• About
  • Subscribe
  • Contact
Tuesday, May 20, 2025
  • Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

FutureCISO Security Alert: Okta hacking spotlights how breaches are reported

FutureCIO Editors by FutureCIO Editors
March 31, 2022
Photo by Sora Shimazaki from Pexels: https://www.pexels.com/photo/man-in-blue-denim-jacket-holding-a-megaphone-5935755/

Photo by Sora Shimazaki from Pexels: https://www.pexels.com/photo/man-in-blue-denim-jacket-holding-a-megaphone-5935755/

Cloud-based authentication service provider, Okta, is the latest tech company to experience a breach of their systems. Ransomware group Lapsus$ published a message claiming they have breached the company but “didn’t steal/access any Okta database”. The target of the attack, according to the group, wasn’t Okta but its customers.

According to SP Global, the incident involved improper access to client lists of Okta, “portions of which were posted as screenshots on the messaging app Telegram.” The hack by Lapsus$ occurred following access to the lists through a compromised employee account at Sykes Enterprises, a privately-held contractor that provides customer service to Okta users.

In a blog post, Okta chief security officer David Bradbury acknowledged the incident that occurred in January 2022. A forensics report “highlighted that there was a five-day window of time between January 16-21, 2022, where an attacker had access to a support engineer’s laptop. This is consistent with the screenshots that we became aware of yesterday.”

Jonathan Knudsen, senior software strategist at Synopsys Software Integrity Group warns that organisations must recognise that software risk is a business risk and take appropriate action.

He added that managing software risk means including security at every stage of the software supply chain, everything from a concept through to the people or systems that use an application. “Even with the best possible defences, some attacks will always be successful. Incident response and business continuity plans and execution are just as important as defensive measures,” he continued.

According to Lotem Finkelstein, head of threat intelligence and research at Check Point Software, says it is still too early to know the extent of the damage to Okta customers.

“If you are an Okta customer, we strongly urge you to exercise extreme vigilance and cyber safety practices. The full extent of the cyber gang’s resources should reveal itself in the coming days,” he continued.

In the meantime, Malwarebytes offered a few pointers for Okta customers:

  • Keep an extra pair of eyes on your access logs.
  • Same for threat hunting and other logs.
  • Change the privileged Okta passwords.
  • Wait for more information.
  • Inform your customers that you are on the case.

In the meantime, one commentary from VentureBeat questions the time it has taken to report on the incident as well as the action it has taken to remediate the situation.

Related:  Modernising security starts and ends with culture
Tags: Check Point Software TechnologiesOktaSP GlobalSynopsys Software Integrity Group
FutureCIO Editors

FutureCIO Editors

No Result
View All Result

Recent Posts

  • Equinix signs first renewable energy PPA in Japan
  • Vertiv launches new cooling system for AI applications
  • Informatica launches new AI-powered cloud integration and master data management capabilities
  • SG businesses are investing in emerging technology, but ICT suppliers must adapt strategies, study finds
  • ASEAN application development landscape: Navigating challenges and embracing opportunities

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
  • Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe