The Okta before the storm?

Share This Post

The internet is a buzz today after data extortion group Lapsus$ posted screenshots on its Telegram channel. They claim the screenshots to be of Okta’s backend administrative consoles and customer data.

Worryingly, Lapsus$ claims to have not gone after Okta for their data, but to target Okta’s customers.

Okta claims that they have seen no evidence of continued breach after security incident which occurred in late January involving the account of a third party customer support engineer.

Companies who rely on Okta for identity management and authentication services are being instructed to ‘remain vigilant and on high alert’. Monitor user activity, especially that of privileged users and admins, and watch of unusual activity.

Okta has a white paper on Leveraging Identity Data in Cyber Attack Detection and Response, which could be helpful in the effort to be vigilant.

https://www.okta.com/resources/whitepaper/leveraging-identity-data-in-cyber-attack-detection-and-response/

If any meaningful IoCs or more information comes to light, we will share it here.





Reach out to our incident response team for help

More To Explore

Information Security News – 8/18/2025

DEF CON Research Takes Aim at ZTNA, Calls It a Bust Article Link: https://www.networkworld.com/article/4039042/def-con-research-takes-aim-at-ztna-calls-it-a-bust.html Personalization in Phishing: Advanced Tactics for Malware Article Link: https://cofense.com/blog/personalization-in-phishing-advanced-tactics-for-malware-delivery Gemini

Information Security News – 8/11/2025

St. Paul, Minnesota, Hit by Major Cyber Attack, State of Emergency Declared, National Guard Deployed Article Link: https://www.cpomagazine.com/cyber-security/st-paul-minnesota-hit-by-major-cyber-attack-state-of-emergency-declared-national-guard-deployed/ Google Breached — What We Know, What

Do You Want to Shore Up Your Defenses?

We're opening our first round of threat hunting engagements to 100 organizations. Sign up or join the wait list here.