熱點

【】

字号+作者:囫圇吞棗網来源:時尚2024-11-22 01:14:18我要评论(0)

Okta, the San Francisco-based identity and access management company, reported a security breach on

Okta, the San Francisco-based identity and access management company, reported a security breach on Friday. Hackers gained access to private customer information through its customer support management system.

In a site-wide announcement, Okta Chief Security Officer David Bradbury revealed that hackers viewed content uploaded by some Okta customers related to recent support cases. These files, known as HTTP archive (HAR) files, help support personnel replicate customer browser activity for troubleshooting.

SEE ALSO:23andMe may have suffered yet another breach – your data is in jeopardy

"HAR files can also contain sensitive data, including cookies and session tokens, that malicious actors can use to impersonate valid users," Bradbury said.

Bradbury did not disclose how the credentials were stolen nor if two-factor authentication was in place for the compromised support system. To mitigate the damage, Okta revoked embedded session tokens and advised customers to sanitize credentials within HAR files before sharing.

Mashable Light SpeedWant more out-of-this world tech, space and science stories?Sign up for Mashable's weekly Light Speed newsletter.By signing up you agree to our Terms of Use and Privacy Policy.Thanks for signing up!

According to Arstechnica, the initial hack was stopped by security firm BeyondTrust, which alerted Okta to suspicious activity about a month ago. However, due to some flaws within Okta's security model, some actions were still carried out by malicious actors.

Bradbury confirmed that all affected customers have been informed. He also provided IP addresses and browser user agents associated with the hackers for further investigation. He also added that Okta's main production service and Auth0/CIC case management system remain unaffected.

Okta has had its fair share of hacker troubles lately. In March 2022, a group called Lapsus$ accessed an Okta admin panel, allowing them to reset customer passwords and authentication credentials. In December of that same year, Okta's source code was stolen from a GitHub account.

TopicsCybersecurity

1.本站遵循行业规范,任何转载的稿件都会明确标注作者和来源;2.本站的原创文章,请转载时务必注明文章作者和来源,不尊重原创的行为我们将追究责任;3.作者投稿可能会经我们编辑修改或补充。

相关文章
  • There's a big piece of fake chicken stuck to this phone case

    There's a big piece of fake chicken stuck to this phone case

    2024-11-22 00:51

  • 本田圭佑宣布加盟立陶宛球隊 已輾轉9個國家聯賽效力

    本田圭佑宣布加盟立陶宛球隊 已輾轉9個國家聯賽效力

    2024-11-21 23:20

  • 國足開啟一天兩練儲備體能 下旬或聯係老對手敘利亞熱身

    國足開啟一天兩練儲備體能 下旬或聯係老對手敘利亞熱身

    2024-11-21 23:00

  • 李佳悅出征全運會
:一屆替補三屆主力 整整16年啦

    李佳悅出征全運會 :一屆替補三屆主力 整整16年啦

    2024-11-21 22:50

网友点评