Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Cyber criminals would prefer businesses don’t use Okta | Computer Weekly

By Computer Weekly by By Computer Weekly
August 6, 2025
Home Uncategorized
Share on FacebookShare on Twitter


Cyber criminal gangs are telling their targets to stop authenticating using Okta services in what the company’s threat management team is describing as a ringing endorsement of its technology, and a lesson in why phishing-resistant authentication methods are now not merely a nice-to-have, but a must-have.

Thanks to its position as a first-line-of-defence in many organisations, Okta’s identity management systems are frequently targeted by threat actors as they attempt to work their way into their victims’ systems.

Perhaps most famously, its services were exploited by the gang known as Scattered Spider in a series of 2023 cyber heists on Las Vegas casino operators.

This week, Okta vice president of threat intelligence, Brett Winterford, revealed how the firm had stumbled across a new social engineering campaign by an undisclosed threat actor in which the cyber criminals told their targets “please sign in normally, do not use the Okta FastPass feature”.

FastPass is a feature in Okta’s Verify service that offers passwordless authentication – such as biometrics or device-based security – to access secured resources.

“This unusual instruction, delivered to targets of a recent social engineering campaign observed by Okta Threat Intelligence, offers a look into how cyber criminals are evolving their tactics in response to higher adoption of advanced, high-assurance sign-in methods,” said Winterford in a blog post.

“During the observed phishing attacks, attackers … tried to convince targeted users to evade security measures the company had in place. The campaign abused trusted instant messaging communications channels – in this case, Slack – to deliver lures to targeted users.”

In the message, headlined ‘Happy Thursday & Congratulations’, the threat actor posed as a company CEO and messaged the target to invite them to an ‘exclusive new Slack workspace’.

The message was of course a phish, because the threat actor then asked the target to complete setup by connecting their Okta account via a link.

However, the cyber criminals claimed that they were seeing ‘some issues’ with how Okta FastPass worked with a new Slack integration, so asked the told the target not to use FastPass, implying that they should enter their password directly at the link.

The link in question, said Winterford, directed users to visit phishing pages running an adversary-in-the-middle (AiTM) transparent proxy known as Evilginx. This phishing kit would then have oassed the password-based authentication request through the threat actor-controlled infrastructure, allowing them to steal both passwords and any one-time-passcode (OTP) needed to access the resource.

Winterford said that attackers understand well that the choice of sign-in methods organisations offer their end-users is hugely important, noting that AiTM kits aren’t effective in circumstances where there are strong phishing-resistant authentication methods, or phishing resistance was enforced in policy.

“When administrators enforce phishing resistance in an authentication policy rule, a user can only access the protected resource using Okta FastPass, FIDO2-based authentication or PIV [Personal Identity Verification] Smart Cards,” he wrote.

“These sign-in methods will not allow access if the request is routed through a transparent proxy. Users can’t be tricked into selecting any other sign-in method.

“If all your users are enrolled in phishing-resistant authenticators, you’ve done most of the work,” added Winterford.



Source link

By Computer Weekly

By Computer Weekly

Next Post
The 2025 Tech Innovator Awards

The 2025 Tech Innovator Awards

Recommended.

KYOCERA AVX RELEASES NEW 3DB HYBRID COUPLERS

KYOCERA AVX RELEASES NEW 3DB HYBRID COUPLERS

July 1, 2025
In New ‘PSA’ From Liquid Death and Cineverse, The Toxic Avenger (Peter Dinklage) Explains the Dangers of High-Sugar Soda

In New ‘PSA’ From Liquid Death and Cineverse, The Toxic Avenger (Peter Dinklage) Explains the Dangers of High-Sugar Soda

August 20, 2025

Trending.

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

October 6, 2025
Cloud Computing on the Rise: Market Projected to Reach .6 Trillion by 2030

Cloud Computing on the Rise: Market Projected to Reach $1.6 Trillion by 2030

August 1, 2025
Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

July 14, 2025
The Ultimate MSP Guide to Structuring and Selling vCISO Services

The Ultimate MSP Guide to Structuring and Selling vCISO Services

February 19, 2025
Translators’ Voices: China shares technological achievements with the world for mutual benefit

Translators’ Voices: China shares technological achievements with the world for mutual benefit

June 3, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio