Now Reading
Okta hit by one other breach, this one stealing worker information from Third-party vendor

Okta hit by one other breach, this one stealing worker information from Third-party vendor

2023-11-03 11:15:13

Okta hit by another breach, this one stealing employee data from 3rd-party vendor

Getty Photographs

Identification and authentication administration supplier Okta has been hit by one other breach, this one in opposition to a third-party vendor that allowed hackers to steal private data for five,000 Okta staff.

The compromise was carried out in late September in opposition to Rightway Healthcare, a service Okta makes use of to help staff and their dependents to find well being care suppliers and plan charges. An unidentified menace actor gained entry to Rightway’s community and made off with an eligibility census file the seller maintained on behalf of Okta. Okta realized of the compromise and information theft on October 12 and didn’t disclose it till Thursday, precisely three weeks later.

“The varieties of private data contained within the impacted eligibility census file included your Title, Social Safety Quantity, and well being or medical insurance coverage plan quantity,” a letter despatched to affected Okta staff acknowledged. “We have now no proof to counsel that your private data has been misused in opposition to you.”

The letter, which is the primary time the occasion has been disclosed, mentioned that Okta opened an investigation instantly after studying of it. The investigation revealed that information for 4,961 Okta employees was included within the stolen file.

In an electronic mail, an Okta consultant mentioned that primarily based on data Rightway offered, the intruder first gained entry to a Rightway worker’s mobile phone after which used that entry to vary credentials and take the information. The information, which had been from April 2019 by 2020, had been exfiltrated from Rightway’s IT setting. The private data pertained to Okta staff and their dependents from 2019 and 2020. Okta additionally mentioned that Rightway knowledgeable it that the compromise concerned a number of Rightway prospects.

“This incident doesn’t relate to using Okta companies and Okta companies stay safe,” the consultant mentioned. “No Okta buyer information is impacted by this incident.”

Rightway representatives didn’t instantly reply to an electronic mail searching for remark and extra particulars in regards to the breach.

Thursday’s disclosure comes two weeks after Okta revealed that hackers compromised its buyer help system and obtained credentials that allowed them to take management of shoppers’ inside Okta administration accounts. The attackers then used these credentials in follow-on hacks that focused the inner administration accounts of 1Password, BeyondTrust, Cloudflare, and presumably different prospects.

See Also

Okta is predicated in San Francisco and gives cloud identification, entry administration for single sign-on, multifactor authentication, and API companies to hundreds of organizations worldwide. The corporate has beforehand come below criticism for safety breaches and its dealing with of them afterward. Most just lately, Cloudflare known as out Okta for not driving the intruders out of its community till October 18, 16 days after first studying of the compromise. Cloudflare urged Okta to behave faster sooner or later when studying of safety breaches, offering disclosures sooner and requiring using {hardware} keys to guard inside techniques and techniques utilized by third-party help suppliers.

“For a vital safety service supplier like Okta, we consider following these finest practices is desk stakes,” Cloudflare researchers wrote.

The Okta consultant mentioned in Thursday’s electronic mail that when the corporate realized of the Rightway compromise on October 12, investigators had 27,000 data to kind by. A lot of the method needed to be manually executed and took time to finish.

Source Link

What's Your Reaction?
In Love
Not Sure
View Comments (0)

Leave a Reply

Your email address will not be published.

2022 Blinking Robots.
WordPress by Doejo

Scroll To Top