Lapsus$ Found a Spreadsheet of Passwords as They Breached Okta, Documents Show (techcrunch.com) 39
The Lapsus$ hackers used compromised credentials to break into the network of customer service giant Sitel in January, days before subsequently accessing the internal systems of authentication giant Okta, according to documents seen by TechCrunch that provide new details of the cyber intrusion that have not yet been reported. The report adds: [...] The documents provide the most detailed account to date of the Sitel compromise, which allowed the hackers to later gain access to Okta's network. [...] The documents, obtained by independent security researcher Bill Demirkapi and shared with TechCrunch, include a Sitel customer communication sent on January 25 -- more than a week after hackers first compromised its network -- and a detailed timeline of the Sitel intrusion compiled by incident response firm Mandiant dated March 17 that was shared with Okta.
According to the documents, Sitel said it discovered the security incident in its VPN gateways on a legacy network belonging to Sykes, a customer service company working for Okta that Sitel acquired in 2021. The timeline details how the attackers used remote access services and publicly accessible hacking tools to compromise and navigate through Sitel's network, gaining deeper visibility to the network over the five days that Lapsus$ had access. Sitel said that its Azure cloud infrastructure was also compromised by hackers. According to the timeline, the hackers accessed a spreadsheet on Sitel's internal network early on January 21 called "DomAdmins-LastPass.xlsx." The filename suggests that the spreadsheet contained passwords for domain administrator accounts that were exported from a Sitel employee's LastPass password manager.
According to the documents, Sitel said it discovered the security incident in its VPN gateways on a legacy network belonging to Sykes, a customer service company working for Okta that Sitel acquired in 2021. The timeline details how the attackers used remote access services and publicly accessible hacking tools to compromise and navigate through Sitel's network, gaining deeper visibility to the network over the five days that Lapsus$ had access. Sitel said that its Azure cloud infrastructure was also compromised by hackers. According to the timeline, the hackers accessed a spreadsheet on Sitel's internal network early on January 21 called "DomAdmins-LastPass.xlsx." The filename suggests that the spreadsheet contained passwords for domain administrator accounts that were exported from a Sitel employee's LastPass password manager.
Amateur level (Score:2)
To be found in lots and lots of places. It starts getting funky when these get mailed arpund.
To prevent that, buy ... oh shit (Score:2)
Okta sells their product partly based on the promise of keeping people from doing that. So egg on their face.
On the other hand, it's an example of the damage that can be done when you don't have proper secrets management. If that unit had been using all the Okta products, this probably wouldn't have happened.
My company makes a lot of acquisitions, so I can understand how a file could exist from before the acquisition. You don't always have time to sanitize everything in the new company before connecting th
Re: (Score:2)
You don't always have time to sanitize everything in the new company before connecting them to the network.
If your core business is security, you should not be doing that.
Re: (Score:2)
You don't always have time to sanitize everything in the new company before connecting them to the network.
If your core business is security, you should not be doing that.
Indeed. Things should be prioritized differently and resources to do things securely should be found. Otherwise everything that company does in the security-space becomes suspect.
Re: To prevent that, buy ... oh shit (Score:1)
Re: (Score:2)
Sykes is part of Okta.
Correction: Part of Sitel. Disregard my message (Score:2)
I thought Okta had acquired Sykes.
Nope, Sitel did.
Re: (Score:2)
I was expecting a security company to at least use KeePass, just because it has some guaranteed protection, at the minimum, just to ensure that if the file falls into the wrong hands, it might take some brute forcing to get it open.
Re: (Score:2)
I was expecting a security company to at least use KeePass, just because it has some guaranteed protection, at the minimum, just to ensure that if the file falls into the wrong hands, it might take some brute forcing to get it open.
It doesn't matter whether you're using KeePass or LastPass if some fuckwit exports the database into a non-encrypted format. Even KeePassX, (at least my version), contains an "Export to CSV" function.
At some point you're depending on the sense, or lack thereof, of the people who work for you. That will always be the most frequent point of failure.
Re: (Score:2)
It doesn't matter whether you're using KeePass or LastPass if some fuckwit exports the database into a non-encrypted format. Even KeePassX, (at least my version), contains an "Export to CSV" function.
At some point you're depending on the sense, or lack thereof, of the people who work for you. That will always be the most frequent point of failure.
Exactly. And if you see that this sense is lacking at a company that styles itself as a "security" company, you stay the hell away from them and their products. Because it very likely is a company-wide problem and the ones ultimately responsible are the C-levels.
Real Info! (Score:2)
Re: Real Info! (Score:2)
Because if it was a CSV it'd be more secure?
Re: (Score:2)
woosh...
Re: (Score:2)
OP was making a point about operating systems, not file formats.
Re: (Score:2)
Except it says they used compromised credentials to do the initial intrusion.
This was purely a case of terrible security practices that I've definitely seen in all eco systems.
1) VPN without 2fa (or someone was tricked into giving second factor perhaps, but it doesn't say)
2) someone had multiple domain admin passwords
3) that someone dumped them into plain text
If you think this is at all unique to a windows environment you're just wrong. This was enterprise, but in smaller systems I've found this type of beh
bye-bye! (Score:2)
somebody is very fired.
Re: (Score:2)
Doesn't that break a lot of compliance rules? I know that with PCI-DSS, FERPA, HIPAA, and other regs, that passwords are meant to at least be stored in a PAM or other authenticated system for access? If that is the case, if this breach causes breaches in subsequent companies, the compliance enforcement orgs might just have a word or two there.
Re: (Score:2)
Well they already compromised credentials, which they used to access the file containing more passwords, so it seems the "other authenticated system for access" bit was already being complied with.
A lot of these security standards require access controls to be in place, but don't necessarily require them to be provably robust.
Many places have a centralised store of credentials, which is then protected by another set of potentially much weaker credentials. Usually Active Directory is the basket that all your
Re: (Score:2)
Best practice for password lists is to use different passwords for everything and to make them strong, which pretty much requires a password manager or keeping a list. They WERE in lastpass or somerthing but someone did an export, which itself isn't a bad idea. Having them encrypted in lastpass and not having a backup somewhere else could be a nightmare if that's lost. But that export should have been printed out and placed in a safe or some other physically secure location, or placed in some other encry
Re: (Score:2)
MY password list is in an encrypted disk image, along with other secure things like ssh private keys and certificate keys.
Is this more secure than using something such as KeePassX? If it is I may add it to my security practices via VeraCrypt.
Re: (Score:2)
You can select what security you want to use with the disk image, I don't know what your options are with KeePass. It's also trivial to store anything inside a DMG, and I assume that KeePass has limitations on what it can store
When the DMG is mounted, it's basically transparent to any application, such as Excel, that might seek to use it. Excel creates a temp file while you edit a document, (as do many other editors) and if you're pulling a document out of encryption, editing it, copying back to encrypted
Re: (Score:2)
Thanks for the info! I mostly store passwords, but your point about temp files is a good one and I'll keep it in mind if I'm working with documents that contain sensitive information.
Re: (Score:2)
You can just store the KeePass DB in the DMG file, which gives the best of all worlds. I keep my keyfiles on a read-only encrypted volume that is mounted only when opening KeePassXC, but the actual KeePass DB sits on a volume that is often backed up, just to ensure that I can recover it.
Re: (Score:2)
Depends on the password manager. KeePass is 100% open and supports AES-256, which is good enough. Other PW managers, you may not know what it is doing.
An encrypted disk image, be it MacOS's DMG or sparse bundles, Windows's .VHDX + BitLocker, Linux LUKS, or VeraCrypt is definitely secure, but it isn't really a password manager, but more of a place to throw secure documents. Nothing wrong with encrypted disk images.
I use KeePass because it allows me to have all the passwords in one place. If I need to sto
Re: (Score:2)
I can address some of that.
(1) is a valid concern, if the attacker has access while the image is mounted, they have complete access to the contents. It's a trade-off for convenience. Also, unlike the osx keychain, there is no restriction as to what processes on the computer have access to the data in a mounted disk image. A well-designed bit of malware could watch /Volumes for encrypted disk images to appear and make quiet copies of everything on them automatically on sight. Though this is also a risk f
Anyone else seeing ads? (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
I went to the website of the subsidiary where the breach occurred (Sykes) and did some poking around, trying to get a vibe for what this company was about.
Firstly, yes, it's a Wordpress web site. Complete with unremoved Sample posts [sykes.com] in rotation through their annoying scrolly things on every page.
When I saw a post about collecting/securing data for personalized recommendations, I felt that would be the most relevant one to click on. So, how are they pitching that to their customers? They say how in the past,
Re: (Score:2)
Re: (Score:2)
No Insurance Payout for You ! (Score:2)
Maybe use robots instead of humans to guard data (Score:2)
Key takeaway: Humans are incompetent at security and their ability to cause major fuckups increases with the amount of money at stake. SNAFU means it is impossible to depend on a security provider based only on humans. They will get social networked, fired and replaced by bean counters, forget to use post-it notes instead of Excel files for passwords ;), etc. They can have every ISO process and still be fuckups. Perhaps this could be solved with an AI / robot that just looks for clues to fuckupery on their
What? No Post It notes? (Score:2)
Seriously? This may be the worst IT dumbfuckery I've heard of in a long time. Well that and setting it all to "PASSWORD"
We can guess how this happened (Score:2)
Headline is wrong, the third party CSR not Okta (Score:1)