www.channelfutures.com Open in urlscan Pro
2a06:98c1:3120::7  Public Scan

URL: https://www.channelfutures.com/security/lapsus-hacking-group-reportedly-hits-microsoft-okta
Submission: On March 22 via api from US — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://www.channelfutures.com/

<form role="search" method="get" class="search-form" action="https://www.channelfutures.com/">
  <label>
    <input type="search" class="search-field" placeholder="Search..." value="" name="s" title="search">
  </label>
  <button type="submit" class="search-submit">
    <i class="fa fa-search"></i>
  </button>
</form>

GET https://www.channelfutures.com/

<form role="search" method="get" class="search-form" action="https://www.channelfutures.com/">
  <input type="search" class="search-field" placeholder="Search..." value="" name="s" title="search">
  <a class="search-submit" onclick="this.parentNode.submit(); return false;" data-feathr-click-track="true"><i class="fa fa-search"></i></a>
</form>

POST https://www.channelfutures.com/wp-comments-post.php

<form action="https://www.channelfutures.com/wp-comments-post.php" method="post" id="commentform" class="comment-form">
  <div class="telecoms-login">
    <p>-or-</p>
    <p>
      <a id="login-redirect-url" href="#" data-login-redirect-url="https://www.channelfutures.com/log-in/?redirect=https://www.channelfutures.com/security/lapsus-hacking-group-reportedly-hits-microsoft-okta" class="button" data-feathr-click-track="true">Log in with your Channel Futures account</a>
    </p>
    <p>Alternatively, post a comment by completing the form below:</p>
  </div>
  <p class="comment-notes"><span id="email-notes">Your email address will not be published.</span> Required fields are marked <span class="required">*</span></p>
  <p class="comment-form-comment"><label for="comment">Comment</label> <textarea id="comment" name="comment" cols="45" rows="8" maxlength="65525" required="required"></textarea></p>
  <p class="comment-form-author"><label for="author">Name <span class="required">*</span></label> <input id="author" name="author" type="text" value="" size="30" maxlength="245" required="required"></p>
  <p class="comment-form-email"><label for="email">Email <span class="required">*</span></label> <input id="email" name="email" type="text" value="" size="30" maxlength="100" aria-describedby="email-notes" required="required"></p>
  <p class="comment-form-url"><label for="url">Website</label> <input id="url" name="url" type="text" value="" size="30" maxlength="200"></p>
  <p class="comment-form-cookies-consent"><input id="wp-comment-cookies-consent" name="wp-comment-cookies-consent" type="checkbox" value="yes"><label for="wp-comment-cookies-consent">Save my name, email, and website in this browser for the next time
      I comment.</label></p>
  <p class="form-submit"><input name="submit" type="submit" id="submit" class="submit button" value="Post Comment"> <input type="hidden" name="comment_post_ID" value="247341" id="comment_post_ID">
    <input type="hidden" name="comment_parent" id="comment_parent" value="0">
  </p>
  <p style="display: none;"><input type="hidden" id="akismet_comment_nonce" name="akismet_comment_nonce" value="b6699ad823"></p>
  <p style="display: none;"></p> <input type="hidden" id="ak_js" name="ak_js" value="1647981500105">
</form>

Text Content

Channel Futures is part of the Informa Tech Division of Informa PLC

 * Informa PLC
 * About us
 * Investor relations
 * Talent

This site is operated by a business or businesses owned by Informa PLC and all
copyright resides with them. Informa PLC’s registered office is 5 Howick Place,
London SW1P 1WG. Registered in England and Wales. Number 3099067.

https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png

 * Home
 * Technologies
   * Back
   * SDN/SD-WAN
   * Cloud
   * RMM/PSA
   * Security
   * Telephony/UC/Collaboration
   * Cable
   * Mobility & Wireless
   * Fiber/Ethernet
   * Data Centers
   * Backup & Disaster Recovery
   * IoT
   * Desktop
   * Artificial Intelligence
   * Analytics
 * Strategy
   * Back
   * Mergers and Acquisitions
   * Channel Research
   * Business Models
   * Distribution
   * Master Agents
   * Sales & Marketing
   * Best Practices
   * Vertical Markets
   * Regulation & Compliance
   * Diversity, Equity & Inclusion
 * MSSP Insider
 * MSP 501
   * Back
   * MSP 501 Information Center
   * Apply for the 2022 MSP 501
   * 2021 MSP 501 Rankings
 * Intelligence
   * Back
   * Galleries
   * Podcasts
   * From the Industry
   * Reports/Digital Issues
   * Webinars
   * White Papers
 * Videos
   * Back
   * Fast Chats
   * Channel Futures TV
 * EMEA
 * Channel Chatter
   * Back
   * People on the Move
   * New/Changing Channel Programs
   * New Products & Services
   * Industry Honors
   * Channel Convergence
 * Resources
   * Back
   * Advisory Boards
   * Industry Organizations
   * Our Sponsors
   * Content Resources
   * Advertise
   * 2022 Editorial Calendar
 * Awards
   * Back
   * 2021 MSP 501
   * Circle of Excellence
   * DE&I 101
   * Top Gun 51
   * Channel Partners 101 (CP 101)
 * Events
   * Back
   * CP Conference & Expo
   * MSP Summit
   * Channel Partners Europe
   * Channel Partners Event Coverage
   * Webinars
   * Industry Events
 * DE&I

 * 
 * 
 * NEWSLETTER




 * 
 * Technologies
   * Back
   * SDN/SD-WAN
   * Cloud
   * RMM/PSA
   * Security
   * Telephony/UC/Collaboration
   * Cable
   * Mobility & Wireless
   * Fiber/Ethernet
   * Data Centers
   * Backup & Disaster Recovery
   * IoT
   * Desktop
   * Artificial Intelligence
   * Analytics
 * Strategy
   * Back
   * Mergers and Acquisitions
   * Channel Research
   * Business Models
   * Distribution
   * Master Agents
   * Sales & Marketing
   * Best Practices
   * Vertical Markets
   * Regulation & Compliance
   * Diversity, Equity & Inclusion
 * MSSP Insider
 * MSP 501
   * Back
   * MSP 501 Information Center
   * Apply for the 2022 MSP 501
   * 2021 MSP 501 Rankings
 * Intelligence
   * Back
   * Galleries
   * Podcasts
   * From the Industry
   * Reports/Digital Issues
   * Webinars
   * White Papers
 * Videos
   * Back
   * Fast Chats
   * Channel Futures TV
 * EMEA
 * Channel Chatter
   * Back
   * People on the Move
   * New/Changing Channel Programs
   * New Products & Services
   * Industry Honors
   * Channel Convergence
 * Resources
   * Back
   * Advisory Boards
   * Industry Organizations
   * Our Sponsors
   * Content Resources
   * Advertise
   * 2022 Editorial Calendar
 * Awards
   * Back
   * 2021 MSP 501
   * Circle of Excellence
   * DE&I 101
   * Top Gun 51
   * Channel Partners 101 (CP 101)
 * Events
   * Back
   * CP Conference & Expo
   * MSP Summit
   * Channel Partners Europe
   * Channel Partners Event Coverage
   * Webinars
   * Industry Events
 * DE&I

 * 
 * * 
   * 
   * 
   * Newsletter
 * 
 * REGISTER


 * MSPs
 * VARs / SIs
 * Agents
 * Cloud Service Providers
 * Channel Partners Events




SECURITY

--------------------------------------------------------------------------------

Shutterstock


LAPSUS$ HACKING GROUP REPORTEDLY HITS MICROSOFT, OKTA

 * Written by Edward Gately
 * March 22, 2022

 * 
 * 
 * 
 * 
 * 

Lapsus$ also claimed responsibility for breaches at Samsung and Nvidia.

The Lapsus$ hacking group has struck again, this time reportedly targeting
Microsoft and Okta with data leaks.

The Lapsus$ hacking group claims to have leaked the source code for Bing,
Cortana and other projects stolen from Microsoft’s internal Azure DevOps server,
Bleeping Computer reported. The group posted a screenshot to their Telegram
channel indicating the hack.

Microsoft didn’t respond to a request for comment. It told Bleeping Computer
that “they are aware of the claims and are investigating.”

Okta, which provides authentication services to thousands of customers such as
Major League Baseball (MLB) and MGM Resorts, is investigating a Lapsus$ data
breach.

According to Reuters, hackers posted screenshots of what they said was internal
information on their Telegram channel.

Okta issued the following statement in response to the Lapsus$ hacking group’s
claims:



“In late January 2022, Okta detected an attempt to compromise the account of a
third-party customer support engineer working for one of our subprocessors. The
matter was investigated and contained by the subprocessor. We believe the
screenshots shared online are connected to this January event. Based on our
investigation to date, there is no evidence of ongoing malicious activity beyond
the activity detected in January.”


LAPSUS$ BEHIND OTHER BIG-NAME DATA LEAKS

Lapsus$ is allegedly responsible for obtaining confidential data including the
source code that operates Samsung Galaxy smartphones. It also claimed
responsibility for the recent Nvidia breach.

Rajiv Pimplaskar is CEO of Dispersive, a network security provider.

Dispersive’s Rajiv Pimplaskar

“Attackers attack Microsoft and Okta because they know the value of identity,”
he said. “Identity, not apps, not servers, not devices, is the important
component in the cybersecurity world.”

Organizations must check identities, especially the privilege ones, in real
time, not just monthly, Pimplaskar said.

Saryu Nayyar is Gurucul‘s CEO and founder.

Gurucul’s Saryu Nayyar

“While customers are relying on vendors like Okta for zero trust and starting to
implement secure access service edge (SASE), this shows the need for more
advanced security operations tools to ensure that threat actors aren’t abusing
identity and access policies,” she said.

CISOs must invest more in automation-focused threat detection, investigation and
response (TDIR) solutions, Nayyar said.



Kevin Novak is managing director at Breakwater Solutions. He said if
the compromise involved a successful assault on client information, such as
client credentialing, key materials or source code pertaining to environments
that may lead to client compromises, then Okta may suffer much greater scrutiny
from the field for its “lack of adequate, timely notification of the event.”

Breakwater Solutions’ Kevin Novak

“Security professionals around the world are debating the list of compromise
possibilities based on the pictures posted about the hack, but no definitive
word has been shared by Okta,” he said.


CUSTOMERS CAN’T JUST ‘SWITCH OFF’ OKTA

If hackers compromised Okta’s environment, companies can’t “simply flip a
switch” and authenticate/authorize on a different platform, Novak said. Embedded
platforms require time to swap.

“While some have made conjectures about whether this hack contributed to another
breach here or there, it would seem that a full compromise of Okta’s backend
would have become far more obvious by now, but we’ll see more over the next few
months,” he said.

Want to contact the author directly about this story? Have ideas for a follow-up
article? Email Edward Gately or connect with him on LinkedIn.


Tags: MSPs VARs/SIs Best Practices Cloud SDN/SD-WAN Security Strategy


MOST RECENT

--------------------------------------------------------------------------------

 * 8x8, IntelePeer Among Winners of Enterprise Connect Awards
   Zoom and RingCentral were finalists in the Overall Best of Enterprise Connect
   category.
 * Why the Best Is Yet to Come
   RingCentral says while at CP Expo, partners should be looking to a bright
   future.
 * SADA Bolsters SaaS Alliance Program With New Benefits, Partners
   The year-old initiative now features more opportunities — and significant
   growth, the MSP says.
 * HPE GreenLake Partner Ecosystem Expands, Enables Mega Modernization
   The simplified experience provides one view of all services edge to cloud.

--------------------------------------------------------------------------------


LEAVE A COMMENT CANCEL REPLY

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Comment

Name *

Email *

Website

Save my name, email, and website in this browser for the next time I comment.








RELATED CONTENT

 * SASE Study: Enterprises Looking to Bring Security, Networking Together
 * F-Secure Splits, Unveils New WithSecure Brand for Corporate Security Business
 * Netwrix Partners Get Unified Partner Program Post-2021 M&A
 * Presidio Latest to Sign Strategic Collaboration Agreement with AWS


GALLERIES

View all


IMAGE GALLERY: CHANNEL PARTNERS CONFERENCE & EXPO — THRIVIN’ AT 25

 *  * 
    * 
    * 

March 21, 2022


INDUSTRY PERSPECTIVES

View all


5 WAYS TO INCREASE MSP PROFITABILITY IN 2022

 *  * 
    * 
    * 

March 21, 2022


REDUCING THE COMPLEXITY OF A MULTI-CLOUD ENVIRONMENT

 *  * 
    * 
    * 

March 16, 2022


BEST-OF-BREED, INTEGRATED SECURITY AND EVOLVING THREATS

 *  * 
    * 
    * 

March 3, 2022



WEBINARS

View all


THE RESILIENT POWER HOUR

March 23, 2022
 *  * 
    * 
    * 


HOW MSPS CAN USE AUTOMATION AND AI TO BRIDGE THE CYBERSECURITY TALENT GAP

March 29, 2022
 *  * 
    * 
    * 


HOW TO HELP CUSTOMERS NAVIGATE A MULTI-CLOUD WORLD

March 30, 2022
 *  * 
    * 
    * 


WHITE PAPERS

View all


THE LEAD GENERATION GUIDE FOR MSPS: HOW MSPS CAN GENERATE AND DRIVE NEW BUSINESS

 *  * 
    * 
    * 

March 15, 2022


THE FUNDAMENTAL BUILDING BLOCKS TO SCALE YOUR MSP

 *  * 
    * 
    * 

March 15, 2022


THE ULTIMATE MSP DISCOVERY CALL CHECKLIST

 *  * 
    * 
    * 

March 15, 2022


UPCOMING EVENTS

View all


CHANNEL PARTNERS CONFERENCE & EXPO

April 11, 2022 - April 14, 2022
 *  * 
    * 
    * 


CHANNEL PARTNERS EUROPE

June 14, 2022 - June 15, 2022
 *  * 
    * 
    * 


MSP SUMMIT

September 12, 2022 - September 15, 2022
 *  * 
    * 
    * 


VIDEOS AND FASTCHATS

View all

OPENTEXT TO UNVEIL NEW PARTNER PROGRAM IN 2022


ZAYO: ‘DNA’ OF UNDERSTANDING PARTNERS, GO-TO-MARKET NOW SIGNIFICANTLY DIFFERENT

 *  * 
    * 
    * 

March 18, 2022


SANGOMA: STAR2STAR ACQUISITION POSITIONED US TO BE ‘LEADING SAAS COMPANY’

 *  * 
    * 
    * 

March 18, 2022


HIGH WIRE NETWORKS EXPANDS OVERWATCH WITH PREVENTION SUITE

 *  * 
    * 
    * 

March 15, 2022


TWITTER

.@Zoom and @RingCentral were finalists in the Overall Best of Enterprise Connect
award. dlvr.it/SM9v5k https://t.co/oHI2BqkX2z

March 22, 2022

Why apply for the #MSP501? 1. It's free! 💸 2. Gain recognition for your hard
work in 2021 💪 3. Become an award-winn… twitter.com/i/web/status/1…

March 22, 2022

.@FSecureOfficial announces separate corporate #security business under new
brand @With_Secure.… twitter.com/i/web/status/1…

March 22, 2022

.@Netwrix launches unified #partnerprogram post-2021 acquisitions.
#cybersecurity dlvr.it/SM9N19 https://t.co/3yVSGVFL98

March 22, 2022

.@AWSCloud is investing again in the #channel, this time with @Presidio. Find
out what the #SCA entails.… twitter.com/i/web/status/1…

March 22, 2022

.@RingCentral echoes the theme of #CPExpo as it pertains to its #partnerprogram.
@Channel_Expo… twitter.com/i/web/status/1…

March 22, 2022

.@SADA beefs up #SaaS Alliance Program with more benefits, new partners.
dlvr.it/SM95K2 https://t.co/sKuN2JWoJf

March 22, 2022

Hewlett Packard Enterprise (@HPE) has made advancements to #HPE GreenLake, the
company’s flagship offering.… twitter.com/i/web/status/1…

March 22, 2022



MSSP INSIDER



Business advice for MSSPs and news from the broader security channel.


NEWSLETTERS AND UPDATES



Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and
more.


LIVE CHANNEL EVENTS



Get the latest information on the next industry-leading Channel Partners event.


GALLERIES



Educational slide shows and images from live events.


MEDIA KIT AND ADVERTISING



Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

 * Channel Partners Events
 * Telecoms.com
 * MSP 501
 * Black Hat
 * IoT World Today
 * Omdia

WORKING WITH US

 * Contact
 * About Us
 * Advertise
 * Newsletter

FOLLOW CHANNEL FUTURES ON SOCIAL

 * 
 * 
 * 

 * Privacy
 * CCPA: “Do Not Sell My Data”
 * Cookie Policy
 * Terms

Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales
with company number 8860726 whose registered and Head office is 5 Howick Place,
London, SW1P 1WG.



This website uses cookies, including third party ones, to allow for analysis of
how people use our website in order to improve your experience and our services.
By continuing to use our website, you agree to the use of such cookies. Click
here for more information on our Cookie Policy and Privacy Policy.
X




×
We Value Your Privacy
Settings
NextRoll, Inc. ("NextRoll") and our advertising partners use cookies and similar
technologies on this site and use personal data (e.g., your IP address). If you
consent, the cookies, device identifiers, or other information can be stored or
accessed on your device for the purposes described below. You can click "Allow
All" or "Decline All" or click Settings above to customize your consent.
NextRoll and our advertising partners process personal data to: ● Store and/or
access information on a device; ● Create a personalized content profile; ●
Select personalised content; ● Personalized ads, ad measurement and audience
insights; ● Product development. For some of the purposes above, our advertising
partners: ● Use precise geolocation data. Some of our partners rely on their
legitimate business interests to process personal data. View our advertising
partners if you wish to provide or deny consent for specific partners, review
the purposes each partner believes they have a legitimate interest for, and
object to such processing.
If you select Decline All, you will still be able to view content on this site
and you will still receive advertising, but the advertising will not be tailored
for you. You may change your setting whenever you see the Manage consent
preferences on this site.
Decline All
Allow All
Manage consent preferences