Okta aims to restore trust after Lapsus$ hack

Share post

Okta Co-Founder and CEO Todd McKinnon aims to restore trust after Lapsus$ hack. The disclosure of the data breach took months and was finally only made public by the hacker group Lapsus$. After that, Okta also admitted the successful attack. So Todd McKinnon in an interview on the “Protocol” portal.

In January, the hacking group Lapsus$ found its way onto the laptop of a technician at a third-party Okta support organization - initially believed to have given the group access to potentially hundreds of Okta customers. A later investigation that included additional information found only two customers were affected, according to Okta.

According to Okta, only two customers were affected

But the data breach itself was never the main concern anyway. Many emphasized the fact that it was Lapsus$ and not Okta who told the world about the incident, posting screenshots as evidence on Telegram in March. This raised more than a few questions for Okta on how they're handling the months-old known breach.

The irony is that Okta, as a prominent identity and access management provider, is in business to stop the kind of attack that hit its former support provider, Sitel. McKinnon said the firm did not use the Okta product or multifactor authentication on the compromised engineer's VPN and Office 365 accounts. This left them vulnerable to attack.

The attack and the process

Okta has put a lot of effort into ensuring that the Okta product and platform are secure, and that Okta employees work in safe environments. The external support organization was in a different ring outside of it. Okta says self-critically that it should have been checked that access is secure.

Okta has since ended business relationships with support provider Sitel. As part of the workup, Okta engaged a forensic firm to conduct a full assessment of the security breach. From this it became clear that the attacker originally intruded via a VPN gateway, which did not have multi-factor authentication. After that, Lapsus$ stepped in and exploited a number of Windows vulnerabilities to move and escalate privileges. They were also able to get into Office 365 - because again it didn't have multifactor authentication.

The full interview with additional statements from Todd McKinnon, co-founder and CEO of Okta is available on the Protocol portal.

Kasperky has already analyzed the attack further.

More at Protocol.com

 

Matching articles on the topic

Risk: High API growth without sufficient IT security 

A study shows that nine out of ten decision makers know that APIs are a Trojan horse for cyberattacks - but the ➡ Read more

Major hack at Dropbox Sign

Sign, the Dropbox service for legally binding electronic signatures on contracts and the like, must report a cyberattack. E-mail addresses, user names, ➡ Read more

Cybersecurity through anomaly threat detection

Claroty's Medigate platform receives an important expansion with the Advanced Anomaly Threat Detection (ATD) module for anomaly threat detection. Obtained thereby ➡ Read more

LockBit is back: cyber attack on KJF with 17 clinics and schools 

The KJF - the headquarters of the Catholic Youth Welfare Department of the Diocese of Augsburg e. V. suffered an extensive cyber attack. The hackers around ➡ Read more

EU cybersecurity certification

With the “European Cybersecurity Scheme on Common Criteria” (EUCC), there is now a first systematic approach to certifying cybersecurity. ➡ Read more

Encrypt sensitive Microsoft 365 data

For public sector entities and systemically important utilities that fall under KRITIS guidelines, the rules for data security are repeated ➡ Read more

DORA in response to cyber attacks in the financial sector

The number of cyber attacks on the financial sector is increasing worldwide, and according to financial regulators, cyber attacks are also occurring in Germany ➡ Read more

Fatal: Managing directors consider awareness training to be unnecessary

A representative survey shows that almost half of German management consider important security awareness training to be unnecessary. This evaluation reveals ➡ Read more