<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Okta Identity Cloud — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/okta-identity-cloud/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/okta-identity-cloud/feed.xml" rel="self" type="application/rss+xml"/><item><title>Okta Policy Modification or Deletion Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-policy-change/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-policy-change/</guid><description>An Okta policy was modified or deleted, potentially indicating unauthorized changes to security configurations within the Okta identity management platform by a malicious actor or insider.</description><content:encoded><![CDATA[<p>This alert identifies modifications or deletions of Okta policies, which govern authentication, authorization, and access control within the Okta Identity Cloud platform. While legitimate administrators routinely update policies, unauthorized changes can weaken security postures and grant malicious actors elevated privileges or bypass security controls. The source event indicates a potential compromise or insider threat activity within the Okta environment. Because Okta serves as a critical identity provider for many organizations, any unauthorized change to its policies can have far-reaching consequences. Detecting policy changes is crucial for maintaining the integrity and security of the Okta environment and preventing potential breaches. The targeted scope includes all Okta-managed applications and resources protected by the modified or deleted policy.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains access to an Okta administrator account, either through compromised credentials (e.g., phishing, credential stuffing) or insider access.</li>
<li><strong>Authentication:</strong> The attacker authenticates to the Okta admin console using the compromised or legitimate administrator account.</li>
<li><strong>Policy Enumeration:</strong> The attacker identifies target Okta policies to modify or delete using the Okta admin console or API.</li>
<li><strong>Policy Modification/Deletion:</strong> The attacker modifies or deletes the targeted Okta policy through the Okta admin console or API. This generates an <code>policy.lifecycle.update</code> or <code>policy.lifecycle.delete</code> event.</li>
<li><strong>Privilege Escalation (Potential):</strong> By modifying policies, the attacker may escalate privileges, granting themselves or other unauthorized users access to sensitive applications and resources.</li>
<li><strong>Lateral Movement (Potential):</strong> With escalated privileges, the attacker moves laterally within the Okta environment, accessing other applications and resources.</li>
<li><strong>Data Exfiltration/Damage (Potential):</strong> The attacker leverages the compromised Okta environment to exfiltrate sensitive data or cause damage to connected systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Okta policy modification or deletion can have significant consequences. Unauthorized policy changes can weaken security controls, allowing attackers to bypass authentication mechanisms, escalate privileges, and gain unauthorized access to sensitive applications and data. This could lead to data breaches, financial loss, and reputational damage. The impact depends on the scope of the affected policy and the applications it protects. The number of victims could range from a few individuals to the entire organization, depending on the scope of the compromised policy.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect Okta policy modifications or deletions (<code>policy.lifecycle.update</code>, <code>policy.lifecycle.delete</code> event types).</li>
<li>Investigate any detected policy changes to verify their legitimacy and identify the user responsible.</li>
<li>Review Okta administrator account activity for any signs of compromise or unauthorized access.</li>
<li>Implement multi-factor authentication (MFA) for all Okta administrator accounts to prevent unauthorized access.</li>
<li>Regularly review and audit Okta policies to ensure they are configured securely and in accordance with security best practices.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>identity</category><category>okta</category><category>policy</category><category>attack.impact</category></item><item><title>Okta MFA Reset or Deactivation Attempt</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-mfa-reset/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-mfa-reset/</guid><description>An attacker attempts to disable or reset multi-factor authentication (MFA) for a user account in Okta, potentially leading to unauthorized access and account compromise.</description><content:encoded><![CDATA[<p>Attackers may attempt to disable or reset MFA to bypass security controls and gain unauthorized access to user accounts. This activity is often part of a broader attack campaign, such as credential stuffing or account takeover. The Okta platform provides detailed logs of user authentication events, including MFA resets and deactivations. Monitoring these events is crucial for detecting and responding to potential account compromise attempts. These attempts can originate from various sources, including compromised administrator accounts or direct attacks on user accounts. The impact of successful MFA bypass can be significant, potentially leading to data breaches, financial loss, and reputational damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a user&rsquo;s Okta account, possibly through phishing or credential compromise.</li>
<li>The attacker authenticates to the Okta tenant using the compromised credentials.</li>
<li>The attacker initiates a request to reset or deactivate one or more of the user&rsquo;s MFA factors through the Okta API or web interface.</li>
<li>Okta generates a system log event of type <code>user.mfa.factor.deactivate</code> or <code>user.mfa.factor.reset_all</code>.</li>
<li>If successful, the attacker can then authenticate without providing the MFA factor, bypassing a critical security control.</li>
<li>The attacker leverages the compromised account to access sensitive applications and data within the Okta environment.</li>
<li>The attacker may perform lateral movement to access other user accounts or systems.</li>
<li>The final objective may include data exfiltration, financial fraud, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful MFA deactivation or reset can lead to complete account takeover. Depending on the compromised user&rsquo;s role and access permissions, this could result in significant data breaches, unauthorized access to sensitive systems, and financial losses. The impact scales with the number of compromised accounts and the sensitivity of the data they can access. This activity targets all sectors relying on Okta for identity and access management.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to your SIEM to detect suspicious MFA reset or deactivation attempts in Okta logs.</li>
<li>Investigate any triggered alerts for <code>user.mfa.factor.deactivate</code> or <code>user.mfa.factor.reset_all</code> events, as described in the Sigma rule.</li>
<li>Review Okta system logs for unusual authentication patterns, focusing on users with recently deactivated MFA factors, as detailed in the Okta API documentation.</li>
<li>Implement strict access controls and monitoring for Okta administrator accounts to prevent unauthorized MFA modifications.</li>
<li>Educate users about phishing and credential security to reduce the risk of initial access compromise.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>okta</category><category>mfa</category><category>credential-access</category><category>persistence</category></item><item><title>Okta API Token Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-api-token-creation/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-api-token-creation/</guid><description>Detection of Okta API token creation events which can indicate malicious persistence activity.</description><content:encoded><![CDATA[<p>The creation of Okta API tokens is a legitimate administrative function, but can also be abused by malicious actors to establish persistence within an Okta environment. Monitoring for the creation of these tokens, especially when performed by unexpected users or under unusual circumstances, is crucial for identifying potential security breaches. Okta API tokens allow for programmatic access to Okta resources, making them a valuable asset for attackers seeking to maintain access or perform unauthorized actions. Defenders should prioritize monitoring for these events to quickly identify and respond to potentially malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to an Okta account with sufficient privileges (e.g., Super Administrator).</li>
<li>The attacker authenticates to the Okta Admin Console.</li>
<li>The attacker navigates to the Security &gt; API &gt; Tokens section of the Okta Admin Console.</li>
<li>The attacker creates a new API token with broad or specific permissions.</li>
<li>Okta logs the <code>system.api_token.create</code> event.</li>
<li>The attacker uses the newly created API token to programmatically access Okta resources.</li>
<li>The attacker may leverage the API token for various malicious activities, such as user enumeration, group manipulation, or application access.</li>
<li>The attacker maintains persistent access to the Okta environment even if their initial access is revoked.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, modification of user accounts and permissions, and potentially complete control over the Okta environment. The impact can range from data breaches and service disruptions to complete compromise of identity management. The number of victims and sectors targeted depends on the scope of the compromised Okta environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Okta API Token Created&rdquo; to your SIEM to detect API token creation events (logsource: okta, service: okta).</li>
<li>Investigate any detected <code>system.api_token.create</code> events to verify the legitimacy of the token creation.</li>
<li>Review Okta system logs for unusual administrative activity preceding the API token creation event (logsource: okta, service: okta).</li>
<li>Implement multi-factor authentication (MFA) for all Okta administrator accounts to reduce the risk of unauthorized access.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>okta</category></item></channel></rss>