9.6 C
London
Tuesday, October 24, 2023

1Password Detects Suspicious Exercise Following Okta Help Breach


Oct 24, 2023NewsroomCyber Assault / Password Administration

1Password Hack Okta Support Breach

Widespread password administration answer 1Password mentioned it detected suspicious exercise on its Okta occasion on September 29 following the assist system breach, however reiterated that no person information was accessed.

“We instantly terminated the exercise, investigated, and located no compromise of person information or different delicate techniques, both employee-facing or user-facing,” Pedro Canahuati, 1Password CTO, mentioned in a Monday discover.

The breach is alleged to have occurred utilizing a session cookie after a member of the IT crew shared a HAR file with Okta Help, with the risk actor performing the under set of actions –

  • Tried to entry the IT crew member’s person dashboard, however was blocked by Okta
  • Up to date an current IDP tied to our manufacturing Google atmosphere
  • Activated the IDP
  • Requested a report of administrative customers

The corporate mentioned it was alerted to the malicious exercise after the IT crew member obtained an electronic mail concerning the “requested” administrative person report.

Cybersecurity

1Password additional mentioned it has since taken quite a lot of steps to bolster safety by denying logins from non-Okta IDPs, lowering session occasions for administrative customers, tighter multi-factor authentication (MFA) guidelines for admins, and lowering the variety of tremendous directors.

“Corroborating with Okta assist, it was established that this incident shares similarities of a recognized marketing campaign the place risk actors will compromise tremendous admin accounts, then try to control authentication flows and set up a secondary identification supplier to impersonate customers inside the affected group,” 1Password mentioned.

It is value mentioning that the identification companies supplier had beforehand warned of social engineering assaults orchestrated by risk actors to acquire elevated administrator permissions.

As of writing, it is at the moment not recognized if the assaults have any connection to Scattered Spider (aka 0ktapus, Scatter Swine, or UNC3944), which has a monitor file of concentrating on Okta utilizing social engineering assaults to acquire elevated privileges.

The event comes days after Okta revealed that unidentified risk actors leveraged a stolen credential to interrupt into its assist case administration system and steal delicate HAR recordsdata that can be utilized to infiltrate the networks of its prospects.

The corporate instructed The Hacker Information that the occasion impacted about 1 p.c of its buyer base. A few of the different prospects who’ve been affected by the incident embody BeyondTrust and Cloudflare.

“The exercise that we noticed recommended they performed preliminary reconnaissance with the intent to stay undetected for the aim of gathering info for a extra subtle assault,” 1Password mentioned.

Discovered this text attention-grabbing? Observe us on Twitter and LinkedIn to learn extra unique content material we submit.



Latest news
Related news

LEAVE A REPLY

Please enter your comment!
Please enter your name here