LAPSUS$ Criminal Group Announces Compromise of Okta, Microsoft
On Monday, March 21st the cybercrime group Lapsus$ posted screenshots on its Telegram channel claiming it had access to a number of Okta systems since at least January 21st of this year.?
Okta is a company providing widely used Multifactor Authentication (MFA) and Identity Management (IdM) software. The company said it had “detected an attempt to compromise the account of a third party customer support engineer working for one of our subprocessors” in January, but had found “no evidence of ongoing malicious activity.”
If true, this is serious. Okta (and other MFA solutions) are part of the foundation underlying security programs at organizations.
For my fellow defenders, here are some initial priorities related to the (potential) Okta Breach:
领英推荐
Separately, Lapsus$ has also posted concerning messages indicating that they may have had similar administrative access within Microsoft. The Lapsus$ group claims to have compromised the source code for Bing, Cortana, and other projects stolen from Microsoft’s internal Azure DevOps server. Early Sunday morning, Lapsus$ posted a screenshot purportedly containing source code for Bing, Cortana, and various other internal projects.
Lapsus$ has previously conducted successful attacks against Samsung, NVIDIA, the Brazilian Ministry of Health, South American telecommunications organizations, and Portuguese media corporations.
Finally: As an Okta customer, you should closely monitor the development of this incident for additional details and risks as they emerge.
Very informative and helpful advise!!
Manager Information Security - Information Technology Industry
3 年Great advice Brian, many thanks!!!!
Excellent advice Brian. Thank You.