![]() As such, a HAR file can contain sensitive data, including cookies and session tokens, that cybercriminals can use to impersonate valid users.Ī member of 1Password’s IT team was engaged with Okta support, and at their request, created and uploaded such a HAR file to the Okta Support Portal. It’s normal for Okta support to ask customers to upload an HTTP Archive (HAR) file, which allows the team to troubleshoot issues by replicating what’s going on in the browser. This allowed them to view files uploaded by certain Okta customers as part of recent support cases. On Friday, Okta said it spotted an attacker using a stolen credential to access Okta’s support case management system. ![]() “We immediately terminated the activity, investigated, and found no compromise of user data or other sensitive systems, either employee-facing or user-facing.” Okta breach 1Password says it took action straight away: Later it was confirmed that an attacker had accessed 1Password’s Okta environment using administrative privileges. In a security incident report, 1Password says that a member of its IT team received an unexpected email suggesting they had initiated an Okta report of a list of admins. They hadn’t requested it so they reported the email to the security department.Īn internal investigation showed unsolicited activity in the Okta environment which was traced to a suspicious IP address. Password manager 1Password says it’s been affected by a breach at Okta, but it reports no user data has been stolen.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |