Okta’s Support System Breach Exposes Customer Data to Unidentified Threat Actors
Crucially, the support system and Okta’s core service were entirely separate; this security breach didn’t compromise the company’s primary service. Indeed, the Auth0/CIC case management system wasn’t impacted. Despite this insulation, the support system acts as a repository of potentially sensitive HTTP Archive (HAR) files required for troubleshooting purposes. Uploaded by customers, these HAR files could contain delicacies for cybercriminals—including cookies and session tokens.
Subsequent to the security breach, Okta promptly informed all affected customers and worked relentlessly to revoke any comprised session tokens, foiling any potential abuse. However, the specifics regarding the unauthorized access’s timeline, scale, and initial detection still remain undisclosed by Okta.
Statistically, Okta’s influence in the digital security sphere can’t be understated; it boasts an expansive clientele of over 17,000 customers and manages approximately 50 billion users. This massive breadth of influence doesn’t come without its own vulnerabilities. Two of Okta’s most significant clients, BeyondTrust and Cloudflare, confirmed being targeted in the support system attack. In fact, it was BeyondTrust who first detected suspicious activity and alerted Okta.
According to a detailed report on a Cloudflare blog, it appeared that the threat actor had hijacked a session token from a Cloudflare employee’s support ticket, obtaining access to Cloudflare systems on October 18. While the security breach did manage to compromise two separate employee accounts within the Okta platform, Cloudflare maintains that no customer information or systems were accessed during the attack.
Strikingly, Okta was notified of a breach by BeyondTrust as early as October 2. However, the attack on Cloudflare suggested that the threat actor continued to have access until at least October 18. Despite their vigilance in reporting the suspicious activity in a timely manner, the breach did not impact either BeyondTrust’s infrastructure or its customers.
This incident highlights the challenges faced by information security providers, especially one as significant as Okta. As the provider responsible for single sign-on services employed by many large companies, Okta has experienced multiple attacks regarding its high-value status. Despite these challenges, the company continues its dedicated work in maintaining world-leading security capabilities and offers a cell-based architecture known for its resilience and security.
If you enjoyed this article, please check out our other articles on CyberNow