Skip to content
The Sapphires

The Sapphires

Devoted to finance excellence

Primary Menu
  • Business & Finance News
  • Business & Finance News
  • Business
  • finance
  • General
  • Home
    • Contact Us
    • Advertise Here
    • Privacy Policy
    • Sitemap
  • Home
  • Okta on handling of Lapsus$ breach: ‘We made a mistake’
Okta on handling of Lapsus$ breach: 'We made a mistake'
  • Business Administration

Okta on handling of Lapsus$ breach: ‘We made a mistake’

By magenet 2 months ago

Table of Contents

  • Slow to disclose?
  • No evidence prior to January 20
  • ‘Confident’ in conclusions


We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 – August 3. Join AI and data leaders for insightful talks and exciting networking opportunities. Learn More


Okta has released an apology for its handling of the January breach of a third-party support provider, which may have impacted hundreds of its customers.

Related Posts:

  • 15 Best Free Database Software for Data Management in 2022

The identity security vendor “made a mistake” in its response to the incident, and “should have more actively and forcefully compelled information” about what occurred in the breach, the company said in the unsigned statement, included as part of an FAQ posted on the Okta website today.

The apology follows a vigorous debate in the cybersecurity community in recent days over Okta’s lack of disclosure for the two-month-old incident. The breach impacted support contractor Sitel, which gave the hacker group Lapsus$ the ability to access as many as 366 Okta customers, according to Okta.

The Okta FAQ goes further than previous public communications to say that the company made imperfect choices in its handling the incident — though the statement stops short of saying that Okta believes it should have disclosed what it knew sooner.

“We want to acknowledge that we made a mistake. Sitel is our service provider for which we are ultimately responsible,” the statement in the FAQ says.

“In January, we did not know the extent of the Sitel issue – only that we detected and prevented an account takeover attempt and that Sitel had retained a third party forensic firm to investigate. At that time, we didn’t recognize that there was a risk to Okta and our customers,” the Okta statement says. “We should have more actively and forcefully compelled information from Sitel.”

“In light of the evidence that we have gathered in the last week, it is clear that we would have made a different decision if we had been in possession of all of the facts that we have today,” Okta says in the statement.

The apology and explanation were framed as a response to the question, “Why didn’t Okta notify customers in January?” VentureBeat has reached out to Sitel for comment.

Slow to disclose?

The FAQ statement follows criticism by some of Okta’s handling of the incident. At Tenable, a cybersecurity firm and Okta customer, CEO Amit Yoran issued an “Open Letter to Okta,” in which he said the vendor was not only slow to disclose the incident, but made a series of other missteps in its communications as well.

“When you were outed by LAPSUS$, you brushed off the incident and failed to provide literally any actionable information to customers,” Yoran wrote.

Meanwhile, Jake Williams, a well-known cybersecurity consultant and faculty member at IANS, wrote on Twitter that based upon Okta’s handling of the Lapsus$ incident, “I honestly don’t know how Okta regains the trust of enterprise orgs.”

Okta, a prominent identity authentication and management vendor, has seen its stock price drop 19.4% since the disclosure.

The company disclosed this week that Lapsus$ accessed the laptop of a Sitel customer support engineer from January 16-21, giving the threat actor access to up to 366 customers.

However, Okta did not disclose anything about the incident until Tuesday, and only then in response to Lapsus$ posting screenshots on Telegram as evidence of the breach.

Okta CSO David Bradbury had previously pointed the finger at Sitel for the timing of the disclosure. In a blog post, Bradbury said he was “greatly disappointed” by the fact that it took two months for Okta to receive a report on the incident from Sitel, which had hired a cyber forensic firm to investigate. (Sitel has declined to comment on that point.)

Bradbury had previously issued an apology, though not directly referring to Okta’s handling of the incident. “We deeply apologize for the inconvenience and uncertainty this has caused,” he had said in an earlier post.

The Okta CSO had also earlier said that after receiving a summary report from Sitel on March 17, the company “should have moved more swiftly to understand [the report’s] implications.”

The FAQ posted today does not provide new details on how customers may have been impacted by the breach. Okta’s statement does emphasize that the company believes Sitel — and therefore, Lapsus$ — would not have been able to download customers’ databases, or create/delete users.

No evidence prior to January 20

Okta’s timeline for the incident starts at January 20 (a timeline that was replicated in the FAQ post). However, Lapsus$ was able to access the third-party support engineer’s laptop from January 16-21, Okta has said, citing the forensic report. Some had suggested to VentureBeat that this left the first few days of the breach unaccounted for.

In the FAQ — in response to the question of “what happened from January 16 through January 20?” — Okta suggested it does not have evidence of anything malicious happening to Okta’s systems or customers during that time period.

“On January 20, Okta saw an attempt to directly access the Okta network using a Sitel employee’s Okta account. This activity was detected and blocked by Okta, and we promptly notified Sitel, per the timeline above,” Okta says in the FAQ, referring to the alert that led to the company becoming aware of the Lapsus$ intrusion.

“Outside of that attempted access, there was no other evidence of suspicious activity in Okta systems,” the FAQ says.

VentureBeat has reached out to Okta for comment.

The alert on January 20 was triggered by a new factor, a password, being added to the Okta account of a Sitel employee in a new location. Okta also says it “verified” the five-day time period for the intrusion by “reviewing our own logs.”

‘Confident’ in conclusions

In response to the question of “what data/information was accessed” during that five-day period, Okta did not provide new specifics, and reiterated previous points about the fact that the support engineers at Sitel have “limited” access.

Echoing earlier statements, Okta said that such third-party engineers cannot create users, delete users or download databases belonging to customers.

“Support engineers are also able to facilitate the resetting of passwords and multi-factor authentication factors for users, but are unable to choose those passwords,” Okta said in the FAQ. “In order to take advantage of this access, an attacker would independently need to gain access to a compromised email account for the target user.”

Ultimately, “we are confident in our conclusions that the Okta service has not been breached and there are no corrective actions that need to be taken by our customers,” Okta said. “We are confident in this conclusion because Sitel (and therefore the threat actor who only had the access that Sitel had) was unable to create or delete users, or download customer databases.”

Okta added in the FAQ that it has contacted all customers that were potentially impacted by the incident, and “we have also notified non-impacted customers.”

Bloomberg reported Wednesday that Lapsus$ is headed by a 16-year-old who lives with his mother in England. Yesterday, the BBC reported that the City of London Police have arrested seven teenagers in connection with the Lapsus$ group.

It was unknown whether the group’s leader was among those arrested. Lapsus$ most recently posted on its Telegram account earlier today.

VentureBeat’s mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Learn More





Source link

Tags: Amazon Fba Business, Atlanta Business Chronicle'S, Boss Baby Back In Business, Business Administration Degree, Business Attire Women, Business Card Design, Business Cards Templates, Business Casual Dress, Business Casual Outfits, Business Checking Account, Business Credit Card, Business For Sale Near Me, Business Intelligence Platform, Business Lawyer Near Me, Business Loan Calculator, Business Name Ideas, Business Professional Women, Business Spectrum Login, California Business Entity Search, Capital One Spark Business, Carl Weber'S The Family Business, Charlotte Business Journal, Custom Business Cards, Delaware Business Search, Fl Sos Business Search, Florida Business Search, Harvard Business Publishing, Insurance For Small Business, Kelley School Of Business, Maryland Business Express, Maryland Business Search, Moo Business Cards, National Business Furniture, New York Business Search, Ohio Business Gateway, Onedrive For Business, Online Business Ideas, Paramore Misery Business, Risky Business Cast, Small Business Insurance, Spectrum Business Customer Service, Tom Cruise Risky Business, Us Small Business Administration, Verizon Wireless Business, Verizon Wireless Business Login, Virtual Business Address, What Is Business Administration, Women'S Business Casual, Yelp Business Login, Yelp For Business

Continue Reading

Previous Ladies Who Launch to Host a Must Attend, Free Virtual Summit For All Entrepreneurs Looking to Raise Capital
Next A look at the past, future of American women in business | Guest Commentaries

Recent Posts

  • Weekend Favs – Agorapulse, nTask, Trainual
  • How to Create a Small Business Marketing Plan in 2022
  • Stop Rambling in Meetings — and Start Getting Your Message Across
  • A Guide to Video Landing Pages
  • Strong technology and finance partnerships vital for digital success

Archives

May 2022
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
3031  
« Apr    

Tags

Ahron Levy Columbia Business School Att Business Login business Business Consultant Certification Austin Business Insurance Cover Coronavirus Business Letter With Logo Example Business Located Easy Location Business Platform Stocks Business Positions Seattle Business Regulation Legal Services Dimagi Business Development Toolkit Do Business Schools Accept Entreprenuers Enironmentall Friendly Business Ideas enterprise Eric Early Republican Business Owner Essec Business School Dean Essential Business To Remain Open Fall Winter Business Hours Template Fdot Woman Owned Business Certification Fixing A Damaged Reputation Business Florida Business Enforcement Free Small Business Communication Tool Law School Business Entity Outlines Mapping A Business Location Medical Business Trends Economics Mlm Nit Small Business Legally New Business Agency Sales Questions Patricia Saiki Women'S Business 1990 Safety Business Proposal Sample Business Plan Entrepreneur School Business Administration Positions S Corp Business Deductions Search Tx Business Llc Sentextsolutions Business Cards Small Business Forums .Net Small Business Insurancr Tech Monkey Business Ttu Business Cards Template Turbotax Business Nys Forms Uf Business School General Studies What Business Hours Macgaffin Bar Yelp Business .Json Yelp Tax Attorney Small Business Your Business Department Zeus Panda Business Moel

Categories

bayar.ooo

buybacklinks

Recommended Link

car accident attorney philadelphia

Intellifluence Trusted Blogger

BL

LP

TL

Visit Now

fashion styles
thesapphiresmovie.com | Magazine 7 by AF themes.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT