• About
    • About Us
    • Our Expertise
    • Meet The Team
    • Careers
  • Microsoft Sentinel
  • Managed Services
    • Overview
    • Monitoring & Detection
    • Protection
    • Response
    • Training
  • Cyber Assessments
  • Consultancy
    • Consulting Services
    • Cyber Executives
  • News & Resources
    • In the News
    • Blog
    • Resources
  • Contact
Can We Help?
  • About
    • About Us
    • Our Expertise
    • Meet The Team
    • Careers
  • Managed Services
    • Overview
    • Monitoring & Detection
    • Protection
    • Response
    • Training
  • Cyber Assessments
  • Consultancy
    • Consultancy Service
    • Cyber Executives
  • News & Resources
    • In the News
    • Blogs
    • Resources
  • Contact
  • Can We Help?

CSA’s Understanding Of The Okta Data Breach So Far

When it comes to the Lapsus$ hacking group’s recent breach of Okta, the access management software company, our ears have been to the ground and our eyes locked onto the headlines. Okta has released multiple statements about the breach, and other unconfirmed sources have added to the story, which have only muddied matters. Here’s our executive summary of the events so far.

What is the Okta breach?

Firstly, what do Okta do? If you’ve ever used ‘Sign in with Apple’ or ‘Sign in with Google,’ then you’ve used some sort of access management to authorise your sign-in activity. Okta aims to provide this on a larger scale, allowing a single sign in option for a large number of industry applications and services such as Zoom, Google Workspace, Jira Software, Office 365, and more. If malicious actors managed to breach the security of a service like Okta, then it would potentially give them access to dozens of other websites.

Unfortunately for Okta and its users, the unthinkable happened earlier this year, and Lapsus$ is the group claiming to have compromised the software company. This name might already be familiar to some, as they’ve been in the news claiming to have compromised and leaked Microsoft’s source code, including 90% of the code for Bing and 45% of the source code for Cortana. Suffice to say, the Lapsus$ group is creating quite a stir in the cyber security scene - if the claims are true, they’ve compromised the data of two huge targets in quick succession.

How did the attack happen?

Microsoft have been tracking the activity of Lapsus$ under the name DEV-0537, and have described them as “known for using a pure extortion and destruction model without deploying ransomware payloads”. The group’s suspected to be based in Brazil, and although it originally targeted victims in the United Kingdom and South America, it’s since expanded its scope worldwide.

According to Microsoft, “their tactics include phone-based social engineering; SIM-swapping to facilitate account takeover; accessing personal email accounts of employees at target organisations; paying employees, suppliers, or business partners of target organisations for access to credentials and Multi-Factor Authentication (MFA) approval; and intruding in the ongoing crisis-communication calls of their targets.”

To gain access to systems, Lapsus$ has been observed using multiple methods:

  • Paying users of target organisations to give them access (credentials and MFA)
  • Stealing credentials and tokens using the Redline password stealer
  • Searching for credentials within public code repositories
  • By using criminal underground forums, purchasing session tokens and credentials

Lapsus$ has also been spotted advertising for rogue internal parties within organisations to provide credentials, MFA access, and other ways of accessing and compromising their potential victims’ networks. On the 10th of March 2022, they posted the following advertisement:

What did Okta do?

At the moment, Okta’s CSO, David Bradbury, claims that only 366 clients, or 2.5% of their customer base, have potentially been impacted. The Okta security team’s log analysis has provided that Lapsus$ gained access to the account of a support engineer. The engineer in question was from a third party company, Sitel, which provides Okta with contract workers.

We investigated the timeline shared by Bradbury and his team, and found that the initial activity occurred on the 20th of January 2022 at 23:18, when a Sitel user received a MFA access request from a new location. This request was blocked with a ticket, and was escalated as a security incident 28 minutes after its initial observation at 23:46. Okta were made aware of this shortly afterwards.

After relevant user account suspension and sessions were terminated, the Indicators of Compromise were sent to an undisclosed forensics firm. It wasn’t until the 10th of March that the report was created and dated, and another seven days had passed before Okta received the summary report of the incident.

On the 22nd of March 2022, Lapsus$ shared some screenshots of Okta’s internal systems online, claiming that they had managed to access Okta’s superuser account. Okta later confirmed that the images were real, and were related to the January incident.

The images below were posted on the Lapsus$ Telegram channel:

After the breach, Okta and Lapsus$ both released contradicting statements about the turn of events, which can be found below.

In Okta’s statement, which can be read here, David Bradbury claimed it was an unsuccessful attack and tried to downplay the events:

In the counter statement from Lapsus$, the hacking group boasted about what they’d done and went on to criticise Okta’s cyber security:

Okta has since reflected upon the timescale and its handling of the breach, and on the 23rd of March, David Bradbury stated, “I am greatly disappointed by the long period of time that transpired between our notification to Sitel and the issuance of the complete investigation report. Upon reflection, once we received the Sitel summary report we should have moved more swiftly to understand its implications.”

How the breach could impact you 

Something you might be asking yourself is: “if I don’t use Okta, why should I care?” Well, incidents such as these should be used as a learning process for everyone. If methods of compromise such as those used by Lapsus$, including bribery of employees, insider threats, and rogue trusted parties, continue to become more popular with threat actors, then your business could soon be on the receiving end of a similar cyber attack.

In the event that your company utilises third party providers such as Okta, or is currently thinking about getting involved with another similar business, we recommend ensuring a cyber security due diligence process is followed on their company prior to working with them. Make sure you know who you’re planning to work with, and understand the potential risks associated with the given tasks.

Ensure that all MFA events that appear to be out of the ordinary for a particular user are investigated completely (and promptly). Always be vigilant about attempts coming from new IP addresses and unfamiliar geolocations, at unexpected times. Microsoft has passwordless sign in capabilities now, which only requires an email and an MFA confirmation to allow a user access to your domain - an indication that it’s more important than ever to be monitoring MFA activity.

Last, but not least, ensure that parties with access to your infrastructure have the relevant training and policies in place to minimise the possibility of third party compromises affecting your own business.

Over the past week, UK police revealed that they’d arrested seven people in relation to Lapsus$, but if this development means the cybercrime gang will be stopped remains to be seen. Whether or not Lapsus$’ hacking days are over, their method of hacking isn’t new, and will likely be used by other groups before long. You can expect CSA to keep you apprised of any developments in the world of cyber attacks, and if you want to find out how we can help you strengthen your own cyber defences, you can get in touch with us today.

Related articles

Posted on December 16, 2021

CSA Awards of the Year 2021

As we near the end of year, an incredibly busy year for our teams in terms of growth and innovation, we wanted to take a moment to…

Posted on December 14, 2021

Cyber Essentials Changes: Here's Everything You Need To Know

Rapid digital transformation, mass adoption of cloud-based services and migration to home-working were necessary changes for businesses…

Posted on December 8, 2021

CSA 12 Days of Cyber Christmas

As the end of the year fast approaches, we wanted to share a little refresher on ways to ensure your technology and data remains…

Posted on December 1, 2021

Planning To Shop Online This Holiday Season? Here Are The Cybercrimes You Need To Be Aware Of

Black Friday and Christmas are considered a blessing and a curse within the retail industry. It’s a time where retailers…

Posted on October 20, 2021

This Apple “AirTag” Vulnerability could be harvesting your credentials

During late September, the headlines were hit with the news of a vulnerability within Apple’s AirTag…

Posted on October 13, 2021

September Security Roundup

Currently, the world faces not one pandemic but two: Coronavirus and the rise of ransomware attacks…

Posted on October 10, 2021

Is Data More Valuable Than Jewels? The A-List Cyber Heist That’s Putting Ransomware Attacks On The Map

Cybercriminals don’t discriminate. It doesn’t matter how famous you are, if your information is vulnerable…

Posted on October 6, 2021

CSA adds Lookout Mobile Endpoint Security to growing solutions portfolio

Following the global pandemic, the mass migration to remote working was a necessary move…

Posted on September 15, 2021

​​The Rising Popularity of NFTs and The Rising Security Threat

The art world is known for being ahead of the curve, adopting new and interesting technologies to…

Posted on September 7, 2021

TG1021 (Praying Mantis): The new threat actor group that could be targeting your IIS servers!

Recently, an infamous threat actor group going by the name of TG1021 or Praying Mantis…

Posted on August 19, 2021

Is Cyber Training and Education working?

The report from the ICO on the ‘surprising’ decline in personal data breaches…

Posted on August 13, 2021

How did an unknown hacker steal over $600M in cryptocurrencies in the biggest ever crypto based cyber-attack?

On 10th August 2021, Poly Network announced in a tweet that it had been attacked…

Posted on May 12, 2021

How to Prevent a Ransomware Attack

According to a 2020 survey by Sophos, 51% of organisations were hit by Ransomware in the last year…

Posted on March 23, 2021

Is your Microsoft M365 service secure from attackers? Are you sure?

The mass migration to remote working as a result of the coronavirus pandemic has…

Posted on January 10, 2021

Covid-19: How to prepare your staff
for remote working

Since the initial Covid-19 outbreak, the nation’s workforce had to learn to quickly…

Posted on December 13, 2020

Covid-19: Cyber Criminals Launch
Their Own ‘Virus’

Whilst the world is currently preoccupied with public health, cyber attackers have taken…

Posted on November 20, 2020

The rise of Covid-19 phishing scams

Whilst the rollout of the Covid-19 vaccine across the UK brings with it the good news…

About

  • About Us
  • Our Expertise
  • Meet The Team
  • Careers

Managed Services

  • Overview
  • Monitoring & Detection
  • Protection
  • Response
  • Training

Consultancy

  • Consulting Services
  • Cyber Executives

News & Resources

  • In the News
  • Blog
  • Resources

Cyber Assessments

Can We Help?

Partner Portal

Contact

Head Office Unit 11, Wheatstone Court, Waterwells Business Park, GL2 2AQ
©2022 Cyber Security Associates. All Rights Reserved.
Terms of Use Privacy Policy
Powered by P1C
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use, see our Privacy Policy.
Cookie settingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT