Lapsus$ Attack on Okta: How to Evaluate the Impact to your Organization

cyber%20security.jpgLapsus$ Attack on Okta: How to Evaluate the Impact to your Organization>
ZScalar Blog – Deepen Desai, Dhaval Parekh
The Zscaler Security team has developed a Security Operations Center (SOC) playbook for identity (IDP) providers, giving our security analysts and researchers fast track access to threat identification and remediation at the user level. Suspicious behaviors trigger a security action workflow: for example, moving a user to a higher-access security group, changing multi-factor authentication methods, or other anomalous and potentially dangerous user behaviors.

A review of IDP logs for indicators of compromise associated with this attack should include the following steps: Review Okta admin/super admin account audit logs. Review cloud admin/super admin account audit logs. Review all executive accounts including MFA method changes. Review new Okta account creations and compare against employee onboarding. Review full Okta config to check for API access, logging configs, etc. Identify Okta accounts where MFA was disabled from January 1, 2022 to March 22, 2022. Identify the user and root cause of the disablement. Re-enable MFA for those accounts. Reset password for Okta admins. Reset 2-factor authentication for Okta superadmins. Rotate Okta-generated API tokens. Verify Okta Support access is disabled. Verify Directory Debugger access is disabled. Review all critical users’ access levels.

SOC Detection Rules for Okta

MFA Deactivation Attempt

MFA Reset Attempt

MFA Push Brute Force Attempt

MFA Bypass Attempt

Account Login Brute Force Attempt

User Session Impersonation

Group Administrative Privilege Assignment

User Administrative Privilege Assignment

Policy Rule Modification

Policy Rule Deletion

Policy Rule Deactivation
Link: https://www.zscaler.com/blogs/security-research/lapsus-attack-okta-how-evaluate-impact-your-organization


Categories:

Tags: