- cross-posted to:
- [email protected]
- [email protected]
- cross-posted to:
- [email protected]
- [email protected]
I looked it up: Okta is a corporate identity management service, they handle stuff like SSO, logins, AD, etc…
So I see why they are targeted.
Yeah, they handle SSO between platforms. Not the registrations though.
They just handle the SSO part, if you have three systems connected, you need to sync the users between them on your own, then they can log them in to all three .
That’s not completely true. That’s often the ideal way to use them (especially with integrating pre-existing applications). But they do offer (crappy) user stores in their auth0 product which can handle registration including UI.
Interesting, I guess they don’t offer that for all platforms.
I understood some of those words!
They build digital corridors so at your workplace you can use multiple different applications without having to login every time.
Hopefully all of them except maybe SSO
And they work with federal contractors. So double the reason to target them.
including names and email addresses
By now, that’s been stolen from so many companies that I wonder how much new info is really being compromised compared to what’s already out there. Speaking anecdotally, my spam already comes personalized. Like, even the obviously-not-from-a-partner phishy-looking stuff.
True, but I think the point here is context. What the hackers get here is the context that X recipient gets email on X address from Okta so I’d more likely than not to respond.
In my experience, Customer Support Users often have access to fuck shit up pretty good.
deleted by creator
“While we have not seen direct evidence that the threat actor is using this list to launch phishing attacks against support system users,” the company said to customers, “phishing attacks are a constant threat.” Okta, which manages user authentication services for thousands of corporate clients, didn’t immediately provide comment.
Okta’s shares plunged last month after the San Francisco-based company disclosed that hackers had used a stolen credential to access its support system. At the time, a company spokesman estimated that about 184 clients, representing roughly 1% of the Okta’s customers, were affected. It wasn’t the first time Okta had been breached. The company disclosed last year that a hacking group had broken into its system after the gang posted screenshots that appeared to show access to Okta accounts.
The company said in its letter to customers that a recent audit found more data was stolen than it initially thought, prompting it to revise its findings. The firm also discovered that some Okta employee information was included in stolen reports, according to the customer notice reviewed by Bloomberg.
The customer report contained fields for customer user names, company names and mobile phone numbers, Okta said, while noting that the majority of the fields were blank and didn’t include credentials or sensitive personal data. For more than 99% of customers listed in the report, Okta said, the only contact information stolen were full names and email addresses. Read More: Okta Falls on News That Hackers Viewed Some Customer Files Many of the affected users of the customer support system are Okta administrators, according to the company’s notice. Okta is scheduled to report earnings on Wednesday. The company said in its notice to customers that it would publicly disclose the new details on the same day.
Here is the rest of that article
Chrysler login for scanning their vehicles uses okta