Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Cyber criminals would prefer businesses don’t use Okta | Computer Weekly

By Computer Weekly by By Computer Weekly
August 6, 2025
Home Uncategorized
Share on FacebookShare on Twitter


Cyber criminal gangs are telling their targets to stop authenticating using Okta services in what the company’s threat management team is describing as a ringing endorsement of its technology, and a lesson in why phishing-resistant authentication methods are now not merely a nice-to-have, but a must-have.

Thanks to its position as a first-line-of-defence in many organisations, Okta’s identity management systems are frequently targeted by threat actors as they attempt to work their way into their victims’ systems.

Perhaps most famously, its services were exploited by the gang known as Scattered Spider in a series of 2023 cyber heists on Las Vegas casino operators.

This week, Okta vice president of threat intelligence, Brett Winterford, revealed how the firm had stumbled across a new social engineering campaign by an undisclosed threat actor in which the cyber criminals told their targets “please sign in normally, do not use the Okta FastPass feature”.

FastPass is a feature in Okta’s Verify service that offers passwordless authentication – such as biometrics or device-based security – to access secured resources.

“This unusual instruction, delivered to targets of a recent social engineering campaign observed by Okta Threat Intelligence, offers a look into how cyber criminals are evolving their tactics in response to higher adoption of advanced, high-assurance sign-in methods,” said Winterford in a blog post.

“During the observed phishing attacks, attackers … tried to convince targeted users to evade security measures the company had in place. The campaign abused trusted instant messaging communications channels – in this case, Slack – to deliver lures to targeted users.”

In the message, headlined ‘Happy Thursday & Congratulations’, the threat actor posed as a company CEO and messaged the target to invite them to an ‘exclusive new Slack workspace’.

The message was of course a phish, because the threat actor then asked the target to complete setup by connecting their Okta account via a link.

However, the cyber criminals claimed that they were seeing ‘some issues’ with how Okta FastPass worked with a new Slack integration, so asked the told the target not to use FastPass, implying that they should enter their password directly at the link.

The link in question, said Winterford, directed users to visit phishing pages running an adversary-in-the-middle (AiTM) transparent proxy known as Evilginx. This phishing kit would then have oassed the password-based authentication request through the threat actor-controlled infrastructure, allowing them to steal both passwords and any one-time-passcode (OTP) needed to access the resource.

Winterford said that attackers understand well that the choice of sign-in methods organisations offer their end-users is hugely important, noting that AiTM kits aren’t effective in circumstances where there are strong phishing-resistant authentication methods, or phishing resistance was enforced in policy.

“When administrators enforce phishing resistance in an authentication policy rule, a user can only access the protected resource using Okta FastPass, FIDO2-based authentication or PIV [Personal Identity Verification] Smart Cards,” he wrote.

“These sign-in methods will not allow access if the request is routed through a transparent proxy. Users can’t be tricked into selecting any other sign-in method.

“If all your users are enrolled in phishing-resistant authenticators, you’ve done most of the work,” added Winterford.



Source link

By Computer Weekly

By Computer Weekly

Next Post
The 2025 Tech Innovator Awards

The 2025 Tech Innovator Awards

Recommended.

ICE Has Spyware Now

ICE Has Spyware Now

September 6, 2025
Tariff turmoil is making supply chain security riskier | Computer Weekly

Tariff turmoil is making supply chain security riskier | Computer Weekly

April 17, 2025

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
Huawei uvádí na trh řešení FAN nové generace

Huawei uvádí na trh řešení FAN nové generace

March 6, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio