• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
1password detects suspicious activity following okta support breach

1Password Detects Suspicious Activity Following Okta Support Breach

You are here: Home / General Cyber Security News / 1Password Detects Suspicious Activity Following Okta Support Breach
October 24, 2023

Preferred password administration option 1Password explained it detected suspicious activity on its Okta occasion on September 29 subsequent the support system breach, but reiterated that no consumer facts was accessed.

“We right away terminated the exercise, investigated, and found no compromise of consumer details or other sensitive techniques, either personnel-dealing with or consumer-going through,” Pedro Canahuati, 1Password CTO, claimed in a Monday discover.

The breach is explained to have transpired making use of a session cookie soon after a member of the IT group shared a HAR file with Okta Aid, with the threat actor accomplishing the underneath set of actions –

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


  • Attempted to access the IT team member’s consumer dashboard, but was blocked by Okta
  • Current an present IDP tied to our output Google surroundings
  • Activated the IDP
  • Requested a report of administrative consumers

The business claimed it was alerted to the destructive activity just after the IT group member obtained an email about the “requested” administrative person report.

Cybersecurity

1Password even more reported it has considering that taken a amount of ways to bolster security by denying logins from non-Okta IDPs, decreasing session periods for administrative people, tighter multi-factor authentication (MFA) principles for admins, and reducing the number of tremendous administrators.

“Corroborating with Okta help, it was established that this incident shares similarities of a regarded campaign where threat actors will compromise super admin accounts, then try to manipulate authentication flows and build a secondary identity company to impersonate consumers inside of the impacted group,” 1Password stated.

It really is worthy of pointing out that the identity providers service provider had previously warned of social engineering attacks orchestrated by menace actors to get elevated administrator permissions.

As of producing, it really is now not recognized if the attacks have any connection to Scattered Spider (aka 0ktapus, Scatter Swine, or UNC3944), which has a observe file of focusing on Okta using social engineering attacks to get elevated privileges.

The improvement will come times after Okta unveiled that unknown danger actors leveraged a stolen credential to crack into its guidance situation administration system and steal delicate HAR files that can be used to infiltrate the networks of its buyers.

The company advised The Hacker Information that the occasion impacted about 1 per cent of its purchaser base. Some of the other customers who have been afflicted by the incident incorporate BeyondTrust and Cloudflare.

“The action that we noticed proposed they executed preliminary reconnaissance with the intent to stay undetected for the objective of gathering information for a additional sophisticated attack,” 1Password reported.

Identified this short article interesting? Adhere to us on Twitter  and LinkedIn to study additional exclusive information we put up.


Some elements of this article are sourced from:
thehackernews.com

Previous Post: «donot team's new firebird backdoor hits pakistan and afghanistan DoNot Team’s New Firebird Backdoor Hits Pakistan and Afghanistan
Next Post: Backdoor Implant on Hacked Cisco Devices Modified to Evade Detection backdoor implant on hacked cisco devices modified to evade detection»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.