Date
1 - 4 of 4
tentative: Okta may have been breached since late January
Developing story - take with a grain of salt. If you use Okta, it might be useful for IR resources to start tentative evaluation of applicability to your environment. Early speculation is that the threat actor (LAPSUS$) may have lost their foothold, and so decided to "burn" it for the exposure. Royce -- Royce Williams Tech Solvency |
|
JP
Thanks again Royce. On Mon, Mar 21, 2022 at 10:34 PM Royce Williams <royce.williams@...> wrote:
|
|
Tom Bentley
My first thought was that if they had obtained sufficient access to compromise clients they would have kept quiet about it. On Mar 22, 2022, at 17:35, JP <jp@...> wrote:
|
|
That's compatible with the theory that they did keep quiet about it - until they were caught. Okta's blog post has been updated: Excerpt (emphasis mine): After a thorough analysis of these claims, we have concluded that a small percentage of customers – approximately 2.5% – have potentially been impacted and whose data may have been viewed or acted upon. We have identified those customers and are contacting them directly. If you are an Okta customer and were impacted, we have already reached out directly by email. We are sharing this interim update, consistent with our values of customer success, integrity, and transparency. -- Royce On Tue, Mar 22, 2022 at 6:48 PM Tom Bentley <TomBent@...> wrote:
|
|