BlogNewsResourcesWebinarsGlossary

Okta Lapsus$ Breach: The One Thing Every Company Needs to Do

Mar 23, 2022

Mar 23, 2022

blue polygon icon

3 minutes

The best defense against credential theft is resetting every password.  Unfortunately, this is easier said than done for many companies.

Link to Linkedin
Link to Linkedin
Link to Linkedin
Young-Sae Song
CMO
Okta Lapsus$ Breach: The One Thing Every Company Needs to Do
This webinar will cover:

Lapsus$ has made  headlines again with yet another high profile breach.  The incident was reported by major business and trade outlets including CNN, Gizomodo, and CNBC. After a successful attack they make unpredictable demands.  In a recent Nvidia breach, the group demanded that the company remove an anti-crypto mining feature from its GPUs.  The group has struck again recently claiming that it had gained access to Okta’s internal systems and posted screenshots to its Telegram channel as proof.  

“Hackers Don’t Break In They Log In”

As reported by Wired, Lapsus$ gains access to victims through phishing attacks.  It is widely known that email is the number one attack vector, and once credentials are compromised, it can go undetected for months. By some estimates, more than 81% of successful attacks involved compromised passwords.  The industry’s answer to this problem has been to deploy multiple layers of security, using products such as multi-factor authentication, user behavioral analytics, and employee training.  

Compromised credentials are a particularly acute problem because they are more difficult to detect.  If the employee’s email is compromised, the bad actor is able to easily bypass multi-factor authentication.  Passwords also tend to be reused, compromising multiple systems.  

Solution: Reset Every Password for Every User

Since credentials are the objective of most attacks, a simple solution for when an attack is suspected is to simply reset every employee’s password for every system they access.  This would make any stolen credentials useless.  Taking it a step further would be to remove the ownership of passwords from the users and have it managed by a system.  This would actually prevent most phishing attacks since users would not be able to accidentally enter their credentials on a phishing site, the most common way credentials are compromised.

Doing this, however, is easier said than done because there is no single system that knows all of a user's logins and passwords, especially for SaaS applications. Working with large and small companies, our data shows that only about 20% of passwords are stored in SSO.  The simple idea of resetting every employee’s passwords for all their systems simply cannot be done because 80% of the passwords are actually not controlled by any security system.  To accomplish this would require every user to update their logins and passwords manually or through whatever password management application they use.  The chances of this happening is safely zero.

saas security ebook

Identity Management is the New Battleground

Lapsus$ and other hacking groups are surely planning their next attack or already have stolen credentials that they are using to steal data right now.  Managing employee identities seems like a simple concept, but it is surprisingly difficult to do at scale.  Security teams deal with multiple systems, and each one is incomplete.  Furthermore, they have a huge blind spot as to the number of applications that employees use.  

The best practices for identity management are already known.  Today’s framework relies on humans to follow the rules and manage them manually.  Until this changes, we are likely to read more headlines about major breaches, and security teams will scramble to see whether any of their employee credentials have been compromised.  Rather than going through this type of fire drill, simply resetting every user’s password would provide companies peace of mind since any compromised credentials would be useless.

Sign up for a free SaaS security assessment to see how you can protect yours organization from these types of attacks.

In this webinar:
See More
See more
Fill out the form and watch webinar
Oops! Something went wrong while submitting the form.
Register now and save your seat!
Registration successful!
Webinar link will be sent to your email soon
Oops! Something went wrong while submitting the form.
In this webinar:
See More
See more

Talk to an Expert

Request a consultation and receive more information about how you can gain visibility to shadow IT and control access to these apps.

Your request has been sent
Oops! Something went wrong while submitting the form.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.