Okta Session Hijacking via Multiple Device Token Hashes
Detection of multiple device token hashes and source IPs for a single Okta session, indicating potential session hijacking and unauthorized access to Okta resources.
This threat brief addresses the risk of Okta session hijacking, where adversaries may steal session cookies or tokens to gain unauthorized access to Okta resources. The alert focuses on detecting anomalous Okta sessions characterized by multiple device token hashes and source IP addresses associated with a single authenticated user. This activity may indicate that an authenticated session has been compromised and is being replayed from different devices or networks. Defenders should be aware of the potential for attackers to leverage stolen sessions to access the Okta admin console, applications, tenants, and other sensitive resources. Elastic has published a rule to detect this behavior, last updated on April 13, 2026, which can be used to proactively identify potentially compromised Okta sessions within the environment.
Attack Chain
- Initial Access: An attacker gains access to a valid Okta session token or cookie through methods such as phishing or malware.
- Session Token Theft: The attacker steals a valid Okta session token/cookie from a compromised endpoint.
- Session Replay: The attacker replays the stolen session token/cookie from a different device and network location than the original user.
- Okta Authentication: The replayed session token authenticates to Okta, creating a new session instance.
- Multiple Device Hashes: Because the session is accessed from a different device, a new device token hash is generated. The attacker may also use proxy services from different locations.
- Unauthorized Access: The attacker uses the hijacked session to access Okta resources, such as the admin console or applications.
- Privilege Escalation (Optional): If the hijacked session belongs to a privileged user, the attacker may escalate privileges within the Okta environment.
- Data Exfiltration/Manipulation: The attacker exfiltrates sensitive data or modifies Okta configurations to establish persistence or further compromise the environment.
Impact
A successful Okta session hijacking attack can lead to unauthorized access to sensitive applications and data, privilege escalation, and disruption of business operations. The impact can range from data breaches and financial loss to reputational damage and regulatory fines. Attackers can potentially access and modify user accounts, security policies, and application integrations. The number of potential victims depends on the scope of the attacker’s access and the sensitivity of the data they can access.
Recommendation
- Deploy the provided Sigma rule to your SIEM to detect multiple device token hashes and source IPs for single Okta sessions and tune for your environment.
- Investigate alerts generated by the Sigma rule by pivoting into Okta system logs using the
okta.actor.alternate_idandokta.authentication_context.external_session_idfields. - Monitor Okta system logs for suspicious post-authentication activity, such as admin console access, policy changes, or application assignment modifications as described in the rule’s triage steps.
- Enforce MFA enrollment for all Okta users to mitigate the risk of session hijacking and credential theft, as recommended in the investigation guide.
- Revoke active sessions and reset passwords for affected users exhibiting suspicious activity as mentioned in the false positive analysis.
Detection coverage 2
Okta - Multiple Device Token Hashes for Single Session
mediumDetects multiple device token hashes for a single Okta session, indicating potential session hijacking.
Okta - Multiple Client IPs for Single Session
mediumDetects multiple client IPs for a single Okta session, which might indicate session hijacking.
Detection queries are kept inside the platform. Get full rules →