Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

1Password Hacked: Internal Systems Compromised

admin by admin
Oct 25, 2023
in News
A A
0

Recently, 1Password detected suspicious activity on their Okta instance on September 29, but no user data or sensitive systems were compromised.

1Password is widely used as a popular password manager and security tool, trusted by individuals and businesses. 

Users opt for 1Password due to its:

  • Robust security features
  • User-friendly interface
  • Cross-platform compatibility 

These fundamental elements make storing and managing passwords, credit card information, and other sensitive data easy.

An IT team member received an unusual email on September 29, 2023, about an unauthorized admin report in Okta. This prompted them to discover a threat actor with administrative access to their Okta environment.

Technical Analysis

An IT team member provided Okta support with a HAR file, capturing browser traffic, including session cookies. 

On the same day, an unknown actor used the same session to access the Okta admin portal and conduct unauthorized activities.

Here below, we have mentioned those illicit activities:

  • Attempted to access the IT team member’s user dashboard but was blocked by Okta.
  • Updated an existing IDP tied to the 1Password production Google environment.
  • Activated the IDP.
  • Requested a report of administrative users.

An email alerting the IT team to the final action. The unknown actor performed further unauthorized actions, and Okta is working to provide log entries. 

However, it’s unclear how the actor gained access to the session. Still, the HAR file had the information needed for such an attack, confirmed through the recreation of the incident using the captured session cookies.

Okta’s support engineer had not accessed the HAR file before the incident. No indication of the actor accessing other systems is found. 

The file was created and uploaded securely, making exposure to the WiFi network unlikely. The team member’s laptop, currently offline, showed no malware findings. 

Malware or a device compromise is the leading theory for the session data exposure, but no other unusual activity linked to the team member’s accounts has been determined.

Actions taken by 1Password

Here below, we have mentioned all the actions that 1Password takes:

  • The IT team member’s credentials were changed.
  • Tighter security measures were applied to team members’ Okta accounts. 
  • Okta configuration was updated to enhance security. 
  • Datadog received additional alerts to speed up detection. 
  • Okta administrative users’ sessions were cleared, and credentials were alternated. 

1Password found no evidence of the actor accessing systems beyond Okta. The actor likely performed initial reconnaissance to gather information discreetly for future attacks. 

“All customers who were impacted by this have been notified. If you’re an Okta customer and you have not been contacted with another message or method, there is no impact to your Okta environment or your support tickets.” Octa Notified via an incident report.

However, besides this, the immediate actions reduced the risks, but 1Password plans to enhance security further.

Protect yourself from vulnerabilities using Patch Manager Plus to quickly patch over 850 third-party applications. Try a Free Trial to ensure 100% security.

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.