• @BeigeAgenda@lemmy.ca
    link
    fedilink
    English
    355 months ago

    I looked it up: Okta is a corporate identity management service, they handle stuff like SSO, logins, AD, etc…

    So I see why they are targeted.

    • Kbin_space_program
      link
      fedilink
      125 months ago

      Yeah, they handle SSO between platforms. Not the registrations though.

      They just handle the SSO part, if you have three systems connected, you need to sync the users between them on your own, then they can log them in to all three .

      • Tau
        link
        fedilink
        English
        15 months ago

        I understood some of those words!

        • This is fine🔥🐶☕🔥
          link
          fedilink
          English
          75 months ago

          They build digital corridors so at your workplace you can use multiple different applications without having to login every time.

      • key
        link
        fedilink
        English
        15 months ago

        That’s not completely true. That’s often the ideal way to use them (especially with integrating pre-existing applications). But they do offer (crappy) user stores in their auth0 product which can handle registration including UI.

  • DominusOfMegadeus
    link
    fedilink
    English
    145 months ago

    In my experience, Customer Support Users often have access to fuck shit up pretty good.

  • @atx_aquarian@lemmy.world
    link
    fedilink
    English
    13
    edit-2
    5 months ago

    including names and email addresses

    By now, that’s been stolen from so many companies that I wonder how much new info is really being compromised compared to what’s already out there. Speaking anecdotally, my spam already comes personalized. Like, even the obviously-not-from-a-partner phishy-looking stuff.

    • darklypure
      link
      fedilink
      95 months ago

      True, but I think the point here is context. What the hackers get here is the context that X recipient gets email on X address from Okta so I’d more likely than not to respond.

    • @redline23@lemmy.world
      link
      fedilink
      English
      3
      edit-2
      5 months ago

      “While we have not seen direct evidence that the threat actor is using this list to launch phishing attacks against support system users,” the company said to customers, “phishing attacks are a constant threat.” Okta, which manages user authentication services for thousands of corporate clients, didn’t immediately provide comment.

      Okta’s shares plunged last month after the San Francisco-based company disclosed that hackers had used a stolen credential to access its support system. At the time, a company spokesman estimated that about 184 clients, representing roughly 1% of the Okta’s customers, were affected. It wasn’t the first time Okta had been breached. The company disclosed last year that a hacking group had broken into its system after the gang posted screenshots that appeared to show access to Okta accounts.

      The company said in its letter to customers that a recent audit found more data was stolen than it initially thought, prompting it to revise its findings. The firm also discovered that some Okta employee information was included in stolen reports, according to the customer notice reviewed by Bloomberg.

      The customer report contained fields for customer user names, company names and mobile phone numbers, Okta said, while noting that the majority of the fields were blank and didn’t include credentials or sensitive personal data. For more than 99% of customers listed in the report, Okta said, the only contact information stolen were full names and email addresses. Read More: Okta Falls on News That Hackers Viewed Some Customer Files Many of the affected users of the customer support system are Okta administrators, according to the company’s notice. Okta is scheduled to report earnings on Wednesday. The company said in its notice to customers that it would publicly disclose the new details on the same day.

      Here is the rest of that article