Skip to content

Modus-Logo-Long-BlackCreated with Sketch.

  • Services
  • Work
  • Blog
  • Resources

    OUR RESOURCES

    Innovation Podcast

    Explore transformative innovation with industry leaders.

    Guides & Playbooks

    Implement leading digital innovation with our strategic guides.

    Practical guide to building an effective AI strategy
  • Who we are

    Our story

    Learn about our values, vision, and commitment to client success.

    Open Source

    Discover how we contribute to and benefit from the global open source ecosystem.

    Careers

    Join our dynamic team and shape the future of digital transformation.

    How we built our unique culture
  • Let's talk
  • EN
  • FR

What You Need to Know About the Okta Breach

Published on March 23, 2022
Last Updated on March 23, 2022
Security

On March 21, early social media reports began circulating that the identity and access management provider Okta had suffered a data breach by the threat actor known as Lapsus$, resulting in exposure to customer data and environments. 

These early reports were compiled screenshots of supposed customers, which might not appear credible under normal circumstances. However, because these claims were made by Lapsus$ who had already attacked multiple organizations, including Samsung, Impresa, Mercado Libre, Ubisoft, Nvidia, and Microsoft, pressure mounted on Okta to investigate.

Source

On March 22, responding to the claims that it had been breached, Okta’s CEO Todd McKinnon clearly stated that the claims were false and the screenshots were related to an earlier security event that had been contained without impact. 

Source

Okta later released official statements that denied the service had been breached. 

Source

In the afternoon of March 22, Forbes reporter Thomas Brewster mentioned that an Okta sub-processor who had access to Okta’s environment had confirmed part of the breach. His later reports indicated that the dwell time the attacker had was nearly a week. 

Source

Late in the evening of March 22, Okta finally confirmed the data breach. Many customers were impacted by a compromised Sitel laptop with access to an internal “SuperUser” support application that granted access to customer environments. 

“…We have determined that the maximum potential impact is 366 (approximately 2.5% of) customers whose Okta tenant was accessed by Sitel…” — Okta.com

However, corporate communication from Okta was not aligned, and Okta customers were still being notified that there was no impact.

What is the Impact?

Given the pressure an organization experiences when undergoing an incident investigation, the need to give assurances is common. But in such cases, false assurances can damage user trust. 

Okta is a leading identity provider for over 15,000 customers and a leader in identity and access management services. It also provides services to the Department of Defense and many other federal, state, and local agencies.

There is a tradeoff in trust when considering impact in zero-trust models and identity and access management systems. That tradeoff is trusting the identity and access management more than the end-users. This creates an attack surface monoculture — a classic scenario of “all your eggs in one basket.”

As Steve Weber, an opinion contributor for TheHill.com wrote: 

“Would you rather go after a very large and uniform target, with a monoculture where everyone is working on the same platform and doing the same thing? Or a somewhat more irregular and diverse landscape where not everything looks the same, and you have to understand local variations in the attack surface, which are likely also to be changing in different directions and at different rates? It’s not only good actors who like and benefit from scale. It’s bad actors, too, and in an offense-dominant environment, certain kinds of scale are better for bad actors than good ones.”

As of this writing (March 23), the impact is still unknown. However, because the Okta breach could potentially compromise your systems and customer data, Modus Create recommends a vigilant approach.

What Action Should You Take?

If you are an Okta customer, take the following precautionary measures: 

1. Change passwords on all admin accounts

Changing passwords on admin accounts will reduce your risk of exposure.

2. Pay attention to Okta notification emails

This is an evolving incident, and Okta will provide further guidance.

3. Review your logs for the following actions

  • New admin accounts creations
  • New access patterns such as users attempting to access applications they’ve never tried before
  • Access from uncommon geolocations. For example, if your staff is based in the US, scrutinize access from other geological locations.
  • New MFA token attachments to accounts

4. Cover the basics 

  • Install an AV/EDR solution on all centrally managed endpoints.
  • Ensure endpoint hard disks are encrypted.
  • Be hyper-aware of phishing attempts. Ensure employees know how to report phishing so you can respond to it.
  • Ensure employee network access is secure and protected using VPNs.
  • Train employees on how to report lost or stolen devices.
  • Mandate all accounts have MFA enabled. If possible, use a software-based authentication tool such as Google Authenticator rather than SMS. This specific threat actor is known to use a technique known as “SIM Jacking,” which bypasses SMS-based two-factor authentication mechanisms.
  • Patch the endpoints and install the latest updates.
  • Ensure employees know how to report anything suspicious, and foster a sense of community so that employees know that their reports are welcome. Attackers are using new tactics to try and gain access, and your employees can alert you to attempts to scam, extort, or bribe access to your environment.
Posted in Security
Share this

William Reyor

William Reyor is the Director of Security at Modus Create. He has a combined expertise in DevSecOps, AI/LLM security, and software supply chain integrity, with a rich experience in incident response, having previously come from Raytheon and Disney. His career in tech is marked by a commitment to inclusive innovation and leading security strategies that prioritize not just the strategic but the practical. He actively contributes to the community, organizing Connecticut's BSides conference since 2011. He recently released Defensive Security Handbook 2nd Edition with O'Reilly in early 2024.

Related Posts

  • Security Assessment
    Security Assessment: Introduction, Process, and More

    Learn more about our approach and process to a security assessment. Identify risks and get…

  • How DevSecOps Can Help Mitigate the Next Log4j Vulnerability

    This post will show you how adopting DevSecOps practices can mitigate vulnerabilities in libraries like…

Want more insights to fuel your innovation efforts?

Sign up to receive our monthly newsletter and exclusive content about digital transformation and product development.

What we do

Our services
AI and data
Product development
Design and UX
IT modernization
Platform and MLOps
Developer experience
Security

Our partners
Atlassian
AWS
GitHub
Other partners

Who we are

Our story
Careers
Open source

Our work

Our case studies

Our resources

Blog
Innovation podcast
Guides & playbooks

Connect with us

Get monthly insights on AI adoption

© 2025 Modus Create, LLC

Privacy PolicySitemap
Scroll To Top
  • Services
  • Work
  • Blog
  • Resources
    • Innovation Podcast
    • Guides & Playbooks
  • Who we are
    • Our story
    • Careers
  • Let’s talk
  • EN
  • FR