Okta’s supply code stolen after GitHub repositories hacked

Okta, a number one supplier of authentication providers and Identification and Entry Administration (IAM) options,…

Okta’s supply code stolen after GitHub repositories hacked

Okta’s supply code stolen after GitHub repositories hacked

Okta, a number one supplier of authentication providers and Identification and Entry Administration (IAM) options, says that its personal GitHub repositories have been hacked this month.

Based on a ‘confidential’ electronic mail notification despatched by Okta and seen by BleepingComputer, the safety incident includes menace actors stealing Okta’s supply code.

Supply code stolen, buyer information not impacted

BleepingComputer has obtained a ‘confidential’ safety incident notification that Okta has been emailing to its ‘safety contacts’ as of some hours in the past. We have now confirmed that a number of sources, together with IT admins, have been receiving this electronic mail notification.

Earlier this month, GitHub alerted Okta of suspicious entry to Okta’s code repositories, states the notification.

“Upon investigation, we have now concluded that such entry was used to repeat Okta code repositories,” writes David Bradbury, the corporate’s Chief Safety Officer (CSO) within the electronic mail.

Regardless of stealing Okta’s supply code, attackers didn’t achieve unauthorized entry to the Okta service or buyer information, says the corporate. Okta’s “HIPAA, FedRAMP or DoD clients” stay unaffected as the corporate “doesn’t depend on the confidentiality of its supply code as a way to safe its providers.” As such, no buyer motion is required.

Okta security incident email sent December 2022
Okta emails its ‘safety contacts’ a safety notification (BleepingComputer)

On the time of writing our report, the incident seems to be related to Okta Workforce Identification Cloud (WIC) code repositories, however not Auth0 Buyer Identification Cloud product, given the e-mail wording.

An excerpt from the the rest of the notification, reviewed by BleepingComputer, is printed beneath:

As quickly as Okta realized of the attainable suspicious entry, we promptly positioned momentary restrictions on entry to Okta GitHub repositories and suspended all GitHub integrations with third-party purposes.

We have now since reviewed all latest entry to Okta software program repositories hosted by GitHub to know the scope of the publicity, reviewed all latest commits to Okta software program repositories hosted with GitHub to validate the integrity of our code, and rotated GitHub credentials. We have now additionally notified regulation enforcement.

Moreover, we have now taken steps to make sure that this code can’t be used to entry firm or buyer environments. Okta doesn’t anticipate any disruption to our enterprise or our potential to service our clients on account of this occasion.

Be aware: The safety occasion pertains to Okta Workforce Identification Cloud (WIC) code repositories. It doesn’t pertain to any Auth0 (Buyer Identification Cloud) merchandise.

We have now determined to share this data per our dedication to transparency and partnership with our clients.

Whereas ending its ‘confidential’ electronic mail that pledges a ‘dedication to transparency,’ Okta says it can publish an announcement at this time on its weblog.

BleepingComputer reached out to Okta with questions prematurely of publishing however a reply was not instantly out there.

Okta safety incidents: yr in evaluate

It has been a tough yr for Okta with its collection of safety incidents and bumpy disclosures.

September this yr, Okta-owned Auth0 disclosed a similar-style incident. Based on the authentication service supplier, older Auth0 supply code repositories have been obtained by a “third-party particular person” from its surroundings by way of unknown means. However, Okta’s issues started lengthy earlier than, amid the irregularity surrounding the disclosure of its January hack.

March this yr, information extortion group Lapsus$ claimed it had entry to Okta’s administrative consoles and buyer information because it started posting screenshots of the stolen information on Telegram.

After stating that it was investigating these claims, Okta shortly acknowledged that the hack being referred to had in truth occurred late January 2022 and probably affected 2.5% of its clients. This determine was estimated to be roughly 375 organizations on the time, given Okta’s 15,000+ buyer base again then.

The identical week, Okta admitted that it had “made a mistake” in delaying the disclosure of this hack that, the agency stated, had originated at its third-party contractor, Sitel (Sykes).

In April, Okta clarified that the January breach had lasted “25 consecutive minutes” and the affect was considerably smaller than what was initially anticipated: restricted to simply two clients.