Explore our library of thought leadership articles and insights.
Podcasts
Stream informative and exclusive episodes of DomainTools “Breaking Badness” podcast.
Research
Read the latest from DomainTools Investigations.
Webinars
Watch live and on-demand cybersecurity training from the DomainTools team.
White Papers
Discover the real-world impact of DomainTools DNS intelligence.
Client Resources
Technical Documentation
Navigate DomainTools features effortlessly with our comprehensive guides.
API Documentation
Access everything you need, including endpoint, response formats, sample queries, and product service levels.
Webinars
Through close partnerships with leading security vendors, DomainTools embeds our best-in-class domain profiles and predictive Risk Score directly within your preferred SIEM, SOAR, and TIP solutions.
Watch Now
Company
About
Meet our exceptional executive team of experts and industry leaders.
Pressroom
Access the latest DomainTools news and press coverage.
Contact
We’re here to help with product info, pricing, and current and future account services.
In January 2022, a security incident at Okta potentially left 366 of its customers affected.
Okta, for those who may not be aware, is a company that provides two-factor authentication tools for identity and access management
They provide the means to get a token to use along with your username and password - materials that are quite internal to thwart
The group identified causing the breach is Lapsus$, also known as Dev0537 by Microsoft
Lapsus$ has exploded onto the scene recently
The group has been tracked for a while, and there’s no indication they’ll go away any time soon
Recently, the BBC reported that the leader of Lapsus$ might be a 16-year-old boy
However, the age of the bad actor shouldn’t be dismissed because kids can gain coding chops at an early age
What we know so far regarding the Okta breach is it was reported Lapsus$ had access to their network for a period of 5 days
The access was obtained through an outsource call center vendor called Sykes (one of their engineers was compromised)
The controversy is now over what Okta is stating vs. what Lapsus$ is sharing
If we are to assume Lapsus$ had access to the Okta network for 5 days, they were able to get access to Slack resources and other internal resources within Okta
They were able to get what’s known as ‘Super User’ access (though Okta maintains that does not entail ‘god-like’ access as their system is built with least privilege in mind.
We’re hearing statements from Okta, but we’re also hearing a version of the story from Lapsus$ and the truth is likely somewhere in the middle
It was noted that the attack was in January 2022, but the story didn’t break to the public until March 2022
It’s a lot longer of a timeframe than the 4-day disclosure window CISA is working toward
There are issues in not reporting sooner, but to give Okta the benefit of the doubt, it is possible they didn’t know until March
If they didn’t know, then this information is relatively timely
For the 366 known customers of Okta who were compromised, if they have been unaware of the breach, then they have been sitting ducks for this whole period of time
In Okta’s defense, the screenshots Lapsus$ has shared are all from January and there’s nothing at this point to show they’ve been in their network after January
However, Lapsus$ has stated they’re not interested in Okta - they’re interested in Okta’s customers
Okta wasn’t the only target of Lapsus$ recently. Microsoft reported they have also been breached and the bad actor involved is Lapsus$
Microsoft reported a source code breach along with access to signing certificates
There’s potential for signing certificates: you can write malware, sign it with the certificate, and it will look like legitimate code that came from Microsoft
There are likely other ramifications we’re not yet aware of, such as obsolete certificates being accepted
Last week, The Department of Justice unsealed two indictments charging four defendants, all Russian nationals who worked for the Russian government, with attempting, supporting and conducting computer intrusions that together, in two separate conspiracies, targeted the global energy sector between 2012 and 2018. In total, these hacking campaigns targeted thousands of computers, at hundreds of companies and organizations, in approximately 135 countries.
These indictments were sealed back in April 2021 and have become unsealed in the past week as the DOJ goes on the offense of publishing names and actions
In the case of United States v. Evgeny Viktorovich Gladkikh, the alleged crime is an employee of the Russian Ministry of Defense and his co-conspirators damaged critical infrastructure causing two separate emergency shutdowns at a foreign targeted facility
So this group set their sights on operational technology (OT) targets to cause physical safety systems to stop working
The conspiracy also attempted to hack computers of a US company that managed similar critical infrastructure entities
The case of United States v. Pavel Aleksandrovich Akulov, et al., is separate from the above and entails a two-phased campaign by three officers of Russia’s Federal Security Service (FSB) to target and compromise hundreds of entities related to the energy sector worldwide using spear phishing
Alleged crimes took place between 2012 and 2017 (Phase I being from 2012 to 2014, and Phase II from 2014 to 2017)
Phase I is known as Dragonfly - supply chain attacks via hiding malware inside legitimate software updates. The malware compromised 17,000 unique devices here and abroad
Phase II is known as Dragonfly 2.0 and the conspirators transitioned to more targeted compromises focused on the energy sector using spearphishing
The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) released numerous Tactical Alerts, ICS Alerts, and Malware Analysis Reports
Because these indictments are from about a year ago, and maybe up to a decade ago, in terms of where we are currently with Ukraine, everyone is on high alert for more of the same
It’s important to note that this are indictments and not convictions (and really they’re more indictments in absentia)
No one expects these people to be handed over to the US from the Russian government and in all likelihood, they won’t see the inside of a courtroom
However, it’s still helpful to share this information so we’re all in the know, have ideas of what to look for, and how to best prepare
Two Truths and a Lie
You'll have to tune in to find out!
Current Scoreboard
This Week’s Hoodie/Goodie Scale
Okta Breach Party: A Lapsus$ in Judgment[Taylor]: 6.75/10 Hoodies[Tim]: 7/10 Hoodies
, all of the articles mentioned in our podcast will always be included on our podcast recap. Catch us Wednesdays at 9 AM Pacific time when we publish our next podcast and blog.
*A special thanks to John Roderick for our incredible podcast music!