Okta Says Hackers Stole Data for All Customer Support Users (www.bloomberg.com)
from return2ozma@lemmy.world to technology@lemmy.world on 29 Nov 2023 04:23
https://lemmy.world/post/8900058

#technology

threaded - newest

[deleted] on 29 Nov 2023 06:16 next collapse

.

redline23@lemmy.world on 29 Nov 2023 12:13 collapse

“While we have not seen direct evidence that the threat actor is using this list to launch phishing attacks against support system users,” the company said to customers, “phishing attacks are a constant threat.” Okta, which manages user authentication services for thousands of corporate clients, didn’t immediately provide comment.

Okta’s shares plunged last month after the San Francisco-based company disclosed that hackers had used a stolen credential to access its support system. At the time, a company spokesman estimated that about 184 clients, representing roughly 1% of the Okta’s customers, were affected. It wasn’t the first time Okta had been breached. The company disclosed last year that a hacking group had broken into its system after the gang posted screenshots that appeared to show access to Okta accounts.

The company said in its letter to customers that a recent audit found more data was stolen than it initially thought, prompting it to revise its findings. The firm also discovered that some Okta employee information was included in stolen reports, according to the customer notice reviewed by Bloomberg.

The customer report contained fields for customer user names, company names and mobile phone numbers, Okta said, while noting that the majority of the fields were blank and didn’t include credentials or sensitive personal data. For more than 99% of customers listed in the report, Okta said, the only contact information stolen were full names and email addresses. Read More: Okta Falls on News That Hackers Viewed Some Customer Files Many of the affected users of the customer support system are Okta administrators, according to the company’s notice. Okta is scheduled to report earnings on Wednesday. The company said in its notice to customers that it would publicly disclose the new details on the same day.

Here is the rest of that article

atx_aquarian@lemmy.world on 29 Nov 2023 06:30 next collapse

including names and email addresses

By now, that’s been stolen from so many companies that I wonder how much new info is really being compromised compared to what’s already out there. Speaking anecdotally, my spam already comes personalized. Like, even the obviously-not-from-a-partner phishy-looking stuff.

darklypure@kbin.social on 29 Nov 2023 07:51 collapse

True, but I think the point here is context. What the hackers get here is the context that X recipient gets email on X address from Okta so I'd more likely than not to respond.

BeigeAgenda@lemmy.ca on 29 Nov 2023 06:30 next collapse

I looked it up: Okta is a corporate identity management service, they handle stuff like SSO, logins, AD, etc…

So I see why they are targeted.

Kbin_space_program@kbin.social on 29 Nov 2023 08:35 next collapse

Yeah, they handle SSO between platforms. Not the registrations though.

They just handle the SSO part, if you have three systems connected, you need to sync the users between them on your own, then they can log them in to all three .

Onaltau@lemm.ee on 29 Nov 2023 09:32 next collapse

I understood some of those words!

TheBat@lemmy.world on 29 Nov 2023 10:13 next collapse

They build digital corridors so at your workplace you can use multiple different applications without having to login every time.

ripcord@kbin.social on 29 Nov 2023 10:29 collapse

Hopefully all of them except maybe SSO

key@lemmy.keychat.org on 29 Nov 2023 14:53 collapse

That’s not completely true. That’s often the ideal way to use them (especially with integrating pre-existing applications). But they do offer (crappy) user stores in their auth0 product which can handle registration including UI.

Kbin_space_program@kbin.social on 29 Nov 2023 15:20 collapse

Interesting, I guess they don't offer that for all platforms.

RizzRustbolt@lemmy.world on 29 Nov 2023 15:33 collapse

And they work with federal contractors. So double the reason to target them.

Reverendender@sh.itjust.works on 29 Nov 2023 08:47 next collapse

In my experience, Customer Support Users often have access to fuck shit up pretty good.

UltraMagnus0001@lemmy.world on 30 Nov 2023 04:23 collapse

Chrysler login for scanning their vehicles uses okta