Okta says it’s used by 15,000 global brands, listing customers including Siemens, Hitachi, Moody’s, and Major League Baseball.
The shadowy organization released screenshots that appeared to show access to Okta internal systems, including an internal ticketing system and a Slack chat, Reuters reports. But in an overnight Tweet, Okta CEO Todd McKinnon said the issue appeared to be limited to “an attempt to compromise the account of a third party customer support engineer working for one of our subprocessors” in January that was “investigated and contained.”
We believe the screenshots shared online are connected to this January event. Based on our investigation to date, there is no evidence of ongoing malicious activity beyond the activity detected in January. (2 of 2)
— Todd McKinnon (@toddmckinnon) March 22, 2022
Okta didn’t immediately respond to an inquiry from Fast Company.
Still, the incident likely has some Okta customers on edge, since the service is used to control access to its customers’ sensitive systems. Matthew Prince, the CEO of hosting provider Cloudflare, tweeted that the company is resetting Okta credentials for employees who recently changed their passwords, “out of an abundance of caution,” and it seems likely that other Okta customers will be carefully looking for evidence they were further affected by any hack.
So-called supply chain attacks, where software used by multiple organizations is itself compromised to gain access to other networks, have been an issue in recent major security incidents including the 2017 NotPetya malware attack and the more recent compromise of U.S. federal systems through a hack on the software provider SolarWinds.
Lapsus$ claimed that “our focus was ONLY on Okta customers,” not the company itself, CNN reports, though it’s unclear exactly what that means.
Okta’s stock price dropped by about 6% in early morning trading, but had recovered by midday.