Oktapus
ACM.123 Reviewing one of the most dangerous attacks in 2022 to design an authentication system less susceptible to attack
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
⚙️ Check out my series on Automating Cybersecurity Metrics. The Code.
🔒 Related Stories: Data Breaches | Okta | IAM | Cybersecurity
💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
It’s always a good idea to review past data breaches like I did in the last post to determine what happened and how you can prevent a similar attack in your own organization. In my last post, I wrote about how we might design a batch job authentication flow and potential threats. I mentioned that we don’t want batch job administrators and cloud users to fall victim to something like the Oktapus breach. Let’s take a closer look at what caused this breach and how we might prevent it.
Researchers from Group-IB reported on one particularly far-reaching attack in 2022. They named the attack Oktapus — because it make use of Okta, a product that helps identify users and grant them access to systems.