Okta is an authentication agency used by thousands of organizations around the world, has now confirmed an attacker had access to one of its employee’s laptops for five days in January 2022 and that around 2.5 percent of its customers may have been affected but managed its service has not been breached and remains fully operational. The disclosure comes as hacking group lapses$ has posted screenshots to its telegram channel claiming to be of okta slack channel and another with a cloud flare interface. Any hack of okta could have major ramifications for the agencies, universities, and government companies that depend upon Okta to authenticate user access to internal systems. We have concluded that a small percentage of customers approximately 2.5 percent have potentially been impacted and whose data may have been viewed or acted upon Okta chief security Officer David Bradbury wrote in an update Tuesday evening. We have identified those customers and are contacting them directly. If you are an Okta customer and were impacted we have already reached out directly by email. We are sharing this interim update consistent with our values of customer success integrity and transparency. In an earlier statement on Tuesday afternoon, Okta said that an attacker would only have had limited access during that five-day period limited enough that the agency claims there are no corrective actions that need to be taken by our customers. Writing in its telegram channel the lapses$ hacking group claims to have had admin access to Okta systems for two months, not just five days that it had access to a thin client rather than a laptop and claims that it found Okta storing AWS keys in slack channels. The group also suggested it was using its access to zero in on Okta’s customers.
Read More: Microsoft aims to skill 100,000 Indians in cyber security by 2022