Article Details

Scrape Timestamp (UTC): 2023-10-24 15:17:44.594

Source: https://www.theregister.com/2023/10/24/1password_confirms_all_logins_are/

Original Article Text

Click to Toggle View

1Password confirms attacker tried to pull list of admin users after Okta intrusion. Says logins are safe, as high-profile customers complain they knew about the breach before Okta. 1Password is confirming it was attacked by cyber criminals after Okta was breached for the second time in as many years, but says customers' login details are safe. The outfit said the attack was initially detected on September 29 by a member of 1Password's IT team after they received an email indicating that they had ordered a report including a list of all 1Password admins. Knowing they didn't order this report, the company's incident response team was quickly engaged. They found a suspicious IP address and later realized the unknown attacker accessed the company's Okta instance with admin privileges. The investigation found no evidence of data exfiltration or access of any systems outside of Okta. Attackers were instead observed attempting to "lay low" and scout for intelligence that might later lead to a bigger, more sophisticated attack. "We immediately terminated the activity, investigated, and found no compromise of user data or other sensitive systems, either employee-facing or user-facing," said Pedro Canahuati, CTO at 1Password, in a blog post. Before being removed from the network, the attacker performed actions including: How the 1Password attack unfolded The attack on 1Password began in the same way as others have in this new campaign, with the attacker accessing a HTTP Archive (HAR) file uploaded to Okta's customer support portal. Uploading HAR files to Okta's customer support portal is common practice when Okta support is engaged with a customer.  Inside this HAR file was information about the traffic to and from Okta's servers from the IT team member's browser, but also inside it is other data like the session cookie. At some point after 1Password engaged Okta's support and before the support agent interacted with the HAR file, an attacker was able to access it and use the session to access Okta's admin portal, according to the incident response report. "It is not known how the actor gained access to this session, though it has been confirmed that the generated HAR file contained the necessary information for an attacker to hijack the user's session," the report read. "This was confirmed by IT creating a HAR file, and Security using Burp Suite to force the browser to use the session cookies captured in the HAR file to reproduce the events of the incident." Originally, there was some confusion over how this was carried out. Initial investigations focused on Okta's side but logs revealed that the attackers' actions all occurred before the Okta support agent accessed the HAR file, eliminating the possibility of there being a rogue support staffer. Then attention turned to the 1Password IT worker who uploaded the HAR file over a public Wi-Fi network at a hotel, but this avenue also proved fruitless. "Based on an analysis of how the file was created and uploaded, Okta's use of TLS and HSTS, and the prior use of the same browser to access Okta, it is believed that there was no window in which this data could have been exposed to the Wi-Fi network, or otherwise subject to interception." Finally, the IT staffer's macOS machine was scanned for malware but showed no sign of any nasty activity, neither on their machine nor on their user accounts.  The main suspicion continued to be malware until last week when Okta publicized the issues it was facing with a number of its customers, including 1Password. The attacker was able to compromise Okta's internal support systems, which is how they were able to access the 1Password IT team member's HAR file after they sent it to Okta support. After terminating the intrusion, the IT team member's credentials were rotated and their Yubikey was the only way to complete MFA safeguards.  A number of configuration changes were also made to the company's Okta instance, including the tightening of MFA rules, reducing admin session times and the number of super admin accounts, and denying logins from non-Okta IDPs. Another Okta nightmare 1Password joins BeyondTrust and Cloudflare in the list of high-profile customers to have mitigated attacks brought on by Okta's issues. Cloudflare was quick to highlight that it's the second time security failings at Okta have led to attacks on the web performance and security company. In March 2022 it was revealed that during a five-day window, a Lapsus$ attacker had remote access to an Okta support engineer's computer but Cloudflare found no evidence of real compromise of its Okta tenant. At the time, according to screenshots posted by the attackers, their level of access suggested they had the power to change customers' user's passwords, but it wouldn't have impacted Cloudflare since it uses a combination of passwords and hardware keys for MFA. Similar to the 1Password case, a Cloudflare session token was hijacked after it was created with Okta support. Cloudflare said it was able to detect and mitigate the intrusion of its Okta instance more than 24 hours before Okta notified it. It was a similar story at BeyondTrust: Stolen session token, immediate detection and remediation, seemingly knew about it before Okta did. "We raised our concerns of a breach to Okta on October 2nd," BeyondTrust said in its disclosure.  "Having received no acknowledgment from Okta of a possible breach, we persisted with escalations within Okta until October 19th when Okta security leadership notified us that they had indeed experienced a breach and we were one of their affected customers. Okta confirmed in its October 20 disclosure that all customers that were impacted by the incident have been notified. "Okta has worked with impacted customers to investigate, and has taken measures to protect our customers, including the revocation of embedded session tokens," it said.  "In general, Okta recommends sanitizing all credentials and cookies/session tokens within a HAR file before sharing it.  "Attacks such as this highlight the importance of remaining vigilant and being on the lookout for suspicious activity."

Daily Brief Summary

CYBERCRIME // 1Password and other high-profile Okta customers fend off cyberattacks despite repeated intrusions

1Password confirmed that it was targeted by hackers after recent cyber attacks on Okta, an identity management service provider, but says that its customers' login information was not compromised.

The attack, which was detected on September 29, involved a member of 1Password's IT team receiving an unexpected report containing a list of all 1Password admins. The attack was traced back to a suspicious IP address, with the attacker gaining access to the company’s Okta admin portal.

The investigation found no evidence of data exfiltration or access of any systems outside of Okta, with the attackers primarily scouting for intelligence that could allow for a larger, more sophisticated attack.

It was found that an attacker had accessed a HTTP Archive (HAR) file uploaded to Okta's customer support portal. While originally it was believed that the file was intercepted through a public Wi-Fi network, it was eventually disclosed that the attackers had compromised Okta’s internal systems to gain access.

High-profile customers Cloudflare and BeyondTrust have also mitigated attacks stemming from Okta's security issues, reporting that they detected and addressed threats before Okta could notify them.

Okta has reportedly been working with affected customers, providing general recommendations for sanitizing all credentials and cookies/session tokens within a HAR file before sharing.