<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Application-Security — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/application-security/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/application-security/feed.xml" rel="self" type="application/rss+xml"/><item><title>Okta Application Modified or Deleted</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-okta-app-modified-deleted/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-okta-app-modified-deleted/</guid><description>Detects when an Okta application is modified or deleted, potentially indicating unauthorized changes or removal of critical applications.</description><content:encoded><![CDATA[<p>This alert detects modifications or deletions of applications within the Okta identity and access management platform. While the specific actor is unknown, the modification or deletion of an application can lead to significant disruptions and potential security breaches. The activity is detected through Okta system logs that record application lifecycle events. This is crucial for defenders because unauthorized changes to applications can lead to privilege escalation, data breaches, or denial of service. Monitoring these events allows for prompt investigation and mitigation of potentially malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains unauthorized access to an Okta administrator account.</li>
<li>The attacker authenticates to the Okta admin console.</li>
<li>Attacker navigates to the Applications section in the Okta admin console.</li>
<li>The attacker identifies a target application for modification or deletion.</li>
<li>If modifying, the attacker alters application settings such as permissions, user assignments, or SSO configurations.</li>
<li>If deleting, the attacker initiates the application deletion process.</li>
<li>Okta logs the &ldquo;application.lifecycle.update&rdquo; or &ldquo;application.lifecycle.delete&rdquo; event.</li>
<li>The change impacts end-users and their ability to access resources through the modified or deleted application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of unauthorized application modification or deletion can be significant. Modified applications can grant unintended access to sensitive resources, leading to data breaches or privilege escalation. Deleted applications disrupt user access and business operations, potentially causing significant downtime and financial losses. The scope of the impact depends on the criticality of the affected application and the extent of the unauthorized changes.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect <code>application.lifecycle.update</code> or <code>application.lifecycle.delete</code> events in Okta logs.</li>
<li>Investigate any triggered alerts for unexpected application modifications or deletions, focusing on the user account that initiated the change (source: Okta logs).</li>
<li>Review Okta administrator account access and enforce multi-factor authentication to prevent unauthorized access (reference: Okta documentation on security best practices).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>okta</category><category>application-security</category><category>identity-management</category></item></channel></rss>