Okta’s Support System Breach Exposes Customer Data to Unidentified Threat Actors

Are you supposed to be here right now?, Okta's data breach

In a concerning development, Okta, a provider of identity services, has revealed a data breach in their support case management system. This incident involved unauthorized individuals using stolen login credentials to acquire access, enabling them to view sensitive files uploaded by certain Okta customers as part of their support cases.

Crucially, the support system and Okta’s core service were entirely separate; this security breach didn’t compromise the company’s primary service. Indeed, the Auth0/CIC case management system wasn’t impacted. Despite this insulation, the support system acts as a repository of potentially sensitive HTTP Archive (HAR) files required for troubleshooting purposes. Uploaded by customers, these HAR files could contain delicacies for cybercriminals—including cookies and session tokens.

Subsequent to the security breach, Okta promptly informed all affected customers and worked relentlessly to revoke any comprised session tokens, foiling any potential abuse. However, the specifics regarding the unauthorized access’s timeline, scale, and initial detection still remain undisclosed by Okta.

Statistically, Okta’s influence in the digital security sphere can’t be understated; it boasts an expansive clientele of over 17,000 customers and manages approximately 50 billion users. This massive breadth of influence doesn’t come without its own vulnerabilities. Two of Okta’s most significant clients, BeyondTrust and Cloudflare, confirmed being targeted in the support system attack. In fact, it was BeyondTrust who first detected suspicious activity and alerted Okta.

According to a detailed report on a Cloudflare blog, it appeared that the threat actor had hijacked a session token from a Cloudflare employee’s support ticket, obtaining access to Cloudflare systems on October 18. While the security breach did manage to compromise two separate employee accounts within the Okta platform, Cloudflare maintains that no customer information or systems were accessed during the attack.

Strikingly, Okta was notified of a breach by BeyondTrust as early as October 2. However, the attack on Cloudflare suggested that the threat actor continued to have access until at least October 18. Despite their vigilance in reporting the suspicious activity in a timely manner, the breach did not impact either BeyondTrust’s infrastructure or its customers.

This incident highlights the challenges faced by information security providers, especially one as significant as Okta. As the provider responsible for single sign-on services employed by many large companies, Okta has experienced multiple attacks regarding its high-value status. Despite these challenges, the company continues its dedicated work in maintaining world-leading security capabilities and offers a cell-based architecture known for its resilience and security.

If you enjoyed this article, please check out our other articles on CyberNow

October 21, 2023
Identity services provider Okta recently disclosed a security incident involving its support case management system where unidentified threat actors used stolen credentials to gain access, allowing them to view confidential files uploaded by specific Okta customers as part of their support cases.