TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Unauthorized Access to Okta's Support System: Root Cause and Remediation

6 pointsby valiant-commaover 1 year ago

2 comments

theschmedover 1 year ago
&gt; For a period of 14 days, while actively investigating, Okta did not identify suspicious downloads in our logs. When a user opens and views files attached to a support case, a specific log event type and ID is generated tied to that file. If a user instead navigates directly to the Files tab in the customer support system, as the threat actor did in this attack, they will instead generate an entirely different log event with a different record ID.<p>&gt; Okta’s initial investigations focused on access to support cases, and subsequently we assessed the logs linked to those cases. On October 13, 2023, BeyondTrust provided Okta Security a suspicious IP address attributed to the threat actor. With this indicator, we identified the additional file access events associated with the compromised account.<p>Ok, this is the part which seems truly embarrassing to me, and I understand why BeyondTrust and 1Password sounded so frustrated. Okta staff should know their own systems well enough to identify all potential endpoints &#x2F; log events to review.
valiant-commaover 1 year ago
Original title (which was too long for HN): Unauthorized Access to Okta&#x27;s Support Case Management System: Root Cause and Remediation