A few weeks ago, the threat actor who orchestrated the attacks against Twilio and Cloudflare was connected to a broader phishing scheme that targeted 136 organisations. In total, 9,931 accounts were compromised as part of this campaign.
Group-IB has slammed the hacking campaign as an attempt to obtain Okta identity credentials and two-factor authentication (2FA) codes from the organisations’ users.
The campaigns were dubbed “well-designed and well-executed” by the Singapore-based firm, which claimed that the adversary targeted employees of Okta’s client companies.
“The attackers were very active and tried to get as many victims as possible in a short period,” said Dmitry Galov, head of Group-IB’s threat intelligence team.
“We detected that the adversary was scanning the Internet for Okta subdomains, likely in an attempt to find new victims.”
According to group-IB, the threat actor used spear-phishing emails that they carefully crafted to look like they came from Okta.
The emails claimed that the recipient’s account needed to be updated and directed them to a fake Okta login page. Once the victim entered their credentials, the attacker would then use an automated bot to check if users also entered the 2FA code.
If the victims entered the 2FA code, the attacker would then be able to use the victim’s Okta account to gain access to corporate resources.
“In some cases, they were successful in stealing data from the victims’ accounts,” Galov said. “In other cases, they only managed to get 2FA codes but didn’t succeed in bypassing Okta’s security mechanisms.”
Group-IB has not named the organisations that hackers targeted in this campaign. However, many of them are likely based in the United States, given that authorities located most of the IP addresses used in the attacks in the country.
This is not the first time that the Okta hackers have struck. In February, they targeted Cloudflare with a similar phishing scheme.
A month later, they successfully breached Twilio’s systems and gained access to customer data.
At least 169 phishing domains were set up for this purpose, primarily targeting organisations in the U.S. (114), India (4), Canada (3), France (2), Sweden (2), and Australia (1). These websites used a previously undocumented phishing kit.
It’s still not clear who is behind these attacks. However, Group-IB believes they are likely part of a more comprehensive cyber-espionage campaign that a nation-state actor is carrying out.
These latest attacks show that the Okta hackers are still active and are constantly finding new ways to target their victims. Organisations need to be aware of these threats and take steps to protect themselves.
Organisations should ensure that their employees are trained to spot phishing emails and that they have a robust 2FA solution. They should also consider using a tool like Okta Verify, which makes it more difficult for attackers to bypass 2FA protections.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...