Others · December 22, 2022

Okta confirms another breach after hackers steal source code

Okta has confirmed that it’s responding to another major security incident after a hacker accessed its source code following a breach of its toptechtrends.com/tag/github/”>GitHub repositories.

The identity and authentication giant said in a statement on Wednesday that it was informed by GitHub about “suspicious access” to its code repositories earlier this month. Okta has since concluded that hackers used this malicious access to copy code repositories associated with Workforce Identity Cloud (WIC), the organization’s enterprise-facing security solution.

“As soon as Okta learned of the possible suspicious access, we promptly placed temporary restrictions on access to Okta GitHub repositories and suspended all GitHub integrations with third-party applications,” Okta said in a statement.

When asked by TechCrunch, Okta declined to say how attackers managed to gain access to its private repositories.

Okta says there was no unauthorized access to the Okta service or customer data, and products related to Auth0 — toptechtrends.com/2021/03/04/making-sense-of-the-6-5b-okta-auth0-deal/”>which it acquired in 2021 — are not impacted. “Okta does not rely on the confidentiality of its source code for the security of its services. The Okta service remains fully operational and secure,” Okta said.

The company said that since it was alerted to the breach, it has reviewed recent access to Okta software repositories, reviewed all recent commits to Okta software repositories, and rotated GitHub credentials. Okta said it has also notified law enforcement.

Okta did not explicitly say if it has the technical means, such as logs, to detect what, if any, of its own systems were accessed or what other data may have been exfiltrated.

The company’s latest incident was first reported by Bleeping Computer earlier this week, prior to Okta’s announcement.

Earlier this year, Okta was toptechtrends.com/2022/03/23/okta-breach-sykes-sitel/”>targeted by the now-notorious Lapsus$ extortion group, which gained access to the account of a customer support engineer at Sykes, one of Okta’s third-party service providers, and posted screenshots of Okta’s apps and systems. Okta experienced a second compromise in August this year after it was targeted by toptechtrends.com/2022/08/26/twilio-breach-authy/”>another hacking campaign that breached more than 100 organizations, including Twilio and toptechtrends.com/2022/08/25/doordash-customer-data-breach-twilio/”>DoorDash.

toptechtrends.com/2022/11/10/okta-ceo-opens-up-about-auth0-acquisition-saas-slump-and-lapsus-attack/”>Okta CEO opens up about Auth0 acquisition, SaaS slump and Lapsus$ attack

toptechtrends.com/2022/12/22/okta-breach-source-code-github/”>Okta confirms another breach after hackers steal source code by toptechtrends.com/author/carly-page/”>Carly Page originally published on toptechtrends.com/”>TechCrunch

About The Author