Search
Close this search box.

Okta cyberattack: How do we make MFA more secure?

Share:

The identity and authentication giant Okta have recognised and declared that it is responding to another significant security breach targeting Okta’s source code in its GitHub repositories.  

Hackers strike Okta’s third-party providers 

In a formal statement Okta mentioned that “GitHub alerted Okta about possible suspicious access to Okta code repositories.” Hackers used access to these repositories to copy code stored within. This would not be the first time Okta was targeted through a third-party service provider.  

Okta confirms no customer data has been stolen 

As an initial response to the security breach notice from GitHub, Okta placed temporary restrictions on the access of their repositories and suspended any integrations GitHub had with third-party apps.  

Okta claims that no unauthorised access to their service or related Okta user data existed, and any products linked to Auth0 were not affected by the GitHub breach. 

“Okta does not rely on the confidentiality of its source code for security of its services. The Okta service remains fully operational and secure”, Okta mentioned in their statement 

Not the first time Okta has been targeted, and it won’t be the last 

Earlier in the year, Okta’s apps and systems were compromised by the Lapsus$ extortion party, which were able to gain access to the account of a support engineer at Sykes (one of Okta’s third-party service providers).  

Later that year in August, Okta was caught in a string of attacks committed in a hacking campaign that had breached over 100 different organisations including DoorDash.   

Hackers continue to target Multi-Factor Services  

To most, Multi-Factor Authentication (MFA) is a secure method of keeping hackers out of sensitive data. However recently, services that rely on MFA have become a target for phishers and other cyber criminals. 

This is likely due to the boom in popularity of MFA in most crucial services. In fact, a study conducted by Duo shows that in just 4 years the percentage of users familiar with MFA grew from 28% in 2017 to 78% in 2021.  

This increase in security is always welcome however an unfortunate biproduct is the increased the incentive to target companies using MFA services. 

What can be learnt from Okta’s Cyber Attack? 

  1. Sensitive information should have as little user access as functionally possible 
  1. Validate third-party services and Software as a service (SaaS) 
  1. Apply resilient IAM and PAM systems 
  1. Educate workers and users with effective Cybersecurity Awareness Training 
  1. Stay cautious of current cyber risks and threats 
  1. Inquire and inspect systems and user traffic regularly 
  1. Transparency towards customers and employees should be upheld 
Ahmed Khanji

Ahmed Khanji

Ahmed Khanji is the CEO of Gridware, a leading cybersecurity consultancy based in Sydney, Australia. An emerging thought leader in cybersecurity, Ahmed is an Adjunct Professor at Western Sydney University and regularly contributes to cybersecurity conversations in Australia. As well as his extensive background as a security advisor to large Australian Enterprises, he is a regular keynote speaker and guest lecturer on offensive cybersecurity topics and blockchain.

Contact

Sydney Offices
Level 12, Suite 6
189 Kent Street
Sydney NSW 2000
1300 211 235

Melbourne Offices
Level 13, 114 William Street
Melbourne, VIC 3000
1300 211 235

Perth Offices
Level 32, 152 St Georges Terrace
Perth WA 6000
1300 211 235

Company

Learn more about the team at the forefront of the Australian Cyber Security scene.

About Us →

Meet the Team →

Partnerships →

Learn more about the team at the forefront of the Australian Cyber Security scene.

Career Opportunities →

Internships →

Media appearances and contributions by Gridware and our staff.

See More →

Services

Services

Whether you need us to take care of security for you, respond to incidents, or provide consulting advice, we help you stay protected.

View all services →

Web App Pen. Test Calculator →

Network Pen. Test Calculator →

Governance & Audit

Legal and regulatory protection

Penetration Testing

Uncover system vulnerabilities

Remote Working & Phishing

Fortify your defenses

Cyber Security Strategy

Adaptation to evolving threats

Cloud & Infrastructure

Secure cloud computing solutions

Gridware 360

End-to-end security suite

Gridware Managed Services

Comprehensive & proactive security

Gridware CloudControl
360

Harness the benefits of cloud technology

Gridware Incident Response 24/7

Swift, expert-led incident resolution

Solutions
Resources

Resources

A collection of our published insights, whitepapers, customer success stories and more.

Customer success stories from real Gridware customers. Find out how we have helped others stay on top of their Cyber Security.

Read More →