Lapsus$ Threat Actor Demonstrates Access to Backend Okta Tooling
Common Information
Type Value
UUID 155c9187-94a7-4ab1-b315-074b10a5df65
Fingerprint a56b1a73cd7ea70c
Analysis status DONE
Considered CTI value 0
Text language
Published April 4, 2022, 3:52 p.m.
Added to db Nov. 6, 2023, 6:32 p.m.
Last updated Nov. 17, 2024, 5:57 p.m.
Headline Lapsus$ Threat Actor Demonstrates Access to Backend Okta Tooling
Title Lapsus$ Threat Actor Demonstrates Access to Backend Okta Tooling
Detected Hints/Tags/Attributes 30/1/14
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 205 Kudelski Security Research https://research.kudelskisecurity.com/feed/ 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 12
okta.com
Details Domain 1373
twitter.com
Details Domain 9
www.okta.com
Details Domain 177
www.wired.com
Details Domain 1
developer.okta.com
Details File 5
impersonation.ini
Details Url 1
https://twitter.com/toddmckinnon/status/1506184721922859010s
Details Url 1
https://www.okta.com/blog/2022/03/updated-okta-statement-on-lapsus
Details Url 1
https://www.reuters.com/technology/authentication-services-firm-okta-says-it-isinvestigating-report-breach-2022-03-22
Details Url 1
https://www.okta.com/blog/2021/04/its-official-okta-joins-forces-with-auth0
Details Url 1
https://www.wired.com/story/lapsus-hacking-group-extortion-nvidia-samsung
Details Url 1
https://www.bleepingcomputer.com/news/security/okta-investigating-claims-of-customerdata-breach-from-lapsus-group
Details Url 1
https://developer.okta.com/docs/reference/api/system-log
Details Url 1
https://developer.okta.com/docs/reference/api/event-types/#catalog