Oktapus

ACM.123 Reviewing one of the most dangerous attacks in 2022 to design an authentication system less susceptible to attack

Teri Radichel
Cloud Security
Published in
11 min readJan 4, 2023

--

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

⚙️ Check out my series on Automating Cybersecurity Metrics. The Code.

🔒 Related Stories: Data Breaches | Okta | IAM | Cybersecurity

💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

It’s always a good idea to review past data breaches like I did in the last post to determine what happened and how you can prevent a similar attack in your own organization. In my last post, I wrote about how we might design a batch job authentication flow and potential threats. I mentioned that we don’t want batch job administrators and cloud users to fall victim to something like the Oktapus breach. Let’s take a closer look at what caused this breach and how we might prevent it.

Researchers from Group-IB reported on one particularly far-reaching attack in 2022. They named the attack Oktapus — because it make use of Okta, a product that helps identify users and grant them access to systems.

--

--

Teri Radichel
Cloud Security

CEO 2nd Sight Lab | Penetration Testing & Assessments | AWS Hero | Masters of Infosec & Software Engineering | GSE 240 etc | IANS | SANS Difference Makers Award