-factor authentication (2FA)<\/a>&nbsp;can be phished just as easily as a password. 2FA that relies on a FIDO2 device can\u2019t be phished.<\/li>\n<li>Watch out for fake vendors. The thieves may contact you posing as the vendor. Check the vendor website to see if they are contacting victims, and verify any contacts using a different communication channel.<\/li>\n<li>Take your time. Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.<\/li>\n<\/ul>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<p>Malwarebytes Managed Detection and Response (MDR) simply and effectively closes your security resources gap, reduces your risk of unknown threats, and increases your security efficiency exponentially. Malwarebytes MDR staffs highly experienced Tier 2 and Tier 3 analysts who are hands-on with customer endpoints, ensuring critical threats are quickly identified and a thorough response is rapidly deployed.<\/p>\n<p>Want to learn more about MDR? Get a free trial below.<\/p>\n<div class=\"wp-block-malware-bytes-button mb-button\" id=\"mb-button-25991fd7-c4c9-46b5-ac0b-0fb3bd09903d\">\n<div class=\"mb-button__row u-justify-content-center\">\n<div class=\"mb-button__item mb-button-item-0\">\n<p class=\"btn-main\"><a href=\"https:\/\/www.malwarebytes.com\/business\/contact-us\/\">TRY NOW<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/10\/1password-reports-security-incident-after-breach-at-okta\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Password manager 1Password says it\u2019s been affected by&#160;a&#160;breach at Okta, but it reports no user data has been stolen. In a&#160;security&#8230; <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[28477,30385,32,20354,30386],"class_list":["post-23262","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-1password","tag-har-file","tag-news","tag-okta","tag-session"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23262","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23262"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23262\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23262"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}