Okta has released more info about its most recent breach, where intruders gained access to Okta's support unit.
Okta says it first learned of an issue on Sept. 29, 2023, after 1Password reported suspicious activity to Okta support. The company said the likely cause of the breach was that an employee's device or email account was compromised.
"The unauthorized access to Okta’s customer support system leveraged a service account stored in the system itself. This service account was granted permissions to view and update customer support cases. During our investigation into suspicious use of this account, Okta Security identified that an employee had signed-in to their personal Google profile on the Chrome browser of their Okta-managed laptop. The username and password of the service account had been saved into the employee’s personal Google account. The most likely avenue for exposure of this credential is the compromise of the employee’s personal Google account or personal device."
As I reported last month, Okta also received suspicious activity reports on Oct. 2 from BeyondTrust, but Okta's deputy CISO said Okta originally believed BeyondTrust had experienced the security breach. Okta's updated timeline says the company had the same assumption when 1Password reached out: "suspecting that 1Password was most likely the victim of malware or phishing."
Okta says the intruder was able to use session tokens stolen from the employee to hijack the legitimate Okta sessions of 5 customers, 3 of whom have shared their own response to this event.
https://sec.okta.com/harfiles/
https://krebsonsecurity.com/2023/10/hackers-stole-access-tokens-from-oktas-support-unit/