<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Network-Zone — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/network-zone/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 26 Jan 2024 18:22:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/network-zone/feed.xml" rel="self" type="application/rss+xml"/><item><title>Okta Network Zone Deactivation or Deletion</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-okta-network-zone-changes/</link><pubDate>Fri, 26 Jan 2024 18:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-okta-network-zone-changes/</guid><description>An Okta network zone was deactivated or deleted, potentially indicating malicious activity aimed at bypassing security controls.</description><content:encoded><![CDATA[<p>Okta network zones define trusted network boundaries for user access. These zones are configured with specific IP address ranges and can be used to restrict access to applications and resources. When an Okta network zone is deactivated or deleted, it can indicate a malicious actor attempting to weaken security policies, potentially allowing unauthorized access from untrusted locations. This activity is relevant for defenders because it may signal a breach in progress or preparation for future attacks. Compromised administrator accounts are often used to make unauthorized configuration changes in SaaS platforms. This alert focuses on activity within the Okta platform itself.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to an Okta administrator account, potentially through credential theft or phishing.</li>
<li>The attacker authenticates to the Okta administrative console.</li>
<li>The attacker navigates to the network zone configuration within the Okta admin console.</li>
<li>The attacker identifies a target network zone that restricts access to critical resources.</li>
<li>The attacker deactivates the target network zone, effectively disabling its restrictions. Alternatively, the attacker deletes the network zone.</li>
<li>The attacker may modify other security settings, such as MFA policies, to further weaken the security posture.</li>
<li>The attacker leverages the relaxed network restrictions to access sensitive applications or data from previously unauthorized locations.</li>
<li>The attacker performs malicious actions, such as data exfiltration or lateral movement, using the compromised Okta session.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The deactivation or deletion of an Okta network zone can have serious consequences. It can lead to unauthorized access to sensitive applications and data, potentially resulting in data breaches, financial loss, and reputational damage. The impact is especially high if the affected network zone was protecting critical infrastructure or sensitive customer data. Depending on the scope of access granted, a single deactivated zone could expose data belonging to thousands of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Okta Network Zone Deactivated or Deleted&rdquo; Sigma rule to your SIEM to detect this activity (logsource: okta, service: okta, eventType: zone.deactivate/zone.delete).</li>
<li>Investigate any detected instances of network zone deactivation or deletion to determine if they were authorized changes.</li>
<li>Review Okta administrator account activity for signs of compromise, such as login attempts from unusual locations.</li>
<li>Enforce multi-factor authentication (MFA) for all Okta administrator accounts to prevent unauthorized access.</li>
<li>Monitor the Okta system logs for other suspicious configuration changes, such as modifications to MFA policies or application assignments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>okta</category><category>network-zone</category><category>impact</category></item></channel></rss>