Okta alerts customers against new credential-stuffing attacks (2024)

Okta alerts customers against new credential-stuffing attacks (1)

byShweta Sharma

Senior Writer

News

May 31, 20244 mins

Identity and Access ManagementVulnerabilities

Hackers are using credential-stuffing to attack endpoints that are used to support the cross-origin authentication feature.

Okta alerts customers against new credential-stuffing attacks (2)

Credit: Michael Vi 1488607697 | Shutterstock

A cross-origin authentication feature in Okta’s customer identity cloud (CIC) is open to credential-stuffing attacks, the identity and access management company said in a security advisory.

The company said it observed several attempts by threat actors to exploit the vulnerable endpoints and sign in to online services using previously compromised credentials.

“We observed that the endpoints used to support the cross-origin authentication feature being attacked via credential stuffing for a number of our customers,” Okta said in the advisory. “We have proactively notified the customers we identified that have this feature enabled, and provided additional guidance in a customer email.”

Cross-origin authentication refers to a situation where a user’s credentials are sent to a domain that differs from the one that serves up the application the authentication request is being made for.

Suspicious log events

Okta said it observed malicious attempts starting in mid-April and has advised customers to review a few suspicious log events that include failed cross-origin authentication, successful cross-origin authentication, and pwd_leak (when someone attempts to log in with a leaked password).

“We have observed suspicious activity that started on April 15,” Okta said. “Please note that this may not be continuous for every tenant, we recommend reviewing suspicious activity from that date forward.”

In a credential-stuffing attack, adversaries try to log into online services using extensive lists of usernames and passwords, which they may have acquired from past data breaches, unrelated sources, phishing schemes, or malware campaigns, according to the company.

“Organizations are highly encouraged to strongly harden IAM against multiple tactics of abuse, especially credential stuffing, to ensure multiple layers of proactive controls to lower risk against attack from multiple threat actors eager to intrude and exploit,” said Ken Dunham, cyber threat director at Qualys Threat Research Unit. “Don’t let threat actors be your IAM auditor, move beyond complex password basics to harden your authentication of users and accounts to ensure you’re not the next breach victim in the news.”

A few of the high-profile data breaches this month include breaches that affected a Europol website, Dell Technologies, and a Zscaler “test environment.” However, the attempting credentials, as used by the threat actors, used on a vulnerable Okta feature could have come from a much older data breach.

Use password rotation, or go password-less

Okta is advising customers to go passwordless to protect against credential-stuffing attacks. “Enroll users in passwordless, phishing-resistant authentication,” the company said. “We recommend the use of passkeys as the most secure option. Passkeys are included on all Auth0 plans from our free plan through Enterprise.”

Additionally, rotating passwords regularly, avoiding weaker passwords and those listed in the common password list, and using a password with a minimum of 12 characters and no parts of the username, can be helpful too.

As short-term fixes to these attacks, Okta has recommended disabling the vulnerable endpoint within the Auth0 Management Console in case the tenant isn’t using cross-origin authentication. Restricting permitted origins is also advised if using cross-origin authentication is required.

“Organizations must scrutinize tenant logs for unusual login patterns and promptly rotate credentials while considering disabling the vulnerable feature,” said Jason Soroko, senior vice president of product at Sectigo. “The reporting on this incident does seem to mirror a more reactive, rather than proactive, cybersecurity measure. Security teams must treat this with the urgency it deserves.” The company is also pushing additional defensive features like Breached Password Detection and Credential Guard through a number of subscription plans.

Related content

  • opinionReduce security risk with 3 edge-securing steps Not sure where you should start to approach risk reduction in your network? If you aren’t aware of any and all risks to your edge access, you’re not reducing risk. By Susan BradleyJul 01, 20246 minsIdentity and Access ManagementRisk Management
  • newsTeamViewer targeted by APT29 hackers, containment measures in place TeamViewer says the attack targeted its corporate network, not customer data or product functionality.By gyana_swainJun 28, 20243 minsCyberattacksRemote Access Security
  • featureTop 12 cloud security certifications Cloud security certifications can give your career a boost. Covering rapidly evolving technologies such as AI, market challengers such as Alibaba Cloud, and areas previously overlooked, these are your best bets.By Eric FrankJun 28, 202414 minsCertificationsIT SkillsCloud Security
  • featureThe CSO guide to top security conferences Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.By CSO StaffJun 28, 202410 minsTechnology IndustryIT SkillsEvents
  • PODCASTS
  • VIDEOS
  • RESOURCES
  • EVENTS

SUBSCRIBE TO OUR NEWSLETTER

From our editors straight to your inbox

Get started by entering your email address below.

Okta alerts customers against new credential-stuffing attacks (2024)

FAQs

Okta alerts customers against new credential-stuffing attacks? ›

Okta is advising customers to go passwordless to protect against credential-stuffing attacks. “Enroll users in passwordless, phishing-resistant authentication,” the company said. “We recommend the use of passkeys as the most secure option. Passkeys are included on all Auth0 plans from our free plan through Enterprise.”

What ways can be used to protect from credential stuffing and automated attacks? ›

Rate Limiting & Throttling

They use automated solutions that allow them to target one or multiple accounts with a large number of requests in a very short amount of time. So an effective method against credential stuffing is to set up server-side scripts or security solutions that monitor and restrict the request rate.

Is Okta warns of unprecedented surge in proxy driven credential stuffing attacks? ›

Anonymizing services and residential proxies have been blamed for an “unprecedented” surge in credential stuffing attacks against Okta customers over the past week. The identity and access management vendor said its Identity Threat Research team observed a spike in attacks against user accounts between April 19 and 26.

What is credential stuffing answer? ›

What is credential stuffing? Credential stuffing is a cyber attack in which credentials obtained from a data breach on one service are used to attempt to log in to another unrelated service.

What is an example of a credential stuffing attack? ›

The source of the problem? Credential stuffing. Just hours after the launch, Disney+ account credentials were put up for sale on dark web forums. By testing massive volumes of previously stolen usernames and passwords on the Disney+ streaming site, hackers could easily identify valid credential pairs.

Which of the following practices can help protect you from credential stuffing attacks? ›

Use multi-factor authentication (MFA)

Multi-factor authentication (MFA) helps prevent credential stuffing attacks by adding an extra layer of security by requiring multiple forms of verification, typically: Something You Know: Usually a username and password combination.

Which of the following ways can be used to protect from automated attacks? ›

CAPTCHA. Requiring a user to solve a "Completely Automated Public Turing test to tell Computers and Humans Apart" (CAPTCHA) or similar puzzle for each login attempt can help to identify automated/bot attacks and help prevent automated login attempts, and may slow down credential stuffing or password spraying attacks.

What is the security problem with Okta? ›

Mounting woes. In 2022, Okta got hit by a phishing attack, a breach and had its GitHub source code stolen. Last year, a string of attacks hit high-profile customer environments over the summer and a third-party vendor attack exposed health information on nearly 5,000 current and former Okta employees.

What are the risks of Okta? ›

Phishing: Attackers can use social engineering techniques to trick users into providing their MFA credentials. This can include fake login pages or phishing emails that ask users to enter their MFA codes or accept the push notification from the authenticator app.

What type of vulnerability is credential stuffing? ›

Credential Stuffing is a subset of the brute force attack category. Brute forcing will attempt to try multiple passwords against one or multiple accounts; guessing a password, in other words. Credential Stuffing typically refers to specifically using known (breached) username / password pairs against other websites.

What is the credential stuffing defense? ›

Requiring users to authenticate with something they have, in addition to something they know, is the best defense against credential stuffing. Attacker bots will not be able to provide a physical authentication method, such as a mobile phone or access token.

What is the source of credential stuffing? ›

Credential stuffing is a type of cyberattack in which the attacker collects stolen account credentials, typically consisting of lists of usernames or email addresses and the corresponding passwords (often from a data breach), and then uses the credentials to gain unauthorized access to user accounts on other systems ...

How much does credential stuffing cost? ›

Credential stuffing attacks can be very costly; in fact, the Ponemon Institute puts the cost to businesses at an average of $6 million per year, and this figure doesn't include the reputational damage to organizations and the financial losses victims suffer.

What is the biggest credential stuffing attack? ›

Examples of credential stuffing attacks

Despite being a big name in the cyber security space, at the start of 2023, Norton was hit but a brute force credential stuffing attack that saw threat actors using stolen credentials to log into customer accounts and access their data. Over 925,000 people were targeted.

What feature prevents credential stuffing spraying attacks? ›

To prevent credential stuffing, enable multi-factor authentication (MFA), require complex passwords, and educate employees about the danger of using weak passwords or using the same password on multiple systems.

What is the credential stuffing trend? ›

Credential stuffing is a tactic where hackers utilise stolen login credentials from one organisation's platform, to gain unauthorised access to multiple user accounts across other organisations.

What methods can be used to protect against cyber security attacks? ›

5 easy tips to protect yourself - today
  • Check if you've already been involved in a data breach. Visit haveibeenpwned.com and change those passwords for any accounts that it suggests may have been compromised.
  • Check the strength of your passwords. ...
  • Avoid these passwords. ...
  • Trust no one (on emails) ...
  • Secure your device.

What are the 3 key prevention measures of cyber attacks? ›

Let us see how to stop a cyber-attack or prevent a malware attack:
  • Use antivirus software to protect your computer against malware.
  • Use firewalls to filter the traffic that may enter your device.
  • Stay alert and avoid clicking on a suspicious link.
  • Update your operating system.
Apr 25, 2024

Which three features are used to prevent abuse of stolen credentials? ›

In summary, multi-factor authentication, URL Filtering Profiles, and WildFire Profiles are three key features that help prevent abuse of stolen credentials by adding extra layers of security, blocking access to malicious websites, and identifying and blocking new and unknown malware.

Which is one of the prevention methods for identification and authentication failures? ›

According to OWASP, the most effective way to prevent broken authentication is to “implement multi-factor authentication to prevent automated, credential stuffing, brute force, and stolen credential reuse attacks.” Multi-factor authentication adds an extra layer of security that is difficult for hackers to crack which ...

References

Top Articles
Latest Posts
Article information

Author: Greg O'Connell

Last Updated:

Views: 5473

Rating: 4.1 / 5 (42 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Greg O'Connell

Birthday: 1992-01-10

Address: Suite 517 2436 Jefferey Pass, Shanitaside, UT 27519

Phone: +2614651609714

Job: Education Developer

Hobby: Cooking, Gambling, Pottery, Shooting, Baseball, Singing, Snowboarding

Introduction: My name is Greg O'Connell, I am a delightful, colorful, talented, kind, lively, modern, tender person who loves writing and wants to share my knowledge and understanding with you.