TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

New Updated Okta Statement on Lapsus$

101 pointsby hexadecabout 3 years ago
New update, but posted on top of the old public post. Now indicates Okta recognizes a breach officially and has started notified affected organizations.<p><a href="https:&#x2F;&#x2F;www.okta.com&#x2F;blog&#x2F;2022&#x2F;03&#x2F;updated-okta-statement-on-lapsus&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.okta.com&#x2F;blog&#x2F;2022&#x2F;03&#x2F;updated-okta-statement-on-...</a>

15 comments

thr0wawayf00about 3 years ago
I can&#x27;t believe these idiots tried playing chicken with a hacker, heads need to roll over this one. They have completely and needlessly destroyed their credibility by trying and completely failing to control the narrative.
评论 #30774687 未加载
评论 #30774495 未加载
hexadecabout 3 years ago
I think the flip flopping is hurting them and their users more and more. What was initially a flat denial this morning has resulted in taunts from Lapsus$ on Twitter, Okta was out-scooped by Cloudflare&#x27;s public investigation. Now they admit a breach affecting 2.5% (roughly 250 orgs based on public data).<p>The webinar tomorrow should be fascinating if they allow questions.
评论 #30774448 未加载
评论 #30774347 未加载
评论 #30780553 未加载
评论 #30774540 未加载
taspeotisabout 3 years ago
Came back to the blog to view the updated statement. The OktaBot chat widget is showing a lot of self awareness:<p>&gt; Hey there! Back again to check us out? Things must be getting serious!
Hello71about 3 years ago
It&#x27;s kinda funny and also very very sad that with javascript disabled, the website loads for a split second and then is covered by a fullscreen &quot;Looks like you have Javascript turned off! Please enable it to improve your browsing experience.&quot; javascript blocker blocker, but if you delete the element, the page appears to work perfectly fine. It really is the ultimate in &quot;fuck your browsing experience, our marketing spam scripts are the most important thing&quot;.
dangabout 3 years ago
Related ongoing thread:<p><i>Updated Okta Statement on Lapsus$</i> - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=30769537" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=30769537</a> - March 2022 (220 comments)<p>Also:<p><i>DEV-0537 (LAPSUS$) Criminal actor targeting organizations</i> - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=30774406" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=30774406</a> - March 2022 (0 comments)<p><i>Lapsus$ hackers leak 37GB of Microsoft&#x27;s alleged source code</i> - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=30763623" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=30763623</a> - March 2022 (117 comments)
ggmabout 3 years ago
Do I believe the revision? Well, I believe it more than the flat denial, but I doubt the scale. I expect another revision because Okta showed they revise in the light of emerging evidence and experience.
ummonkabout 3 years ago
The fact that they didn’t disclose the original breach when they detected it should be cause for any company serious about security to reject Okta as a potential vendor.
nborwankarabout 3 years ago
They said 2.5% of customers ie companies. They didn’t say what % of individual users which is probably wayyy bigger than 2.5.
donutshopabout 3 years ago
Okta: Sorry we got caught.
judge2020about 3 years ago
Hopefully this Webinar isn&#x27;t a way to hide the details from anyone who isn&#x27;t a customer, or hopefully someone in the webinar catalogues all information shared.
jvilaltaabout 3 years ago
I found it interesting that the guy&#x27;s bio was about as long as his post with a CTA to follow him.<p>Made me skeptical about the actual post.
kafkaIncarnateabout 3 years ago
LAPSUS$ has already responded on Telegram:<p>&#x27;&#x27;&#x27;<p><a href="https:&#x2F;&#x2F;www.okta.com&#x2F;blog&#x2F;2022&#x2F;03&#x2F;updated-okta-statement-on-lapsus&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.okta.com&#x2F;blog&#x2F;2022&#x2F;03&#x2F;updated-okta-statement-on-...</a><p>I do enjoy the lies given by Okta.<p>1. We didn&#x27;t compromise any laptop? It was a thin client.<p>2. &quot;Okta detected an unsuccessful attempt to compromise the account of a customer support engineer working for a third-party provider.&quot; - I&#x27;m STILL unsure how its a unsuccessful attempt? Logged in to superuser portal with the ability to reset the Password and MFA of ~95% of clients isn&#x27;t successful?<p>4. For a company that supports Zero-Trust. <i>Support Engineers</i> seem to have excessive access to Slack? 8.6k channels? (You may want to search AKIA* on your Slack, rather a bad security practice to store AWS keys in Slack channels )<p>5. Support engineers are also able to facilitate the resetting of passwords and MFA factors for users, but are unable to obtain those passwords. - Uhm? I hope no-one can read passwords? not just support engineers, LOL. - are you implying passwords are stored in plaintext?<p>6. You claim a laptop was compromised? In that case what <i>suspicious IP addresses</i> do you have available to report?<p>7. The potential impact to Okta customers is NOT limited, I&#x27;m pretty certain resetting passwords and MFA would result in complete compromise of many clients systems.<p>8. If you are committed to transparency how about you hire a firm such as Mandiant and PUBLISH their report? I&#x27;m sure it would be very different to your report :)<p>_________________________________________________________________________________________________________________________________________________________________________________________________________ <a href="https:&#x2F;&#x2F;www.okta.com&#x2F;sites&#x2F;default&#x2F;files&#x2F;2021-12&#x2F;okta-security-privacy-documentation.pdf" rel="nofollow">https:&#x2F;&#x2F;www.okta.com&#x2F;sites&#x2F;default&#x2F;files&#x2F;2021-12&#x2F;okta-securi...</a><p><i>21. Security Breach Management. a) Notification: In the event of a Security Breach, Okta notifies impacted customers of such Security Breach. Okta cooperates with an impacted customer’s reasonable request for information regarding such Security Breach, and Okta provides regular updates on any such Security Breach and the investigative action and corrective action(s) taken.</i> -<p>But customers only found out today? Why wait this long?<p>9. Access Controls. Okta has in place policies, procedures, and logical controls that are designed:<p>b. Controls to ensure that all Okta personnel who are granted access to any Customer Data are based on leastprivilege principles;<p>kkkkkkkkkkkkkkk<p>1. Security Standards. Okta’s ISMP includes adherence to and regular testing of the key controls, systems and procedures of its ISMP to validate that they are properly implemented and effective in addressing the threats and risks identified. Such testing includes: a) Internal risk assessments; b) ISO 27001, 27002, 27017 and 27018 certifications; c) NIST guidance; and d) SOC2 Type II (or successor standard) audits annually performed by accredited third-party auditors (“Audit Report”).<p>I don&#x27;t think storing AWS keys within Slack would comply to any of these standards?<p>&#x27;&#x27;&#x27;
评论 #30775286 未加载
bloomburgerabout 3 years ago
Did anybody listen to the live webinar they had at 8am PDT today (03&#x2F;23)? I missed it and am wondering how it went.
CyanLite4about 3 years ago
Surprised they’re still being this transparent at this stage. I expected the lawyers to have shut it down by now.
评论 #30774565 未加载
评论 #30774548 未加载
评论 #30788744 未加载
Namidairoabout 3 years ago
The claims that they had AWS keys in Slack are a little unsettling.
评论 #30774955 未加载