Business News

LAPSUS$ Hackers Claim to Have Breached Microsoft and Authentication Firm Okta

0 0
Read Time:2 Minute, 18 Second

Microsoft and authentication service providers, OKTA said they were investigating the claims of potential violations allegedly by the $ Lapsus government gang The development, which was first reported by representatives and Reuters, came after the Cyber ​​criminal group posted screen catches and the source of the code what he said was the company’s internal project and system on the telegram channel.

The 37GB leakage archive shows that the group may have accessed the repository associated with Microsoft Bing, Bing Maps, and Cortana, with images highlighting the Atlassian OKTA suite and in-house sagging channels “For services that give strength to the authentication system to many of the largest companies (and Fedramp approves) I think these security measures are quite bad,” wrote the hacking cartel on the telegram Above this, the group accused that he violated LG Electronics (LGE) for “the second time” in a year Bill Demirkapi, an independent security researcher, noted that “Lapsus $ seems to have gained access to CloudFlare’s tenants with the ability to reset the employee’s password,” adding a company “to openly to openly recognize violations for at least two months.”

$ Lapsus since clarified that it did not violate the octa database and that “our focus is only on octa customers.” This can lead to serious implications for government institutions and other companies that rely on octa to authenticate user access to the internal system “At the end of January 2022, the octa detected efforts to compromise a third-party customer support engineer who worked for one of our subprocations. The problem was investigated and contained by the subprocationsor,” CEO CEO Todd McKinnon said in a tweet.

“We believe the screenshot distributed online is connected with this January event. Based on our investigation until now, there is no evidence of an ongoing evil activity outside the activity detected in January,” added McKinnon CloudFlare, in response, said it rearranged the credentials of an octa employee who had changed their passwords in the past four months, out of cautious abundance. Unlike traditional ransomware groups that follow the double separation guidebook steal data from the victim and then encrypt the information in return for payments, new participants for the threat landscape focus more on data theft and use it to squeeze the target.

In a few months since it was active at the end of December 2021, Gang Cybercrime had won a long list of high profile victims, including Impresa, Nvidia, Samsung, Mercado Libre, Vodafone, and the latest Ubisoft “Every successful attack on service providers or software developers can have further impact outside the scope of the initial attack,” Mike Denapoli, Cymulate’s main security architect, said in a statement. “Service users and platforms must be warned in the fact that there is a possibility of supply chain attacks that need to be maintained.”

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

Average Rating

5 Star
0%
4 Star
0%
3 Star
0%
2 Star
0%
1 Star
0%

Leave a Reply

Your email address will not be published. Required fields are marked *