Advertisement
Australia markets closed
  • ALL ORDS

    8,022.70
    +28.50 (+0.36%)
     
  • ASX 200

    7,749.00
    +27.40 (+0.35%)
     
  • AUD/USD

    0.6604
    -0.0017 (-0.26%)
     
  • OIL

    78.20
    -1.06 (-1.34%)
     
  • GOLD

    2,366.90
    +26.60 (+1.14%)
     
  • Bitcoin AUD

    92,096.98
    -3,110.48 (-3.27%)
     
  • CMC Crypto 200

    1,261.18
    -96.83 (-7.13%)
     
  • AUD/EUR

    0.6128
    -0.0010 (-0.16%)
     
  • AUD/NZD

    1.0963
    -0.0006 (-0.05%)
     
  • NZX 50

    11,755.17
    +8.59 (+0.07%)
     
  • NASDAQ

    18,161.18
    +47.72 (+0.26%)
     
  • FTSE

    8,433.76
    +52.41 (+0.63%)
     
  • Dow Jones

    39,512.84
    +125.08 (+0.32%)
     
  • DAX

    18,772.85
    +86.25 (+0.46%)
     
  • Hang Seng

    18,963.68
    +425.87 (+2.30%)
     
  • NIKKEI 225

    38,229.11
    +155.13 (+0.41%)
     
Engadget
Why you can trust us

Engadget has been testing and reviewing consumer tech since 2004. Our stories may include affiliate links; if you buy something through a link, we may earn a commission. Read more about how we evaluate products.

Okta says Lapsus$ breach affected only two customers

The threat group 'actively controlled' a contractor workstation for just 25 minutes.

Dado Ruvic / reuters

Following a breach of its systems in January, Okta has released a forensic report finding that the threat group Lapsus$ accessed just two active customers via a third-party company. Lapsus$ "actively controlled" a workstation belong to an engineer at support firm Sitel for 25 minutes on January 21st, the company said.

"The threat actor actively controlled a single workstation, used by a Sitel support engineer, with access to Okta resources," wrote Okta chief security officer David Bradbury. "During that limited window of time, the threat actor accessed two active customer tenants within the SuperUser application and viewed limited additional information in certain other applications like Slack and Jira that cannot be used to perform actions in Okta customer tenants."

While just two customers were accessed, many more users might have been affected, as Otka has 15,000 customers but over 100 million individual users. Despite the access, though, Lapsus$ was not able to do any MFA or password resets, configuration changes or customer support impersonation, Okta said. "The threat actor was unable to authenticate directly to any Okta accounts."

ADVERTISEMENT

It took Okta two months to notify customers of the Lapsus$ breach, and eventually released a statement saying it "made a mistake" in how it handled things. In a blog post last month, it revealed that 2.5 percent of its customers may have had their data viewed or acted upon during a five day window.

It now looks like the breach was far more limited in scope, but Okta said it took lessons from the situation. It terminated its relationship with the contractor in question and promised to strengthen audit procedures for others. It's also going to directly manage the devices of third parties with access to customer support tools so it can respond more "effectively" to incidents. Finally, it's adopting new systems to "help us communicate more rapidly with customers" on security issues.