Podcast
Root Causes 217: What's the Deal with the Recent Okta Security Breach?


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
April 14, 2022
In March the LAPSIS$ hacking group convincingly announced a breach of Okta systems, potentially exposing Okta customers to additional compromise. Despite Okta's initial statements to the contrary, it ultimately turned out that up to 366 Okta customers may be affected. Our hosts walk through the events of the attack, how it unfolded over time, and how this breach was revealed.
Podcast Transcript
Lightly edited for flow and brevity.
The important part to this is that the screenshots seemed to suggest that they had achieved a pretty high level amount of privilege within Okta’s systems. So, in other words, Okta being the big one-time – the, the – sorry.
Support agency called Sitel that actually had been compromised. So, what we’ve learned, Tim, and, I’ll just tell a little bit of the detail, and we can talk through some of this. It looks like what the initial facts are, and these are the important, these are high level facts, is that somebody at Sitel was socially engineered at some point, and their credentials had made it on to the dark web. The attackers, the second set of attackers, being this Lapsus Group, used those credentials to then be able to get into systems within that third party provider who had, of course, the ability to do things such as resetting passwords of Okta customers.
So, the story continues, Tim. And just for those of you who haven’t followed along super closely, there have been arrests related to this attack, and apparently, and this was, I think Brian Krebs has reported on this. I know the BBC has reported on this. But an unnamed person in the UK has been arrested as well as some of, apparently, some of this person’s compatriots in South Africa. The reason we don’t know the name of the person in the UK that was arrested is because they’re only 16 or 17 years old.
Therefore, if you’ve got legit username and passwords to very, very important administrators floating around the dark web, you’re already sunk.
One of the issues, of course, that could be argued here is that this exact same attack group has been known to actually put out ads and hire people internally to these organizations to do things such as click yes on a push notification for MFA or to type in an OTP on behalf of the attackers. So in other words, these guys also use insider attacks which can bypass some of that. But on the other hand, as I say, the attack as it was done would have been defeated by a stronger form of authentication. You’re correct.
But also what’s interesting about that is when you think insider attack, you imagine like a guy knows a guy kind of thing. No, these are complete strangers. These are complete strangers that are being recruited online to do this.

