• BeigeAgenda@lemmy.ca
    link
    fedilink
    English
    arrow-up
    40
    arrow-down
    1
    ·
    1 year ago

    I looked it up: Okta is a corporate identity management service, they handle stuff like SSO, logins, AD, etc…

    So I see why they are targeted.

    • Kbin_space_program@kbin.social
      link
      fedilink
      arrow-up
      12
      ·
      1 year ago

      Yeah, they handle SSO between platforms. Not the registrations though.

      They just handle the SSO part, if you have three systems connected, you need to sync the users between them on your own, then they can log them in to all three .

  • atx_aquarian@lemmy.world
    link
    fedilink
    English
    arrow-up
    16
    ·
    edit-2
    1 year ago

    including names and email addresses

    By now, that’s been stolen from so many companies that I wonder how much new info is really being compromised compared to what’s already out there. Speaking anecdotally, my spam already comes personalized. Like, even the obviously-not-from-a-partner phishy-looking stuff.

    • darklypure@kbin.social
      link
      fedilink
      arrow-up
      9
      ·
      1 year ago

      True, but I think the point here is context. What the hackers get here is the context that X recipient gets email on X address from Okta so I’d more likely than not to respond.

  • DominusOfMegadeus
    link
    fedilink
    English
    arrow-up
    14
    ·
    1 year ago

    In my experience, Customer Support Users often have access to fuck shit up pretty good.

    • redline23@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      1 year ago

      “While we have not seen direct evidence that the threat actor is using this list to launch phishing attacks against support system users,” the company said to customers, “phishing attacks are a constant threat.” Okta, which manages user authentication services for thousands of corporate clients, didn’t immediately provide comment.

      Okta’s shares plunged last month after the San Francisco-based company disclosed that hackers had used a stolen credential to access its support system. At the time, a company spokesman estimated that about 184 clients, representing roughly 1% of the Okta’s customers, were affected. It wasn’t the first time Okta had been breached. The company disclosed last year that a hacking group had broken into its system after the gang posted screenshots that appeared to show access to Okta accounts.

      The company said in its letter to customers that a recent audit found more data was stolen than it initially thought, prompting it to revise its findings. The firm also discovered that some Okta employee information was included in stolen reports, according to the customer notice reviewed by Bloomberg.

      The customer report contained fields for customer user names, company names and mobile phone numbers, Okta said, while noting that the majority of the fields were blank and didn’t include credentials or sensitive personal data. For more than 99% of customers listed in the report, Okta said, the only contact information stolen were full names and email addresses. Read More: Okta Falls on News That Hackers Viewed Some Customer Files Many of the affected users of the customer support system are Okta administrators, according to the company’s notice. Okta is scheduled to report earnings on Wednesday. The company said in its notice to customers that it would publicly disclose the new details on the same day.

      Here is the rest of that article