{"id":45826,"date":"2022-03-22T15:03:16","date_gmt":"2022-03-22T15:03:16","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33241\/Okta-Breached-Through-Customer-Support.html"},"modified":"2022-03-22T15:03:16","modified_gmt":"2022-03-22T15:03:16","slug":"okta-breached-through-customer-support","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/okta-breached-through-customer-support\/","title":{"rendered":"Okta Breached Through Customer Support"},"content":{"rendered":"<div readability=\"32\">\n<div><picture class=\"responsive-image lazyloader--lazy lazyloader--lowres\"><source media=\"(min-width: 1000px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/6239b79e1b4fc1009bf1d043\/lede\/1647949742558-okta.jpeg?crop=1xw:0.84375xh;center,center&amp;resize=20:*\"><source media=\"(min-width: 700px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/6239b79e1b4fc1009bf1d043\/lede\/1647949742558-okta.jpeg?crop=1xw:0.84375xh;center,center&amp;resize=20:*\"><source media=\"(min-width: 0px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/6239b79e1b4fc1009bf1d043\/lede\/1647949742558-okta.jpeg?crop=1xw:0.84375xh;center,center&amp;resize=20:*\"><img class=\"responsive-image__img\" alt=\"Okta\"><\/picture><\/div>\n<p>Image: NurPhoto\/Contributor<\/p>\n<\/div>\n<div data-component=\"BodyComponentRenderer\" readability=\"80.550099295902\">\n<div class=\"topic-callout\" readability=\"7.2888888888889\">\n<div class=\"topic-callout__img\"><a href=\"https:\/\/www.vice.com\/en\/topic\/cyber\"><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*\" alt=\"Screen Shot 2021-02-24 at 3\"><\/a><\/div>\n<p>Hacking. Disinformation. Surveillance. CYBER is Motherboard&#8217;s podcast and reporting on the dark underbelly of the internet.<\/p>\n<\/div>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"27.110266159696\"><\/p>\n<p>Cybersecurity giant Okta, which provides authentication services for private and government clients and handles <a href=\"https:\/\/www.okta.com\/resources\/whitepaper\/scaling-okta-to-billions-of-users\/#:~:text=Preparing%20for%2050%20Billion%20Users,of%20users%20on%20the%20platform.\" target=\"_blank\" rel=\"noopener\"><span>how hundreds of millions of users<\/span><\/a> are able to securely log into their employer\u2019s networks, itself was targeted by an extortion-focused hacking group.<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30\"><\/p>\n<p>In a statement, Okta said the breach was brief and took place in January. But the method the hackers used to gain access still highlights a weakness in giant companies: the hackers targeted a third-party customer support worker.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>\u201cIn late January 2022, Okta detected an attempt to compromise the account of a third party customer support engineer working for one of our subprocessors,\u201d Okta told Motherboard in a statement. \u201cThe matter was investigated and contained by the subprocessor.\u201d<\/p>\n<p><\/span><\/p>\n<blockquote data-component=\"QuoteBlock\" class=\"abc__quote abc__quote--blockquote\" readability=\"9.2460317460317\">\n<p><em><strong>Do you work at Okta? Do you know anything about this breach or others? We&#8217;d love to hear from you. Using a non-work phone or computer, you can contact Joseph Cox securely on Signal on +44 20 8133 5190, Wickr on josephcox, or email<\/strong><\/em>&nbsp;<a href=\"mailto:joseph.cox@vice.com\">joseph.cox@vice.com<\/a><em><strong>.<\/strong><\/em><\/p>\n<\/blockquote>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33\"><\/p>\n<p>The statement pointed to screenshots of apparent internal Okta systems posted in the Telegram channel of the hacking group that calls itself LAPSUS$ on Monday. The screenshots showed someone logged into Okta systems with the list of various apps they could then access from that position, and a Slack that appears to belong to Okta. Some of the screenshots also showed someone in the process of resetting a password belonging to a specific employee at cybersecurity firm Cloudflare, and another appeared to show access to a panel associated with the firm too. Those images suggest that the hackers were potential trying to leverage their access to Okta to gain access to Cloudflare assets, which provides infrastructure and security services to millions of websites.<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"35\"><\/p>\n<p>Theoretically, if a hacker gained access to internal Okta systems, they might be able to leverage that access in some way to then target Okta customers. Okta, though, said in its statement that \u201cBased on our investigation to date, there is no evidence of ongoing malicious activity beyond the activity detected in January.\u201d<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>\u201cFor a service that powers authentication systems to many of the largest corporations (and FEDRAMP approved) I think these security measures are pretty poor,\u201d LAPSUS$ wrote in a Telegram post along with the screenshots, referring to Okta.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28\"><\/p>\n<p>Okta added in its statement that \u201cWe believe the screenshots shared online are connected to this January event.\u201d<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>Cloudflare has responded to the potential targeting of its organization via the access to Okta. Matthew Prince, CEO of Cloudflare, tweeted that his company was resetting the Okta credentials of any employees who had changed their passwords in the past four months out of an abundance of caution.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28.664383561644\"><\/p>\n<p>\u201cWe\u2019ve confirmed no compromise. Okta is one layer of security,\u201d <a href=\"https:\/\/twitter.com\/eastdakota\/status\/1506158901078618118\" target=\"_blank\" rel=\"noopener\"><span>Prince\u2019s tweet added<\/span><\/a>. He even suggested that Cloudflare may hire a different authentication provider because of the compromise. \u201cGiven they may have an issue we\u2019re evaluating alternatives for that layer,\u201d he wrote.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"37\"><\/p>\n<p>Companies use Okta as a \u201csingle sign on\u201d (SSO) solution. Meaning that instead of workers having to remember and manage passwords for a spread of services their employer\u2019s use, such as cloud storage, email, note taking, expense filing, all logins are handled by Okta and one password. The idea is to make authentication that whoever is using a particular online account is the correct person much easier and more streamlined. Without, workers may recycle passwords potentially exposing different services to hackers, and if a company uses Okta they can gain more helpful insights when or if an account is compromised too.<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30.837060702875\"><\/p>\n<p>Notably, Okta\u2019s description of the hack is somewhat similar to another breach that LAPSUS$ appears connected to: <a href=\"https:\/\/www.vice.com\/en\/article\/wx5xpx\/hackers-steal-data-electronic-arts-ea-fifa-source-code\"><span>the June compromise of gaming giant Electronic Arts<\/span><\/a>. As Motherboard revealed, hackers in that case bought a login token for EA\u2019s Slack instance from an underground marketplace, and then once inside, <a href=\"https:\/\/www.vice.com\/en\/article\/7kvkqb\/how-ea-games-was-hacked-slack\"><span>tricked an EA IT support account<\/span><\/a> to provide them with the necessary two-factor authentication token to gain access to other parts of EA\u2019s corporate environment. (The marketplace was Genesis Marketplace, which, as an aside, <a href=\"https:\/\/www.vice.com\/en\/article\/n7b3jm\/genesis-market-buy-cookies-slack\"><span>also sells stolen Okta login tokens<\/span><\/a>, one of the hackers previously told Motherboard).<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"24.125\"><\/p>\n<p>Customer support workers specifically are sometimes a target for hackers. As Motherboard previously reported, a <a href=\"https:\/\/www.vice.com\/en\/article\/qj4ddw\/hacker-bribed-roblox-insider-accessed-user-data-reset-passwords\"><span>hacker bribed a customer support representative<\/span><\/a> at gaming platform Roblox to then gain access to individual players\u2019 accounts.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33\"><\/p>\n<p>LAPSUS$ is an increasingly audacious hacking group that has targeted a wealth of companies over the past few months, including Nvidia and Samsung. LAPSUS$ typically breaks into a target\u2019s network, steals sensitive data, and then tries to extort the victim company. The group has also repeatedly dumped data that it says came from the victims\u2019 networks.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"25.784126984127\"><\/p>\n<p>On Monday, <a href=\"https:\/\/www.vice.com\/en\/article\/y3vk9x\/microsoft-hacked-lapsus-extortion-investigating\"><span>Motherboard reported that Microsoft was investigating<\/span><\/a> a claim from LAPSUS$ that it had breached the company. LAPSUS$ has since posted data in its Telegram channel that it says came from the company. Microsoft did not immediately respond to a request for an updated statement in relation to the data dump.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"19.105882352941\"><\/p>\n<p><em><strong>Subscribe to our cybersecurity podcast,&nbsp;<a href=\"https:\/\/itunes.apple.com\/gb\/podcast\/cyber\/id1441708044?mt=2\" target=\"_blank\" rel=\"noopener\">CYBER<\/a>. Subscribe to&nbsp;<a href=\"https:\/\/www.twitch.tv\/motherboardtv\" target=\"_blank\" rel=\"noopener\">our new Twitch channel<\/a>.<\/strong><\/em><\/p>\n<p><\/span><\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33241\/Okta-Breached-Through-Customer-Support.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":45827,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[6679],"class_list":["post-45826","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerpassword"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Okta Breached Through Customer Support 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/okta-breached-through-customer-support\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Okta Breached Through Customer Support 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/okta-breached-through-customer-support\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-22T15:03:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-breached-through-customer-support\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-breached-through-customer-support\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Okta Breached Through Customer Support\",\"datePublished\":\"2022-03-22T15:03:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-breached-through-customer-support\\\/\"},\"wordCount\":873,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-breached-through-customer-support\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/okta-breached-through-customer-support.jpg\",\"keywords\":[\"headline,hacker,password\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-breached-through-customer-support\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-breached-through-customer-support\\\/\",\"name\":\"Okta Breached Through Customer Support 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-breached-through-customer-support\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-breached-through-customer-support\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/okta-breached-through-customer-support.jpg\",\"datePublished\":\"2022-03-22T15:03:16+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-breached-through-customer-support\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-breached-through-customer-support\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-breached-through-customer-support\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/okta-breached-through-customer-support.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/okta-breached-through-customer-support.jpg\",\"width\":240,\"height\":238},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-breached-through-customer-support\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,password\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerpassword\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Okta Breached Through Customer Support\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Okta Breached Through Customer Support 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/okta-breached-through-customer-support\/","og_locale":"en_US","og_type":"article","og_title":"Okta Breached Through Customer Support 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/okta-breached-through-customer-support\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-03-22T15:03:16+00:00","og_image":[{"url":"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/okta-breached-through-customer-support\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/okta-breached-through-customer-support\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Okta Breached Through Customer Support","datePublished":"2022-03-22T15:03:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/okta-breached-through-customer-support\/"},"wordCount":873,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/okta-breached-through-customer-support\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/okta-breached-through-customer-support.jpg","keywords":["headline,hacker,password"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/okta-breached-through-customer-support\/","url":"https:\/\/www.threatshub.org\/blog\/okta-breached-through-customer-support\/","name":"Okta Breached Through Customer Support 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/okta-breached-through-customer-support\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/okta-breached-through-customer-support\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/okta-breached-through-customer-support.jpg","datePublished":"2022-03-22T15:03:16+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/okta-breached-through-customer-support\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/okta-breached-through-customer-support\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/okta-breached-through-customer-support\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/okta-breached-through-customer-support.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/okta-breached-through-customer-support.jpg","width":240,"height":238},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/okta-breached-through-customer-support\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,password","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerpassword\/"},{"@type":"ListItem","position":3,"name":"Okta Breached Through Customer Support"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45826"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45826\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/45827"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}