{"id":2871,"date":"2022-03-31T15:04:57","date_gmt":"2022-03-31T21:04:57","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/?p=2871"},"modified":"2022-03-31T15:05:00","modified_gmt":"2022-03-31T21:05:00","slug":"companies-are-affected-after-the-okta-breach","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/2022\/03\/31\/companies-are-affected-after-the-okta-breach\/","title":{"rendered":"Companies are affected after the Okta breach."},"content":{"rendered":"\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" data-src=\"https:\/\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/QIKYZPRZM5ORJKCZKMUMPOU3NU.jpg\" alt=\"Illustration shows Okta logo\" width=\"769\" height=\"512\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 769px; --smush-placeholder-aspect-ratio: 769\/512;\" \/><figcaption>Okta logo is displayed in this illustration taken March 22, 2022.<\/figcaption><\/figure>\n\n\n\n<p>Okta Inc (<a rel=\"noreferrer noopener\" href=\"https:\/\/www.reuters.com\/companies\/OKTA.O\" target=\"_blank\">OKTA.O<\/a>), whose authentication services are used to grant access to networks by firms such as FedEx Corp (<a rel=\"noreferrer noopener\" href=\"https:\/\/www.reuters.com\/companies\/FDX.N\" target=\"_blank\">FDX.N<\/a>) and Moody&#8217;s Corp (<a rel=\"noreferrer noopener\" href=\"https:\/\/www.reuters.com\/companies\/MCO.N\" target=\"_blank\">MCO.N<\/a>), and more than 15,000 clients, announced on Tuesday that it had been hacked and that some clients may have been affected.  Okta reported that in the &#8220;worst-case&#8221; 366 of its clients were affected and that their &#8220;data may have been viewed or acted upon&#8221; &#8211; the company&#8217;s stock dropped 9% as a result of the announcement.<\/p>\n\n\n\n<p>Although the breadth of the breach is unknown, it might have significant ramifications because Okta, located in San Francisco, manages access to hundreds of firms&#8217; networks and apps.<\/p>\n\n\n\n<p>Now let us get to the topic, they were hacked and this breach was carried out by the cyber-gang Lapsus$. Lapsus$ hackers utilize the same old method to get around MFA.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-src=\"https:\/\/www.avatier.com\/blog\/wp-content\/uploads\/2019\/07\/blog-Self-Assess-Your-MFA-Implementation-in-5-Steps-copy.jpg\" alt=\"How to Update Your IT Security Policy With Multi Factor Authentication -  Avatier\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/><figcaption>picture from google<\/figcaption><\/figure>\n\n\n\n<p>According to Ekram Ahmed of cyber-security firm Checkpoint, the ransomware gang is a South American threat actor that has lately been linked to cyber-attacks on certain high-profile targets. The cyber-gang is infamous for extortion, threatening the publication of sensitive information if its victims do not comply with their demands.<\/p>\n\n\n\n<p>The gang has claimed to have broken into several high-profile firms, including Microsoft, in the past.<\/p>\n\n\n\n<p>The malicious activities, which granted the threat actor access to nearly 366 Okta customers, took place over a five-day period between January 16 and 21, during which the hackers carried out various phases of the attack, including privilege escalation after gaining an initial foothold, persistence, lateral movement, and internal network reconnaissance.<\/p>\n\n\n\n<p>The vulnerability was eventually discovered two months later, when LAPSUS$ uploaded images of the compromise on their Telegram channel on March 22.<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" data-src=\"https:\/\/thehackernews.com\/new-images\/img\/b\/R29vZ2xl\/AVvXsEjIuRkqgmlKVXfxhg4xC0BF3BVZe0j7Se-G18go-u3JEdnb3VHd-4oK_zgD6EQGXWKxnd54mF1mHZETIWX2QAQT_zfmJ5Uv3SCYTuaLbPRtce-_nDA-Gm3A85SDgCU3klvwgabkrXYl1Ip6QvlbuZqMH621A_tqigIF_aNGXk8YaVXuw2Z9O2VVTR6y\/s728-e100\/timeline.jpg\" alt=\"\" width=\"768\" height=\"444\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 768px; --smush-placeholder-aspect-ratio: 768\/444;\" \/><\/figure>\n\n\n\n<p>Okta said that it just received a short report regarding the issue from Sitel on March 17 after sharing symptoms of the breach with them on January 21. The criminal gang then said on March 22, the same day it posted the screenshots, that it had gotten a copy of the full investigative report.<\/p>\n\n\n\n<p>The criminal gang then received a copy of the full investigative report on March 22, the same day it posted the screenshots.<\/p>\n\n\n\n<p>&#8220;Even when Okta received the Mandiant report in March explicitly detailing the attack, they continued to ignore the obvious signs that their environment was breached until LAPSUS$ shined a spotlight on their inaction,&#8221; Demirkapi wrote in a tweet thread.<\/p>\n\n\n\n<p>In a comprehensive FAQ written on March 25, the San Francisco-based firm admitted that it made a &#8220;mistake&#8221; in failing to warn its consumers about the January hack.<\/p>\n\n\n\n<p>&#8220;In light of the evidence that we have gathered in the last week, it is clear that we would have made a different decision if we had been in possession of all of the facts that we have today,&#8221; Okta&nbsp;said, adding it &#8220;should have more actively and forcefully compelled information from Sitel.&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" data-src=\"https:\/\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/YOPKQLPI4JIX3MCH5J3KHOIGNE.jpg\" alt=\"Illustration shows Okta logo\" width=\"584\" height=\"392\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 584px; --smush-placeholder-aspect-ratio: 584\/392;\" \/><figcaption>People&#8217;s miniatures are seen in front of the Okta logo in this illustration taken March 22, 2022.<\/figcaption><\/figure>\n\n\n\n<p><span>C<\/span><strong><span>ompany&#8217;s<\/span> reaction after the attack: <\/strong><\/p>\n\n\n\n<p>Cloudflare, one of Okta&#8217;s clients, stated in a blog post that it did not believe it had been hacked.<\/p>\n\n\n\n<p>&#8220;There is no evidence that our system has been hacked or compromised,&#8221; FedEx told Reuters.<\/p>\n\n\n\n<p>Thanet, which uses Okta to make it easier for employees to manage and sign in to different apps, told BBC News that the attack &#8220;has not affected the council&#8217;s data&#8217;s security,&#8221; but that it &#8220;will continue to monitor the issue.&#8221;<\/p>\n\n\n\n<p>The National Cyber Security Centre in the United Kingdom claimed it has &#8220;not observed any indication of effect in the United Kingdom.&#8221;<\/p>\n\n\n\n<p><strong>At last, here is a video<\/strong> <strong>from youtube which summarises it all:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Here\u2019s what to know about the reported hack on Okta\" width=\"640\" height=\"360\" data-src=\"https:\/\/www.youtube.com\/embed\/buf0GgE5118?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" data-load-mode=\"1\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><strong>Sources:<\/strong><\/p>\n\n\n\n<p class=\"has-primary-color has-text-color\">[1] <a href=\"https:\/\/www.bbc.com\/news\/technology-60849687\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.bbc.com\/news\/technology-60849687<\/a><\/p>\n\n\n\n<p class=\"has-primary-color has-text-color\">[2] <a href=\"https:\/\/techcrunch.com\/2022\/03\/28\/lapsus-passwords-okta-breach\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/techcrunch.com\/2022\/03\/28\/lapsus-passwords-okta-breach\/<\/a><\/p>\n\n\n\n<p class=\"has-primary-color has-text-color\">[3] <a href=\"https:\/\/thehackernews.com\/2022\/03\/new-report-on-okta-hack-reveals-entire.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/thehackernews.com\/2022\/03\/new-report-on-okta-hack-reveals-entire.html<\/a><\/p>\n\n\n\n<p class=\"has-primary-color has-text-color\">[4] <a href=\"https:\/\/www.wired.com\/story\/lapsus-okta-hack-sitel-leak\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.wired.com\/story\/lapsus-okta-hack-sitel-leak\/<\/a><\/p>\n\n\n\n<p class=\"has-primary-color has-text-color\">[5] <a rel=\"noreferrer noopener\" href=\"https:\/\/www.reuters.com\/technology\/authentication-services-firm-okta-says-it-is-investigating-report-breach-2022-03-22\/\" target=\"_blank\">https:\/\/www.reuters.com\/technology\/authentication-services-firm-okta-says-it-is-investigating-report-breach-2022-03-22\/<\/a><\/p>\n\n\n\n<p>Thank you all for your time and consideration.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Okta Inc (OKTA.O), whose authentication services are used to grant access to networks by firms such as FedEx Corp (FDX.N) and Moody&#8217;s Corp (MCO.N), and more than 15,000 clients, announced on Tuesday that it had been hacked and that some clients may have been affected. Okta reported that in the &#8220;worst-case&#8221; 366 of its clients &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/2022\/03\/31\/companies-are-affected-after-the-okta-breach\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Companies are affected after the Okta breach.&#8221;<\/span><\/a><\/p>\n","protected":false},"author":422,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[15],"tags":[],"class_list":["post-2871","post","type-post","status-publish","format-standard","hentry","category-cpsc-329-602-w22","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Hardik Maheshwari","author_link":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/author\/hardik-maheshwari\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/2871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/users\/422"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/comments?post=2871"}],"version-history":[{"count":12,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/2871\/revisions"}],"predecessor-version":[{"id":2884,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/2871\/revisions\/2884"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/media?parent=2871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/categories?post=2871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/tags?post=2871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}