黑客从 Okta 的支持部门窃取了访问令牌
Hackers stole access tokens from Okta's support unit

原始链接: https://krebsonsecurity.com/2023/10/hackers-stole-access-tokens-from-oktas-support-unit/

据 KrebsOnSecurity 10 月报道,为了应对影响 Caesar's Entertainment 和 MGM Resorts 等主要科技公司的网络攻击,为 Web、移动和 API 应用程序提供安全身份服务的跨国提供商 Okta 透露了影响其客户支持部门的安全漏洞2023 年 12 月 19 日。公司发言人表示,该公司不到 1% 的客户经历了“有限”的暴露,并表示 Okta 在收到 BeyondTrust 关于针对其员工的可疑活动的报告后“不久”就发现了恶意行为。 BeyondTrust 首席技术官 Marc Maiffret 表示,威胁行为者利用了被盗 Okta 帐户的访问权限,允许他们下载 2023 年 9 月 26 日至 10 月 2 日期间的会话信息。在此期间,BeyondTrust 分享了一段帮助台会话视频,其中包含 Okta 的有效 Okta 会话令牌使 IT 管理员能够响应票证。 该员工的会话令牌后来在这次交互过程中被盗。 10 月 3 日,BeyondTrust 注意到身份不明的个人尝试使用先前通过其帮助台服务发现的嵌入式 Okta 会话令牌在租户的 Okta 环境中设置管理员帐户。 虽然 BeyondTrust 表示其客户并未直接受到此次泄露的影响,但 Okta 承认它在客户端基础设施中启用了所有先前发行的嵌入式 Okta 会话令牌。 然而,尽管该公司在 10 月 11 日和 13 日警告即将实施封锁,但仅禁用了与大约 25 个企业客户相关的部分可能暴露的会话令牌。

不幸的是,似乎缺乏值得信赖的中心化身份提供商。 然而,完全从第三方解决方案转向内部构建和运营需要财务和人力资本资源,这可能不适用于所有公司。 切换到 One Login、Ping Identity 或文本材料中列出的其他替代方案可能会涉及额外的成本、复杂性和潜在风险,具体取决于每个公司特定的各种因素。 正如所讨论的,选择特定供应商最终取决于平衡资源可用性、与现有工具的兼容性以及投资新解决方案的意愿。
相关文章

原文

Okta, a company that provides identity tools like multi-factor authentication and single sign-on to thousands of businesses, has suffered a security breach involving a compromise of its customer support unit, KrebsOnSecurity has learned. Okta says the incident affected a “very small number” of customers, however it appears the hackers responsible had access to Okta’s support platform for at least two weeks before the company fully contained the intrusion.

In an advisory sent to an undisclosed number of customers on Oct. 19, Okta said it “has identified adversarial activity that leveraged access to a stolen credential to access Okta’s support case management system. The threat actor was able to view files uploaded by certain Okta customers as part of recent support cases.”

Okta explained that when it is troubleshooting issues with customers it will often ask for a recording of a Web browser session (a.k.a. an HTTP Archive or HAR file). These are sensitive files because they can include the customer’s cookies and session tokens, which intruders can then use to impersonate valid users.

“Okta has worked with impacted customers to investigate, and has taken measures to protect our customers, including the revocation of embedded session tokens,” their notice continued. “In general, Okta recommends sanitizing all credentials and cookies/session tokens within a HAR file before sharing it.”

The security firm BeyondTrust is among the Okta customers who received Thursday’s alert from Okta. BeyondTrust Chief Technology Officer Marc Maiffret said that alert came more than two weeks after his company alerted Okta to a potential problem.

Maiffret emphasized that BeyondTrust caught the attack earlier this month as it was happening, and that none of its own customers were affected. He said that on Oct 2., BeyondTrust’s security team detected that someone was trying to use an Okta account assigned to one of their engineers to create an all-powerful administrator account within their Okta environment.

When BeyondTrust reviewed the activity of the employee account that tried to create the new administrative profile, they found that — just 30 minutes prior to the unauthorized activity — one of their support engineers shared with Okta one of these HAR files that contained a valid Okta session token, Maiffret said.

“Our admin sent that [HAR file] over at Okta’s request, and 30 minutes after that the attacker started doing session hijacking, tried to replay the browser session and leverage the cookie in that browser recording to act on behalf of that user,” he said.

Maiffret said BeyondTrust followed up with Okta on Oct. 3 and said they were fairly confident Okta had suffered an intrusion, and that he reiterated that conclusion in a phone call with Okta on October 11 and again on Oct. 13.

In an interview with KrebsOnSecurity, Okta’s Deputy Chief Information Security Officer Charlotte Wylie said Okta initially believed that BeyondTrust’s alert on Oct. 2 was not a result of a breach in its systems. But she said that by Oct. 17, the company had identified and contained the incident — disabling the compromised customer case management account, and invalidating Okta access tokens associated with that account.

Wylie declined to say exactly how many customers received alerts of a potential security issue, but characterized it as a “very, very small subset” of its more than 18,000 customers.

The disclosure from Okta comes just weeks after casino giants Caesar’s Entertainment and MGM Resorts were hacked. In both cases, the attackers managed to social engineer employees into resetting the multi-factor login requirements for Okta administrator accounts.

In March 2022, Okta disclosed a breach from the hacking group LAPSUS$, a criminal hacking group that specialized in social-engineering employees at targeted companies. An after-action report from Okta on that incident found that LAPSUS$ had social engineered its way onto the workstation of a support engineer at Sitel, a third-party outsourcing company that had access to Okta resources.

Okta’s Wylie declined to answer questions about how long the intruder may have had access to the company’s case management account, or who might have been responsible for the attack. However, she did say the company believes this is an adversary they have seen before.

“This is a known threat actor that we believe has targeted us and Okta-specific customers,” Wylie said.

Update, 2:57 p.m. ET: Okta has published a blog post about this incident that includes some “indicators of compromise” that customers can use to see if they were affected. But the company stressed that “all customers who were impacted by this have been notified. If you’re an Okta customer and you have not been contacted with another message or method, there is no impact to your Okta environment or your support tickets.”

Update, 3:36 p.m. ET: BeyondTrust has published a blog post about their findings.

联系我们 contact @ memedata.com