<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Okta — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/okta/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 25 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/okta/feed.xml" rel="self" type="application/rss+xml"/><item><title>Okta Identity Provider Creation Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-idp-created/</link><pubDate>Thu, 25 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-idp-created/</guid><description>An adversary may create a rogue identity provider within Okta to establish persistence and potentially escalate privileges by impersonating legitimate users or bypassing multi-factor authentication.</description><content:encoded><![CDATA[<p>The creation of a new identity provider (IdP) in Okta is a sensitive action that should be closely monitored. While legitimate administrators may create IdPs for federation purposes, adversaries can abuse this functionality to establish persistence or escalate privileges within an Okta environment. This involves creating a malicious IdP that they control and configuring it to authenticate users, potentially bypassing existing security controls such as multi-factor authentication (MFA) or implementing cross-tenant impersonation. The creation of a rogue IdP within Okta can be an indicator of compromise, potentially leading to unauthorized access to applications and data protected by Okta. Defenders should monitor Okta system logs for the creation of new identity providers and validate their legitimacy.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Okta tenant with sufficient administrative privileges, either through compromised credentials or by exploiting a vulnerability.</li>
<li>The attacker navigates to the Okta admin console.</li>
<li>The attacker creates a new identity provider (IdP) within the Okta tenant (system.idp.lifecycle.create).</li>
<li>The attacker configures the rogue IdP with attacker-controlled settings, such as SAML endpoints or OIDC configurations, potentially pointing to an attacker-controlled server.</li>
<li>The attacker configures routing rules within Okta to direct specific users or groups to authenticate through the newly created, malicious IdP.</li>
<li>Users attempting to access Okta-protected applications are redirected to the attacker-controlled IdP for authentication.</li>
<li>The attacker&rsquo;s IdP captures user credentials or issues fraudulent authentication tokens, allowing the attacker to impersonate legitimate users.</li>
<li>The attacker leverages the stolen credentials or fraudulent tokens to access sensitive applications and data protected by Okta, achieving their objective of data theft or service disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack involving the creation of a rogue Okta identity provider can lead to significant consequences. Attackers can gain persistent access to the Okta environment, bypass multi-factor authentication, and impersonate legitimate users. This can result in unauthorized access to sensitive applications and data, data breaches, financial loss, and reputational damage. The scope of the impact depends on the privileges of the compromised accounts and the sensitivity of the data accessed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Okta Identity Provider Created&rdquo; to your SIEM to detect the creation of new identity providers and tune it for your environment.</li>
<li>Regularly review and validate all configured identity providers within your Okta tenant to ensure their legitimacy.</li>
<li>Implement strong access controls and multi-factor authentication for all Okta administrative accounts to prevent unauthorized creation of identity providers.</li>
<li>Monitor Okta system logs for suspicious activity related to identity provider configuration and authentication.</li>
<li>Investigate any alerts triggered by the &ldquo;Okta Identity Provider Created&rdquo; Sigma rule to determine the legitimacy of the IdP creation event.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>identityprovider</category><category>okta</category><category>persistence</category></item><item><title>Okta User Account Created</title><link>https://feed.craftedsignal.io/briefs/2024-01-23-okta-user-created/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-23-okta-user-created/</guid><description>Detection of new user account creation in Okta, which could indicate malicious activity related to credential access.</description><content:encoded><![CDATA[<p>This alert detects the creation of new user accounts within an Okta environment. While legitimate user creation is common, malicious actors may create accounts to gain unauthorized access to resources, escalate privileges, or establish persistence within the network. Monitoring for anomalous user creation activity, such as accounts created outside of normal business hours or with suspicious naming conventions, is crucial for identifying potential security breaches. Reviewing the source IP and administrator account used for the user creation can also provide valuable context.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Okta administrator account, potentially through phishing, credential stuffing, or exploiting a vulnerability.</li>
<li>The attacker authenticates to the Okta admin portal.</li>
<li>The attacker navigates to the user management section within the Okta admin console.</li>
<li>The attacker creates a new user account, potentially mimicking an existing user or using a generic naming convention.</li>
<li>The attacker assigns the new user account specific roles and permissions, potentially granting elevated privileges.</li>
<li>The attacker may use the newly created account to access sensitive applications and data within the Okta-protected environment.</li>
<li>The attacker uses the compromised or newly created account to maintain persistence within the Okta environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leading to unauthorized user creation can result in significant data breaches, privilege escalation, and unauthorized access to sensitive applications and resources. This could lead to financial loss, reputational damage, and compliance violations. The impact depends on the permissions granted to the created user and the applications they can access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;New Okta User Created&rdquo; to your SIEM to detect user creation events and tune for your environment.</li>
<li>Investigate any detected user creation events for legitimacy, focusing on the source IP address and the administrator account used.</li>
<li>Implement multi-factor authentication (MFA) for all Okta administrator accounts to mitigate the risk of credential compromise.</li>
<li>Review Okta event logs regularly for suspicious activity, including user creation, permission changes, and application access.</li>
<li>Establish baseline user creation patterns to identify anomalous behavior, such as accounts created outside of normal business hours.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>okta</category><category>identity</category><category>user-creation</category><category>credential-access</category></item><item><title>Okta Security Threat Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-security-threat/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-security-threat/</guid><description>This alert detects when Okta's ThreatInsight identifies a security threat within an Okta environment, potentially indicating command and control activity.</description><content:encoded><![CDATA[<p>This alert focuses on identifying security threats detected by Okta&rsquo;s ThreatInsight. Okta ThreatInsight analyzes traffic patterns and user behavior to identify and block malicious login attempts, brute-force attacks, and other suspicious activities. When ThreatInsight identifies a security threat, it generates a system log event with the eventType <code>security.threat.detected</code>. This event serves as a high-level indicator of potential command and control activity within the Okta environment. Defenders should investigate these alerts promptly to determine the nature and scope of the threat and take appropriate remediation steps. This detection leverages Okta system logs and is relevant for organizations using Okta as their identity provider.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker attempts to gain unauthorized access to an Okta account, possibly through credential stuffing or brute-force attacks.</li>
<li>Okta&rsquo;s ThreatInsight analyzes the login attempt, evaluating factors such as IP address reputation, geographical location, and login frequency.</li>
<li>ThreatInsight identifies the login attempt as a security threat based on predefined risk factors.</li>
<li>Okta generates a system log event with eventType <code>security.threat.detected</code>, recording details of the suspicious activity.</li>
<li>The security team receives an alert based on the Sigma rule detecting the <code>security.threat.detected</code> event.</li>
<li>The security team investigates the alert, examining the associated IP address, user account, and other relevant log data.</li>
<li>Based on the investigation, the security team takes appropriate remediation steps, such as blocking the IP address, resetting the user&rsquo;s password, or enabling multi-factor authentication.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack targeting Okta could lead to unauthorized access to sensitive data, account takeover, and disruption of services. The impact of such an attack depends on the level of access granted to the compromised account and the sensitivity of the data accessible through Okta. Successful exploitation can lead to lateral movement within an organization&rsquo;s cloud infrastructure and potentially compromise other critical systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect <code>security.threat.detected</code> events in Okta system logs.</li>
<li>Investigate all triggered alerts to determine the nature and scope of the threat.</li>
<li>Review Okta&rsquo;s ThreatInsight configuration to ensure it is properly configured and tuned for your environment (references: Okta ThreatInsight documentation).</li>
<li>Monitor Okta system logs for suspicious activity, such as unusual login patterns, account lockouts, and password resets (references: Okta system log documentation).</li>
<li>Enforce strong password policies and multi-factor authentication to reduce the risk of unauthorized access.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>identity</category><category>okta</category><category>threat-detection</category><category>attack.command-and-control</category></item><item><title>Okta Admin Role Assignment Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-admin-role/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-admin-role/</guid><description>Detection of new admin role assignments in Okta, potentially indicating privilege escalation or persistence attempts by malicious actors.</description><content:encoded><![CDATA[<p>Okta is a widely used identity and access management (IAM) platform, making it a prime target for malicious actors seeking to gain unauthorized access to sensitive resources. This threat focuses on the creation of new admin role assignments within Okta. An attacker who successfully compromises an Okta account with sufficient privileges, or bypasses security controls, may attempt to escalate their privileges or establish persistence by creating new admin role assignments for themselves or other accounts they control. This activity can go unnoticed if not actively monitored, granting the attacker extended access and control over the Okta environment and connected applications. Monitoring for anomalous admin role assignments is crucial for early detection and prevention of potential breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> Attacker gains unauthorized access to an Okta account, possibly through credential phishing, brute-force attacks, or exploitation of vulnerabilities.</li>
<li><strong>Privilege Check:</strong> The attacker verifies the privileges of the compromised account to determine if it has sufficient permissions to create new admin role assignments.</li>
<li><strong>Account Impersonation:</strong> The attacker uses the compromised account to access the Okta admin dashboard.</li>
<li><strong>Role Assignment Creation:</strong> The attacker navigates to the role assignment section and initiates the creation of a new admin role assignment.</li>
<li><strong>Configuration:</strong> The attacker specifies the target user or group for the new admin role assignment.</li>
<li><strong>Audit Logging:</strong> Okta logs the event &lsquo;iam.resourceset.bindings.add&rsquo; indicating the creation of a new admin role assignment.</li>
<li><strong>Persistence:</strong> The attacker uses the newly created admin role assignment to maintain persistent access to the Okta environment even if the initial compromised account is detected and remediated.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could lead to complete control over the Okta environment, affecting all connected applications and services. An attacker with admin privileges can modify user accounts, reset passwords, access sensitive data, and potentially compromise the entire organization. The number of affected users and systems depends on the scope of the Okta deployment, but the impact can be significant, potentially affecting thousands of users and critical business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Okta Admin Role Assignment Created</code> to your SIEM and tune it for your environment to detect suspicious admin role creation activity in Okta logs.</li>
<li>Investigate any alerts generated by the <code>Okta Admin Role Assignment Created</code> rule to determine if the role assignment was legitimate and authorized.</li>
<li>Implement multi-factor authentication (MFA) for all Okta accounts, especially those with administrative privileges, to mitigate the risk of credential compromise.</li>
<li>Regularly review and audit Okta admin role assignments to identify and remove any unnecessary or unauthorized privileges.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>identity</category><category>okta</category><category>privilege-escalation</category><category>persistence</category></item><item><title>Okta End-User Reports Suspicious Account Activity</title><link>https://feed.craftedsignal.io/briefs/2024-01-17-okta-suspicious-activity/</link><pubDate>Wed, 17 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-17-okta-suspicious-activity/</guid><description>An Okta end-user reports potentially suspicious activity on their account, indicating possible compromise or unauthorized access.</description><content:encoded><![CDATA[<p>This alert focuses on detecting when an end-user within an Okta environment reports suspicious activity related to their account. This is a critical indicator that the account may be compromised, or that unauthorized access has occurred. The activity is reported directly by the end-user. While this alert does not directly reveal the method of compromise, it serves as an important signal for security teams to investigate potentially malicious activity. This event triggers from an Okta system log event generated when an end-user utilizes the &ldquo;report suspicious activity&rdquo; feature, available in many Okta deployments. Early detection allows security teams to rapidly respond, contain potential damage, and investigate the source of the suspicious activity. This type of self-reporting by end-users can be an invaluable source of threat intelligence within an organization.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to an end-user&rsquo;s Okta account, possibly via credential phishing or password reuse.</li>
<li>The attacker attempts to perform actions such as accessing applications, changing profile details, or initiating password resets.</li>
<li>The legitimate end-user observes suspicious activity in their Okta account, such as unfamiliar login locations, unauthorized application access, or unexpected password reset requests.</li>
<li>The end-user utilizes the &ldquo;report suspicious activity&rdquo; feature within their Okta account portal.</li>
<li>This action generates an Okta system log event with the eventType <code>user.account.report_suspicious_activity_by_enduser</code>.</li>
<li>The detection rule triggers based on this specific Okta log event.</li>
<li>Security analysts investigate the reported activity, examining Okta logs and other relevant data sources.</li>
<li>Based on the investigation, appropriate remediation steps are taken, such as resetting the user&rsquo;s password, revoking active sessions, and blocking any identified malicious IP addresses.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful account compromise can lead to unauthorized access to sensitive applications and data within the organization. The number of affected users and the impact will depend on the permissions and access granted to the compromised Okta account. This can result in data breaches, financial loss, and reputational damage. Prompt detection of end-user reported suspicious activity allows for rapid incident response, minimizing potential damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Okta Suspicious Activity Reported by End-user&rdquo; to your SIEM to detect when users report suspicious activity, using <code>eventType: 'user.account.report_suspicious_activity_by_enduser'</code>.</li>
<li>Review Okta system logs for further details surrounding the events that prompted the user report (see references for log details).</li>
<li>Implement end-user training programs to educate users on how to identify and report suspicious activity.</li>
<li>Investigate all triggered alerts to determine the root cause of the reported suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>identity</category><category>okta</category><category>suspicious-activity</category></item><item><title>Okta Alerts Following Unusual Proxy Authentication</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-proxy-auth-alerts/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-proxy-auth-alerts/</guid><description>Attackers use proxy infrastructure to mask their origin when using stolen Okta credentials, and this rule correlates the first occurrence of an Okta user session started via a proxy with subsequent Okta security alerts for the same user.</description><content:encoded><![CDATA[<p>Attackers frequently use proxy infrastructure (VPNs, Tor, residential proxies) to mask their origin when using stolen credentials. This behavior often triggers additional detection rules after the initial authentication. By correlating the first instance of Okta user authentication via a proxy with subsequent Okta security alerts for the same user, this rule aims to identify potentially compromised accounts. This correlation focuses on activity within a 30-minute window following the initial proxy authentication, helping to pinpoint users whose proxy-based authentication was followed by suspicious activity. The rule leverages Okta system logs and alerts to identify these patterns. This is important for defenders to quickly identify compromised accounts and prevent further damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker obtains valid Okta credentials through phishing, credential stuffing, or other means. (T1078)</li>
<li>The attacker initiates an Okta user session from behind a proxy (VPN, Tor, etc.) to mask their origin.</li>
<li>Okta classifies the connection as originating from a proxy.</li>
<li>The user successfully authenticates and starts a session.</li>
<li>Post-authentication, the attacker attempts to access sensitive applications or data. (T1078.004)</li>
<li>The attacker&rsquo;s activity triggers an Okta security alert, such as unusual access patterns or MFA bypass attempts.</li>
<li>The detection rule correlates the proxy authentication event with the subsequent security alert.</li>
<li>Security team investigates and responds to the potential account compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data, privilege escalation, and lateral movement within the organization&rsquo;s cloud environment. Multiple alerts, coupled with proxy authentication, indicate a higher likelihood of account compromise. If successful, attackers could exfiltrate sensitive data, modify configurations, or disrupt services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Okta Alerts Following Unusual Proxy Authentication&rdquo; to your SIEM and tune for your environment to detect suspicious activity after proxy authentication.</li>
<li>Investigate correlated security alerts triggered after proxy authentication events for affected users, as highlighted by the Sigma rule.</li>
<li>Monitor Okta system logs for authentication events originating from known malicious proxy IP addresses and block them at the network perimeter.</li>
<li>Review user&rsquo;s Okta activity for signs of account takeover (MFA changes, new devices, unusual app access) after proxy authentication.</li>
<li>Implement multi-factor authentication (MFA) to reduce the risk of account compromise via stolen credentials, as this attack relies on valid accounts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>identity</category><category>cloud</category><category>okta</category><category>initial-access</category></item><item><title>Okta Unauthorized Application Access Attempt</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-okta-unauthorized-app-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-okta-unauthorized-app-access/</guid><description>This brief describes a detection for unauthorized application access attempts within an Okta environment, indicating a potential security breach or misconfiguration.</description><content:encoded><![CDATA[<p>This detection identifies instances where a user attempts to access an application within an Okta environment without proper authorization. The activity is logged within the Okta system logs, providing a clear indication of the unauthorized access attempt. This type of event is crucial for defenders as it may signify several issues, including compromised user accounts, misconfigured application permissions, or internal users attempting to escalate their privileges. This detection focuses specifically on the &ldquo;User attempted unauthorized access to app&rdquo; message within Okta logs. Identifying and investigating these events promptly can prevent data breaches and maintain the integrity of the Okta environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user attempts to access a protected application integrated with Okta.</li>
<li>Okta evaluates the user&rsquo;s authentication status and group memberships against the application&rsquo;s access policies.</li>
<li>The user lacks the necessary permissions or roles assigned to access the requested application.</li>
<li>Okta denies access to the application for the user.</li>
<li>Okta generates a system log event with the &ldquo;User attempted unauthorized access to app&rdquo; message.</li>
<li>The security monitoring system ingests the Okta log event.</li>
<li>The detection rule triggers based on the specific log message.</li>
<li>An alert is generated, prompting security analysts to investigate the unauthorized access attempt and take appropriate remedial actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful unauthorized access to applications can lead to significant data breaches, compromise sensitive information, and disrupt business operations. While this detection identifies attempted unauthorized access, repeated attempts or eventual success due to misconfiguration can result in severe consequences. A single successful breach can lead to data exfiltration, financial loss, and reputational damage. Identifying and remediating these attempts is crucial to preventing these outcomes.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM or security monitoring platform to detect unauthorized application access attempts in Okta (Sigma rule: &ldquo;Okta Unauthorized Access to App&rdquo;).</li>
<li>Investigate all triggered alerts promptly to determine the root cause of the unauthorized access attempt (Okta logs).</li>
<li>Review and validate application access policies within Okta to ensure users have appropriate permissions and roles assigned.</li>
<li>Implement multi-factor authentication (MFA) for all users to reduce the risk of compromised accounts being used for unauthorized access (Okta configuration).</li>
<li>Monitor Okta system logs for related events, such as account lockouts or password reset attempts, which might indicate account compromise (Okta logs).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.impact</category><category>threat-type</category><category>platform</category></item><item><title>Okta FastPass Phishing Attempt Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-fastpass-phishing/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-fastpass-phishing/</guid><description>Okta FastPass detected and prevented a phishing attempt, indicating a user was likely targeted with a credential harvesting attack.</description><content:encoded><![CDATA[<p>This alert identifies instances where Okta FastPass successfully blocked a user authentication attempt due to a detected phishing attack. This is based on Okta system logs that record when FastPass declines an authentication because the user was attempting to log in to a known phishing site. The event indicates that a user was likely targeted via phishing, potentially through email or other means, and entered their Okta credentials into a fraudulent site. While the authentication was blocked, the event warrants investigation to determine the scope of the phishing campaign and whether the user may have entered credentials elsewhere.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a phishing email or message mimicking a legitimate Okta login page.</li>
<li>The user receives the phishing message and clicks the embedded link.</li>
<li>The user is directed to a fake Okta login page that is designed to steal credentials.</li>
<li>The user enters their Okta username and password on the phishing site.</li>
<li>The phishing site attempts to authenticate the user to Okta using the stolen credentials.</li>
<li>Okta FastPass detects that the authentication attempt is originating from a known phishing site.</li>
<li>Okta FastPass declines the authentication request, preventing access.</li>
<li>The Okta system logs record the event &ldquo;user.authentication.auth_via_mfa&rdquo; with outcome &ldquo;FAILURE&rdquo; and reason &ldquo;FastPass declined phishing attempt&rdquo;.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>While Okta FastPass successfully prevented the immediate breach, the incident confirms that a user was targeted by a phishing campaign. This could lead to the compromise of other accounts if the user reuses the same password. Furthermore, successful phishing attacks can lead to data breaches, financial loss, and reputational damage. The number of affected users depends on the scale of the phishing campaign.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect Okta FastPass phishing prevention events.</li>
<li>Investigate users who triggered the detection to identify the phishing campaign and assess potential credential compromise.</li>
<li>Review Okta system logs for other suspicious activity associated with the targeted user accounts.</li>
<li>Educate users about phishing tactics and how to identify malicious websites to reduce susceptibility to future attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>phishing</category><category>okta</category><category>fastpass</category></item><item><title>Okta Application Sign-On Policy Modified or Deleted</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-sign-on-policy-changes/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-sign-on-policy-changes/</guid><description>Attackers may modify or delete Okta application sign-on policies to weaken security controls, potentially leading to unauthorized access and data breaches.</description><content:encoded><![CDATA[<p>Okta application sign-on policies control how users authenticate to applications integrated with Okta. An attacker who gains administrative access to an Okta tenant can modify or delete these policies, effectively weakening or bypassing multi-factor authentication (MFA) requirements and other security controls. This allows unauthorized access to sensitive applications and data. While this activity itself is not initial access, it represents a significant escalation of privileges and a deliberate attempt to subvert existing security measures within the Okta environment. Detection of these changes is critical to identify potential breaches early and prevent further damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to an Okta administrator account through compromised credentials or other means.</li>
<li>The attacker authenticates to the Okta admin dashboard.</li>
<li>The attacker navigates to the &ldquo;Security&rdquo; section and then to &ldquo;Authentication Policies&rdquo;.</li>
<li>The attacker identifies the target application sign-on policy to modify or delete.</li>
<li>To modify, the attacker changes the policy rules, such as disabling MFA requirements or allowing access from untrusted locations.</li>
<li>Alternatively, to delete, the attacker selects the policy and confirms its removal.</li>
<li>The attacker&rsquo;s actions are logged as &ldquo;application.policy.sign_on.update&rdquo; or &ldquo;application.policy.sign_on.rule.delete&rdquo; events in the Okta system log.</li>
<li>Unauthorized users can now access applications protected by the modified or deleted policy, potentially leading to data exfiltration or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification or deletion of Okta application sign-on policies can severely compromise an organization&rsquo;s security posture. This can lead to unauthorized access to sensitive applications and data, resulting in data breaches, financial losses, and reputational damage. The number of affected users and applications depends on the scope of the compromised policies.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Okta Application Sign-On Policy Modified or Deleted&rdquo; to your SIEM and tune for your environment to detect changes to sign-on policies (rule reference).</li>
<li>Monitor the Okta system log for &ldquo;application.policy.sign_on.update&rdquo; and &ldquo;application.policy.sign_on.rule.delete&rdquo; events to identify suspicious activity (log source reference).</li>
<li>Implement strong access controls and MFA for Okta administrator accounts to prevent unauthorized policy modifications (best practice).</li>
<li>Regularly review Okta application sign-on policies to ensure they are properly configured and meet security requirements (best practice).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>identity</category><category>okta</category><category>policy-tampering</category></item><item><title>Okta Application Modified or Deleted</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-okta-app-modified-deleted/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-okta-app-modified-deleted/</guid><description>Detects when an Okta application is modified or deleted, potentially indicating unauthorized changes or removal of critical applications.</description><content:encoded><![CDATA[<p>This alert detects modifications or deletions of applications within the Okta identity and access management platform. While the specific actor is unknown, the modification or deletion of an application can lead to significant disruptions and potential security breaches. The activity is detected through Okta system logs that record application lifecycle events. This is crucial for defenders because unauthorized changes to applications can lead to privilege escalation, data breaches, or denial of service. Monitoring these events allows for prompt investigation and mitigation of potentially malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains unauthorized access to an Okta administrator account.</li>
<li>The attacker authenticates to the Okta admin console.</li>
<li>Attacker navigates to the Applications section in the Okta admin console.</li>
<li>The attacker identifies a target application for modification or deletion.</li>
<li>If modifying, the attacker alters application settings such as permissions, user assignments, or SSO configurations.</li>
<li>If deleting, the attacker initiates the application deletion process.</li>
<li>Okta logs the &ldquo;application.lifecycle.update&rdquo; or &ldquo;application.lifecycle.delete&rdquo; event.</li>
<li>The change impacts end-users and their ability to access resources through the modified or deleted application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of unauthorized application modification or deletion can be significant. Modified applications can grant unintended access to sensitive resources, leading to data breaches or privilege escalation. Deleted applications disrupt user access and business operations, potentially causing significant downtime and financial losses. The scope of the impact depends on the criticality of the affected application and the extent of the unauthorized changes.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect <code>application.lifecycle.update</code> or <code>application.lifecycle.delete</code> events in Okta logs.</li>
<li>Investigate any triggered alerts for unexpected application modifications or deletions, focusing on the user account that initiated the change (source: Okta logs).</li>
<li>Review Okta administrator account access and enforce multi-factor authentication to prevent unauthorized access (reference: Okta documentation on security best practices).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>okta</category><category>application-security</category><category>identity-management</category></item><item><title>Okta API Token Revoked</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-api-token-revoked/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-api-token-revoked/</guid><description>Detection of Okta API token revocation events, indicating potential unauthorized access or compromise.</description><content:encoded><![CDATA[<p>This alert focuses on detecting the revocation of Okta API tokens. Okta API tokens are used to authenticate and authorize applications to access Okta&rsquo;s APIs. When a token is revoked, it means that the token is no longer valid and can no longer be used to access Okta&rsquo;s APIs. This can happen for a number of reasons, including: a user manually revoking the token, an administrator revoking the token, or Okta automatically revoking the token due to inactivity or security concerns. Detecting API token revocations is crucial because it can indicate that a token has been compromised and is being used by an attacker. A revoked token could be a sign of successful lateral movement or data exfiltration attempts within the Okta environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains unauthorized access to an Okta API token through methods like phishing, credential stuffing, or malware.</li>
<li>API Usage: The attacker uses the stolen API token to access Okta&rsquo;s APIs, potentially gathering sensitive information or modifying user accounts.</li>
<li>Anomaly Detection: Okta&rsquo;s security mechanisms or custom alerts identify unusual activity associated with the API token, such as access from unfamiliar locations or excessive API calls.</li>
<li>Investigation Triggered: Security personnel initiate an investigation based on the flagged anomalous activity.</li>
<li>Token Revocation: As part of the incident response process, the compromised API token is manually or automatically revoked to prevent further unauthorized access. This action generates a &ldquo;system.api_token.revoke&rdquo; event in the Okta system log.</li>
<li>Post-Revocation Analysis: Security teams analyze the events leading up to the token revocation to identify the root cause of the compromise and assess the scope of the attacker&rsquo;s activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful compromise of an Okta API token can lead to significant damage, including unauthorized access to sensitive user data, modification of user accounts and permissions, and disruption of critical business operations. If not detected promptly, attackers can leverage compromised tokens to escalate privileges, move laterally within the Okta environment, and potentially gain access to other connected systems. A single compromised API token could affect hundreds or thousands of users, depending on the scope of access granted to the token.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect <code>system.api_token.revoke</code> events in Okta logs.</li>
<li>Investigate any detected <code>system.api_token.revoke</code> events to determine the cause of the revocation and assess the potential impact.</li>
<li>Review Okta system logs for anomalous activity prior to the token revocation to identify the source of the compromise.</li>
<li>Implement multi-factor authentication (MFA) for all Okta users to reduce the risk of credential compromise.</li>
<li>Regularly audit and review Okta API tokens to identify and revoke unused or overly permissive tokens.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>okta</category><category>api</category><category>token</category><category>revocation</category><category>identity</category></item><item><title>Detection of Okta Administrator Role Assignment to User or Group</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-okta-admin-role-assignment/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-okta-admin-role-assignment/</guid><description>Detects the assignment of an Okta administrator role to a user or group, potentially indicating privilege escalation or persistence attempts by malicious actors.</description><content:encoded><![CDATA[<p>The assignment of administrator roles within Okta to users or groups is a sensitive action that requires careful monitoring. While legitimate administrator actions can account for these events, malicious actors may attempt to escalate privileges or establish persistence by assigning themselves or their controlled groups administrative rights. This activity could lead to unauthorized access, data breaches, or disruption of services within the Okta environment. Defenders should prioritize monitoring these role assignments to identify and respond to potential threats promptly.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Compromise an Okta user account through phishing or credential stuffing.</li>
<li>Leverage the compromised account to authenticate to the Okta environment.</li>
<li>Identify an existing administrator account within the Okta organization.</li>
<li>Impersonate the targeted admin user to assign admin roles.</li>
<li>Assign the Okta Administrator role to either a compromised user account or a newly created rogue group.</li>
<li>The user or members of the rogue group now possess elevated privileges within the Okta environment.</li>
<li>The attacker leverages these elevated privileges to access sensitive applications, data, or configurations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful assignment of administrator roles to unauthorized users can lead to severe consequences, including data breaches, unauthorized access to critical applications, and disruption of business operations. The impact can range from compromised user accounts to full control over the Okta tenant, affecting all integrated applications and services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to detect anomalous Okta admin role assignments to users or groups, focusing on <code>eventType: group.privilege.grant</code> and <code>eventType: user.account.privilege.grant</code>.</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the role assignment and the user or group involved.</li>
<li>Implement multi-factor authentication (MFA) for all Okta user accounts, especially those with administrative privileges, to mitigate the risk of account compromise.</li>
<li>Regularly review Okta administrator role assignments and revoke any unnecessary privileges to minimize the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>persistence</category><category>okta</category></item><item><title>Okta User Session Start via Anonymizing Proxy Service</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-anonymizing-proxy/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-anonymizing-proxy/</guid><description>Detection of Okta user sessions initiated through anonymizing proxy services, potentially indicating malicious activity or attempts to evade security controls.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting Okta user session starts that originate from anonymizing proxy services. Anonymizing proxies can be used by malicious actors to mask their true IP addresses and location, making it more difficult to trace their activities. The use of such proxies during Okta authentication is suspicious because it bypasses geographical restrictions and may indicate compromised credentials. Defenders should be aware that legitimate users may occasionally use anonymizing proxies for privacy reasons, but the activity warrants close scrutiny. The detection of this activity relies on Okta system logs and the security context of the authentication event.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker obtains valid Okta credentials through phishing, credential stuffing, or other means.</li>
<li>Attacker configures their network connection to route traffic through an anonymizing proxy service (e.g., Tor, VPN).</li>
<li>Attacker initiates an Okta user session using the compromised credentials.</li>
<li>Okta system logs record a &ldquo;user.session.start&rdquo; event.</li>
<li>The &ldquo;securityContext.isProxy&rdquo; field within the Okta event is set to &ldquo;true&rdquo;, indicating the use of a proxy service.</li>
<li>If successful, the attacker gains access to the Okta account and any associated applications or resources.</li>
<li>Attacker may then attempt to escalate privileges, access sensitive data, or perform other malicious activities within the Okta environment.</li>
<li>The attacker may attempt lateral movement to other systems within the organization that trust Okta for authentication.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive applications and data protected by Okta. This could result in data breaches, financial loss, or reputational damage. Depending on the compromised user&rsquo;s privileges, an attacker may be able to escalate privileges and gain control over critical systems. The number of potential victims depends on the scope of applications using Okta for authentication.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect Okta user sessions initiated through anonymizing proxies (logsource: okta, service: okta).</li>
<li>Investigate all alerts generated by the Sigma rule to determine the legitimacy of the proxy usage.</li>
<li>Implement multi-factor authentication (MFA) to reduce the risk of account compromise.</li>
<li>Monitor Okta system logs for other suspicious activities, such as failed login attempts or unusual access patterns (references: Okta System Log API).</li>
<li>Review and enforce Okta&rsquo;s cross-tenant impersonation prevention and detection measures (references: Okta cross-tenant impersonation article).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>identity</category><category>okta</category><category>proxy</category><category>defense-evasion</category></item><item><title>Okta User Account Lockout Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-okta-account-lockout/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-okta-account-lockout/</guid><description>Detection of an Okta user account lockout, which may indicate brute-force attempts or other malicious activity targeting user accounts.</description><content:encoded><![CDATA[<p>This brief describes detection measures for Okta user account lockouts. An account lockout occurs when a user exceeds the maximum number of permitted failed login attempts, potentially indicating a brute-force attack or other unauthorized access attempts against user accounts. Monitoring for account lockouts is crucial for identifying and mitigating potential security breaches. The rule detects the &ldquo;Max sign in attempts exceeded&rdquo; message in Okta logs, which signifies that an account has been locked. Detecting this activity can alert security teams to potential compromise attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker attempts to authenticate to Okta with a valid or guessed username.</li>
<li>Attacker provides an incorrect password.</li>
<li>Okta logs the failed authentication attempt.</li>
<li>Attacker repeats steps 2 and 3 multiple times within a defined timeframe.</li>
<li>Okta&rsquo;s account lockout policy is triggered when the maximum number of failed attempts is reached.</li>
<li>Okta logs an event with the <code>displayMessage</code> &ldquo;Max sign in attempts exceeded&rdquo;.</li>
<li>The user account is locked, preventing further login attempts.</li>
<li>Security team investigates the lockout event to determine the root cause and potential impact.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful account lockout can disrupt legitimate user access and indicate potential malicious activity. Multiple lockouts within a short period may signify a brute-force attack aimed at gaining unauthorized access to sensitive resources. While the lockout itself prevents immediate unauthorized access, it can lead to denial of service and requires investigation to rule out successful credential compromise. The number of impacted users depends on the scope and sophistication of the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Okta User Account Locked Out</code> to your SIEM to detect account lockout events in Okta logs.</li>
<li>Investigate any triggered alerts to determine the cause of the lockout, potentially indicating a brute-force attack (reference: <code>displayMessage: Max sign in attempts exceeded</code>).</li>
<li>Review and adjust Okta&rsquo;s account lockout policies to balance security and usability based on your organization&rsquo;s risk tolerance.</li>
<li>Consider implementing multi-factor authentication (MFA) to mitigate the risk of brute-force attacks and credential compromise.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>identity</category><category>account-lockout</category><category>okta</category></item><item><title>Masquerading Business Application Installers</title><link>https://feed.craftedsignal.io/briefs/2024-01-masquerading-business-apps/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-masquerading-business-apps/</guid><description>Attackers masquerade malicious executables as legitimate business application installers to trick users into downloading and executing malware, leveraging defense evasion and initial access techniques.</description><content:encoded><![CDATA[<p>Attackers often attempt to trick users into downloading and executing malicious executables by disguising them as legitimate business applications. This tactic is used to bypass security measures and gain initial access to a system. These malicious executables, often distributed via malicious ads, forum posts, and tutorials, mimic the names of commonly used applications such as Slack, WebEx, Teams, Discord, and Zoom. The executables are typically unsigned or signed with invalid certificates to further evade detection. This allows the attacker to execute arbitrary code on the victim&rsquo;s machine, potentially leading to further compromise. This campaign aims to target end-users who are less security-aware, and this makes social engineering attacks like this very effective.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user visits a compromised website or clicks on a malicious advertisement.</li>
<li>The user is prompted to download an installer file masquerading as a legitimate business application (e.g., Slack, Zoom, Teams) from a download directory.</li>
<li>The downloaded executable is placed in the user&rsquo;s Downloads folder (e.g., C:\Users*\Downloads*).</li>
<li>The user executes the downloaded file.</li>
<li>The executable, lacking a valid code signature, begins execution.</li>
<li>The malicious installer may drop and execute additional malware components.</li>
<li>The malware establishes persistence, potentially using techniques such as registry key modification.</li>
<li>The malware performs malicious activities, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of a masqueraded business application installer can lead to a complete system compromise. The attacker gains initial access and can deploy various malware payloads, including ransomware, keyloggers, and data stealers. This can result in data breaches, financial loss, and reputational damage. Although the specific number of victims and sectors targeted are not detailed, the widespread use of the applications being spoofed (Slack, Zoom, etc.) suggests a broad potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rule <code>Potential Masquerading as Business App Installer</code> to detect unsigned executables resembling legitimate business applications in download directories.</li>
<li>Enable process creation logging to capture the execution of unsigned executables.</li>
<li>Educate users on the risks of downloading and executing files from untrusted sources.</li>
<li>Implement application whitelisting to restrict the execution of unauthorized applications.</li>
<li>Regularly update endpoint detection and response (EDR) tools to detect and prevent the execution of known malware.</li>
<li>Monitor process execution events for processes originating from the Downloads folder that lack valid code signatures.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>masquerading</category><category>defense-evasion</category><category>initial-access</category><category>malware</category><category>windows</category></item></channel></rss>