Lapsus$ claims to have breached authentication firm Okta

Okta, a San Francisco-based identity and access management company, is investigating a report of a breach. Okta acknowledged that it detected a potential intrusion in January, and told Cybernews that 'there is no evidence of ongoing malicious activity beyond the activity detected in January.'

Lapsus$ threat actor shared screenshots of what appears to be Okta's internal environment. Ransomware group claims to have accessed superuser/admin and various other systems.

One of the screenshots demonstrates that they now allegedly can reset the user's password. Another screenshot shows that Lapsus$ might have access to Okta's Slack workplace.

Lapsus$ emphasized that they did not access any databases, focusing only on Okta customers. Okta has over 15,000 customers on its platform.

Okta is aware of the reports of a potential breach and is investigating them. "We will provide updates as more information becomes available," Okta official Chris Hollis said in a brief statement.

Some screenshots date back to 21 January, suggesting that Lapsus$ might have had access to Okta's internal environment for almost two months.

“In late January 2022, Okta detected an attempt to compromise the account of a third party customer support engineer working for one of our subprocessors. The matter was investigated and contained by the subprocessor. We believe the screenshots shared online are connected to this January event. Based on our investigation to date, there is no evidence of ongoing malicious activity beyond the activity detected in January,” Okta told Cybernews via email.

Recently, Lapsus$ has claimed responsibility for the cyberattack on Nvidia and Samsung.

More from Cybernews:

Geopolitical tensions prompt US warning for satellite operators

VPN sales rocket as Russia clamps down on web access at home

How an American teenager detected a Soviet space station launch

Iran law ‘will force tech firms to spy on citizens’

Get out or face our wrath, Anonymous tells big firms in Russia

Subscribe to our newsletter

Leave a Reply

Your email address will not be published. Required fields are markedmarked