Hacker Hub
Hacker Hub
Okta Breached! 366 Customers Possibly Affected - Who's behind the attack?
0:00
Current time: 0:00 / Total time: -9:28
-9:28

Okta Breached! 366 Customers Possibly Affected - Who's behind the attack?

Thursday, March 24th, 2022

Snippet from Okta blog post:

On March 22, 2022, nearly 24 hours ago, a number of screenshots were published online that were taken from a computer used by one of Okta’s third-party customer support engineers. The sharing of these screenshots is embarrassing for myself and the whole Okta team. 

In this post, I want to provide a timeline and my perspective on what has transpired, and where we are today with this investigation. I hope that it will illuminate why I am confident in our conclusions that the Okta service has not been breached and there are no corrective actions that need to be taken by our customers.

By way of background, like many SaaS providers, Okta uses several companies (“sub-processors”) to expand our workforce. These entities help us to deliver for our customers and make them successful with our products. Sitel, through its acquisition of Sykes, is an Okta sub-processor that provides Okta with contract workers for our Customer Support organization. 

On January 20, 2022, the Okta Security team was alerted that a new factor was added to a Sitel customer support engineer’s Okta account. This factor was a password. Although that individual attempt was unsuccessful, out of an abundance of caution, we reset the account and notified Sitel who engaged a leading forensic firm to perform an investigation.

The following timeline outlines the key milestones:

Timeline (times in UTC)

  • January 20, 2022, 23:18 - Okta Security received an alert that a new factor was added to a Sitel employee’s Okta account from a new location. The target did not accept an MFA challenge, preventing access to the Okta account.

  • January 20, 2022, at 23:46 - Okta Security investigated the alert and escalated it to a security incident. 

  • January 21, 2022, at 00:18 - The Okta Service Desk was added to the incident to assist with containing the user’s account. 

  • January 21, 2022, at 00:28 - The Okta Service Desk terminated the user’s Okta sessions and suspended the account until the root cause of suspicious activity could be identified and remediated.

  • January 21, 2022, at 18:00 - Okta Security shared indicators of compromise with Sitel. Sitel informed us that they retained outside support from a leading forensic firm. 

  • January 21, 2022, to March 10, 2022 - The forensic firm’s investigation and analysis of the incident was conducted until February 28, 2022, with its report to Sitel dated March 10, 2022.

  • March 17, 2022 - Okta received a summary report about the incident from Sitel

  • March 22, 2022, at 03:30 - Screenshots shared online by LAPSUS$

  • March 22, 2022, at 05:00 - Okta Security determined that the screenshots were related to the January incident at Sitel 

  • March 22, 2022, at 12:27 - Okta received the complete investigation report from Sitel

The report from the forensic firm highlighted that there was a five-day window of time between January 16-21, 2022 when the threat actor had access to the Sitel environment, which we validated with our own analysis. 

In trying to scope the blast radius for this incident, our team assumed the worst-case scenario and examined all of the access performed by all Sitel employees to the SuperUser application for the five-day period in question. Over the past 24 hours we have analyzed more than 125,000 log entries to ascertain what actions were performed by Sitel during the relevant period. We have determined that the maximum potential impact is 366 (approximately 2.5% of) customers whose Okta tenant was accessed by Sitel.  

Okta Blog Post

You can now read Hacker Hub in the new Substack app for iPhone!

Read Hacker Hub in the Substack app
Available for iOS and Android

With the app, you’ll have a dedicated Inbox for my Substack and any others you subscribe to. New posts will never get lost in your email filters, or stuck in spam. Longer posts will never cut-off by your email provider. Comments and rich media will all work seamlessly. Overall, it’s a big upgrade to the reading and listening experience.

The Substack app is currently available for iOS. If you don’t have an Apple device, you can join the Android waitlist here.

Hacker Hub
Hacker Hub
Join me (William Parks) as I discuss everything from the latest cybersecurity tools released, to the groundbreaking news of attacks and breaches that have occurred. Updated on a weekly basis - I can't wait to help you keep your security knowledge up-to-date with the rest of the Information Security industry. See you on the next episode!