Okta blames employee for hack

Share post:

Okta is blaming a recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop, exposing credentials that led to the theft of data from multiple Okta customers.

In a brief post-mortem, Okta security chief David Bradbury said the internal lapse was the “most likely avenue” for the breach that affected hundreds of Okta customers, including cybersecurity companies BeyondTrust and Cloudflare.

The threat actor gained unauthorized access to files inside Okta’s customer support system from September 28 to October 17, 2023. Some of these files contained session tokens that could be used for session hijacking attacks.

Bradbury said the threat actor was able to hijack the legitimate Okta sessions of five customers. The hackers leveraged a service account stored in the system itself that was granted permissions to view and update customer support cases.

Bradbury said the most likely avenue for exposure of this credential is the compromise of the employee’s personal Google account or personal device.

The employee had signed in to their personal Google profile on the Chrome browser of their Okta-managed laptop. The username and password of the service account had been saved into the employee’s personal Google account.

Bradbury admitted to a failure of internal controls to spot the breach.

The sources for this piece include an article in SecurityWeek.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways