• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Okta: Just Two Customers Impacted by Lapsus Breach

You are here: Home / General Cyber Security News / Okta: Just Two Customers Impacted by Lapsus Breach
April 20, 2022

Okta has uncovered that just two of its consumers ended up affected by an incident in January in which risk actors compromised a 3rd-party vendor’s workstation.

The authentication professional done its investigation into the events that took put between January 16 and 21 this yr, when it was thought that a hacker from the Lapsus group gained access to again-stop devices.

Beforehand, Okta estimated that 366 customers may possibly have experienced their tenants accessed by the attackers by using a Sitel guidance engineer’s device.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Having said that, in an update yesterday, Okta CSO David Bradbury reported that just two prospects ended up impacted, with the attackers possessing entry to the workstation for only 25 minutes.

“During that limited window of time, the threat actor … considered limited more data in specific other applications like Slack and Jira that simply cannot be utilized to accomplish steps in Okta buyer tenants,” he ongoing.

“The danger actor was not able to correctly carry out any configuration modifications, MFA or password resets, or purchaser help ‘impersonation’ events. The menace actor was unable to authenticate straight to any Okta accounts.”

The findings would appear to close speculation that the incident enabled Lapsus to compromise multiple huge-title tech makes in a short time, stealing and leaking sensitive IP and supply code.

It continues to be to be viewed how these corporations were being compromised, although just one principle is that Lapsus compensated insiders to present access.

Okta has taken many steps to restore trust with its shoppers, which includes terminating its connection with Sitel and requiring all “sub-processor” associates to adopt Zero Rely on architectures and use Okta’s IDAM answer for their workplace applications.

It will also be limiting what technological help engineers can see in its buyer assist resource and will instantly control all 3rd-party seller products that obtain customer support resources.

It’s hoped that the latter stage will pace incident reaction actions and make sure the company can provide better transparency and certainty to prospects early on in the response cycle.


Some parts of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Global Dwell Time Drops but EMEA Lags
Next Post: UK Government Staff Hit with Billions of Malicious Emails in 2021 Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • CISA Unveils Ransomware Notification Initiative
  • WooCommerce Patches Critical Plugin Flaw Affecting Half a Million Sites
  • GitHub Updates Security Protocol For Operations Over SSH
  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet

Copyright © TheCyberSecurity.News, All Rights Reserved.