• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Our Services
  • Contact Us
  • Newsletter
  • Top Nav Social Icons

Mobile ID World

Mobile ID World

Identification Revolution

  • Mobile ID
    • What Is Mobile ID?
    • Identity Associations
    • Premier Partners
    • FAQ
  • News
  • Solutions
    • Behavioral
    • Facial Recognition
    • Fingerprint Biometrics
    • Iris Biometrics
    • Second Factor
    • Smart Cards
    • Smartphones
    • Vital
    • Voice
    • Wearable Tech
    • Other
  • Applications
    • Access Control
    • Cloud Technology
    • Commerce
    • Enterprise
    • Healthcare
    • Identification
    • Internet of Things
    • Law Enforcement
    • Strong Online Authentication
  • Exclusive
    • Interviews
    • Featured Articles
    • Podcasts
  • Companies
  • Events

Investigation Finds Only Two Clients Affected in Okta Security Breach

April 19, 2022

A January security breach seems to have done far less damage than Okta had initially feared. The company confirmed that it had been the target of a Lapsus$ hacking attack on March 22, and indicated that as many as 366 clients could have been affected in a follow-up statement earlier this month.

Investigation Finds Only Two Clients Affected in Okta Security Breach

However, that tally was based on a worst-case scenario. Okta has now completed its forensic investigation, and is reporting that its actual exposure was limited to a 25-minute window on January 21. During that time, the hacker was able to obtain information on two Okta clients through the company’s SuperUser application, but was not able to reset any password or authentication factors or reconfigure any internal settings.

The actual attack occurred at Sitel, a third-party Okta vendor that also provided call center support services for Okta clients. The hacker was able to take over the workstation of one employee to access the SuperUser application, but was unable to impersonate that staff member in any interactions with clients, or log in through any of Okta’s official account channels. The hacker did manage to view information shared in apps like Slack and Jira, though Okta noted that neither app can be used to carry out any actions that affect its clients.

The investigation was carried out by a third-party forensic firm, and examined the entire five-day window from January 16 to January 21. The 366-client projection accounts for every single Okta client that Sitel interacted with through the SuperUser application during that period.

While the report is favorable for Okta, the company acknowledged that the breach has negatively impacted its reputation, and the company is taking steps to try to restore trust. The company has already cut ties with Sitel, and has shared and discussed the final forensics report with the affected organizations to make sure they understand what occurred.

Okta is also enacting a new Security Action Plan to improve third-party security moving forward. To that end, the company will force all of its support sub-processors to use the Okta IDAM solution for authentication when they log into their corporate applications, as part of a broader push toward a Zero Trust security environment.

For its part, Okta will take a more hands-on role to ensure that those new policies get followed. The company will directly manage any devices with access to its customer support system, and will audit its partners more frequently to guarantee compliance. The changes will give Okta more visibility into the activity on its network, and allow it to restrict the amount of information that individual customer support employees have access to through the system.

Sources: Okta and VentureBeat

Filed Under: Industry News Tagged With: authentication, cybersecurity, digital security, enterprise security, hack attacks, Lapsus$, Okta, security breaches, zero trust, zero trust architecture

Related News & Articles

Google Follows Apple’s Lead in Pixel 4’s Biometric Tech

Credence ID Launches Heavily Upgraded Biometric Handheld: CredenceTWO-R

Cerence Adds Lifelike News Reader to AI Portfolio

Primary Sidebar

Register For the Next Virtual Identity Summit

Register now!

Tweets

Sponsored Links

facetec logo

FaceTec’s patented, industry-leading 3D Face Authentication software anchors digital identity, creating a chain of trust from user onboarding to ongoing authentication on all modern smart devices and webcams. FaceTec’s 3D FaceMaps™ make trusted, remote identity verification finally possible. As the only technology backed by a persistent spoof bounty program and NIST/iBeta Certified Liveness Detection, FaceTec is the global standard for Liveness and 3D Face Matching with millions of users on six continents in financial services, border security, transportation, blockchain, e-voting, social networks, online dating and more. www.facetec.com

FACEPHI is a global leader in Facial Recognition technology and in Mobile Biometrics technologies. With a strong concentration in the financial sector, FacePhi’s product is rapidly becoming a service used by banks all over the world. Its implementation doesn’t just save money, it is also a way to attract clients and build loyalty, while increasing the security of transactions for both the customer and the business. To learn more about FacePhi, visit https://www.facephi.com/en/

Recent Posts

  • Thai Authorities Approve Mobile ID for Airport Boarding
  • New Yoti Solution Ties Biometrics to e-Signatures
  • Kenya’s New President Pushes for Digital ID By Year’s End
  • MDL, Digital ID Gain Momentum in State Efforts
  • Brazil-based Selfie Onboarding Startup Reports 250% Sales Jump, Global Expansion

Footer

  • About Us
  • Company Directory
  • Advertise With Us
  • Contact Us
  • Privacy Policy
  • Terms of Use
  • Archives
  • CCPA: Do not sell my personal info.

Follow Us

Copyright © 2023 MobileIDWorld