OKTA Security Breach 2022
Many large corporate customers were horrified to learn of the recent Okta security breach.
Okta says 366 corporate customers, or about 2.5% of its customer base, пострадали от нарушения безопасности, позволившего хакерам получить доступ к внутренней сети компании.
The authentication giant admitted the compromise after the Lapsus$ hacking and extortion group posted screenshots of Okta’s apps and systems on Monday, примерно через два месяца после того, как хакеры впервые получили доступ к его сети.
Первоначально в нарушении обвинили неназванного подпроцессора, который предоставляет услуги поддержки клиентов Okta.. В обновленное заявление в среду, Okta’s chief security officer David Bradbury confirmed the subprocessor is a company called Sykes, which last year was acquired by Miami-based contact center giant Sitel.
Okta has admitted it “made a mistake” by not telling customers sooner about a security breach in January, in which hackers were able to access the laptop of a third-party customer support engineer.
The Lapsus$ hacking group published screenshots of Okta’s systems on March 22, taken from the laptop of a Sitel customer support engineer, which the hackers had remote access to on January 20.
“We want to acknowledge that we made a mistake. Sitel is our service provider for which we are ultimately responsible. In January, we did not know the extent of the Sitel issue – only that we detected and prevented an account takeover attempt and that Sitel had retained a third party forensic firm to investigate. At that time, we didn’t recognize that there was a risk to Okta and our customers
оставьте ответ