New Lapsus$ hack docs make Okta’s response seem weirder

The fallout from the January 2022 Lapsus$ hack of Okta continues to unfold‚ with newly released documents raising questions about Okta’s initial response and subsequent handling of the breach. The core issue revolves around the timeline of events and the information Okta possessed versus the information they shared publicly.

The Timeline of Events

A detailed timeline‚ reportedly prepared by Mandiant (the cybersecurity firm hired by Sitel‚ Okta’s subcontracted customer support provider)‚ reveals a concerning sequence of events⁚

  1. January 16-21‚ 2022⁚ Lapsus$ gains access to a Sitel customer support engineer’s Okta account and maintains access for five days. During this period‚ they escalate privileges‚ maintain persistence‚ move laterally within the network‚ and perform internal reconnaissance.
  2. January 20‚ 2022⁚ Okta receives an alert regarding a new factor added to the compromised Sitel account. Okta claims to have blocked the attempt.
  3. January 21‚ 2022⁚ Okta states it shared indicators of compromise (IOCs) with Sitel.
  4. March 17‚ 2022⁚ Okta receives a summary report from Sitel regarding the incident.
  5. March 22‚ 2022⁚ Lapsus$ publishes screenshots on Telegram as evidence of the Okta breach. On the same day‚ Okta claims to receive the full investigation report from Mandiant.

Okta’s Initial Response and Subsequent Actions

Okta’s initial response downplayed the severity of the breach. The company publicly stated that the “Okta service has not been breached.” This statement‚ coupled with the delayed disclosure of the incident‚ has drawn criticism. The newly revealed timeline suggests Okta had information pointing towards a more serious security incident far earlier than their public statements acknowledged.

Okta later admitted that 366 customers (approximately 2.5% of their customer base) were impacted by the breach. This starkly contrasts with their initial downplaying of the incident. Furthermore‚ the delay between Okta receiving the initial alert in January and their public acknowledgment in March raises concerns about their transparency and communication with customers;

The Significance of the New Documents

The release of the detailed timeline and other related documents paints a more complete picture of the Lapsus$ hack and Okta’s response. These documents seemingly contradict Okta’s initial claims and raise questions about their internal processes for handling security incidents.

  • Delayed Disclosure⁚ The two-month gap between the initial intrusion and public disclosure raises concerns about the timeliness of Okta’s communication.
  • Downplaying the Severity⁚ Okta’s initial statements minimized the impact of the breach‚ which later proved to be more significant than initially portrayed.
  • Third-Party Risk⁚ The breach highlights the risks associated with relying on third-party providers and the importance of robust security oversight.

Lingering Questions and Implications

The Lapsus$ hack and Okta’s response underscore several critical cybersecurity challenges⁚

  • Transparency and Communication⁚ How can organizations improve transparency and communication during security incidents?
  • Third-Party Risk Management⁚ What measures can be taken to mitigate the risks associated with third-party vendors?
  • Incident Response⁚ How can organizations improve their incident response processes to minimize the impact of breaches?

The Lapsus$ hack of Okta serves as a cautionary tale‚ highlighting the importance of proactive security measures‚ timely incident response‚ and transparent communication. The ongoing scrutiny surrounding this incident will likely shape future discussions about cybersecurity best practices and the responsibility of organizations to protect their data and their customers.

Leave a Reply

Your email address will not be published. Required fields are marked *