What's new

Hackers Stole Access Tokens from Okta’s Support Unit

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

Wallace_n_Gromit

Senior Member


Addendum 10/22/2023: Looks like it wasn't even Okta that discovered the breach. One of their customers found the breach which had been leveraged to attempt a breach of their own information system. Cloudflare reported to Okta that Okta.s system had been compromised. Cloudflare also offered some recommendations for Okta to harden their system(s). 🤨

https://blog.cloudflare.com/how-cloudflare-mitigated-yet-another-okta-compromise/
 
Last edited:
Online? Trust nothing...
 
Online? Trust nothing...
Article doesn't seem to indicate the Okta Verify Authenticator app is impacted.

Periodically as I go to various financial/health care/etc websites I have noticed a very quick redirect through an okta url. Seems that some businesses I frequent use okta to authenticate my session, if I understand it right.
 
Last edited:
It's a bit of a mess, but not near the degree of the current Citrix Netscaler problem...



All of these enterprise "Something" as a Service apps have concerns - and a rich target for criminals...
 
With Okta - it's an enterprise one-touch/single sign on application not based on trust, but verification...

Why is this important - Zero Trust Security... Okta puts themselves in that Verify path...

So yes, it's a big deal...

I understand the Okta security breach reported in the linked article and its potential impact on those who use Okta. Yes, potentially a big deal.

I don't understand what 'Online? Trust nothing...' has to do with it.

OE
 
It means to limit your exposure when online by any means. If you don't need to be online, don't trust the 'safety net' that cannot be designed to save anyone, let alone everyone, all the time.
 
It means to limit your exposure when online by any means. If you don't need to be online, don't trust the 'safety net' that cannot be designed to save anyone, let alone everyone, all the time.

Again, sounds like wise advice, but I still don't know what to do with it... and now there's a 'safety net' that can't be trusted... that figures... trust nothing online. This is getting scarry now... what's the point of a safety net that can't be trusted, whatever that is? I do need to be online... what should I do?... logon and then hide in a closet?

OE
 
If you receive a message from your "wife" on iMessage, Viber, WhatsApp, etc. - goes over Internet, ask for the secret pass phrase first. On a question "Are you home?" never answer with "yes/no", but say "maybe" or simply don't reply. If you are brave enough to reply - lock the car doors or hide in the closet, depending on your location. Make sure you use prepaid SIM card, better registered on someone else's name and in another state. This is what "trust nothing" means. They will still get you so be constantly afraid. This will keep your alert levels high. When it happens - it won't be something unexpected for you.

The advice is similar to "Watch it!". Wise only if you know what to watch for.
 
Still don't know what to do with it. Okay.

Re-read the post you quoted. This isn't rocket science.

If you 'need' to be online. Know you're not private/secure/safe. No matter what promises are made. The level of those breaches is variable and their timing is unknown.

I know you're smarter than hiding in a closet.
 
the Okta compromise is starting to gain traction with upstream reports...

This is not as bad as Solarwinds (for now), but it does give another good example of the risks of SaaS, esp with regards to identity and access to resources
 
It means to limit your exposure when online by any means. If you don't need to be online, don't trust the 'safety net' that cannot be designed to save anyone, let alone everyone, all the time.

I think it's more situational awareness aka only the paranoid survive...

End-points are generally secure - I'm ok with being at the local starbucks and logging into my morgan stanley account to do a couple of stock trades - it's a TLS connection, and I can trust it for now...

I don't need a commercial VPN to do that - that VPN doesn't actually add any value to that transaction.

Things though, like Okta and the like, they're a bit concerning, as they aggregate logins across multiple sources, so if they are compromised, this causes issues of trust...

That's at a corp level, but at a personal level - let's say you have a password manager - lastpass is a good example.


For the audience here - the threat is commercial VPN's and cloud-pass authenticators as they tend to minimize the true threat surface - aka "trust us, we have your back" when they have issues keeping their own infrastructure secure...
 
Again, sounds like wise advice, but I still don't know what to do with it... and now there's a 'safety net' that can't be trusted... that figures... trust nothing online. This is getting scarry now... what's the point of a safety net that can't be trusted, whatever that is? I do need to be online... what should I do?... logon and then hide in a closet?

OE
I think it's more situational awareness aka only the paranoid survive...



For the audience here - the threat is commercial VPN's and cloud-pass authenticators as they tend to minimize the true threat surface - aka "trust us, we have your back" when they have issues keeping their own infrastructure secure...


@OzarkEdge Look at what they are saying more from a social aspect, rather than a technical aspect. What they are driving at is Social Engineering is at the center of all this.

Social Engineering is always the core vulnerability.

You may have secure systems that aren't so vulnerable. But we humans almost always have some form of vulnerability to be exploited.

Well, perhaps the same could be said for many software and hardware.


Is it possible to create | produce something invulnerable?

Understand where the vulnerabilities lie at all times.
 
You may have secure systems that aren't so vulnerable. But we humans almost always have some form of vulnerability to be exploited.

And this is how Mitnik worked...

 
Similar threads
Thread starter Title Forum Replies Date
L&LD Some good news too. Hackers get hacked/taken down. General Network Security 1

Similar threads

Latest threads

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top