April 5, 2022 Breach

The Identity Provider as a Critical Vendor

In the modern enterprise, few vendors are as deeply integrated as identity providers. Okta, which serves over 15,000 organizations and processes billions of authentication requests, sits at the center of corporate access control. When Okta itself became the target of a breach in January 2022, it exposed a fundamental truth about third-party risk management: compromising an identity vendor can provide a pathway to hundreds of downstream organizations simultaneously.

How the Breach Happened

The intrusion did not begin at Okta's own systems. Instead, attackers from the Lapsus$ group compromised a workstation belonging to a support engineer at Sitel (now Concentrix), a third-party customer support contractor that Okta used for Tier 1 support operations. The breach of the Sitel engineer's machine occurred in January 2022, giving the attackers access to Okta's customer support tools, including the ability to view customer tenants and reset passwords.

The incident became public on March 22, 2022, when the Lapsus$ group posted screenshots on Telegram showing Okta's internal administrative tools, including the SuperUser application used for basic customer support functions. The screenshots were timestamped January 21, 2022, confirming the timeline of the intrusion.

Okta's Response and the Transparency Failure

Okta's handling of the disclosure drew widespread criticism from security professionals and customers. The company's initial public statement characterized the breach as an "attempt" that was "unsuccessful," and stated that "the Okta service has not been breached." However, this framing proved misleading. Okta later acknowledged that 2.5% of its customers — approximately 366 organizations — had potentially been affected, meaning their data could have been viewed or acted upon through the compromised support tools.

"We made a mistake. We should have been more forthcoming with information." — Todd McKinnon, Okta CEO, in a subsequent statement to customers.

The two-month delay between the January breach and the March public disclosure — with the disclosure ultimately forced by the attackers rather than Okta — raised serious questions about vendor incident notification practices.

The Lapsus$ Group

Lapsus$ (also stylized as LAPSUS$) was a threat group that gained notoriety in early 2022 for a rapid series of high-profile breaches, including Microsoft, Samsung, Nvidia, and Uber. The group was characterized by social engineering tactics, SIM swapping, and targeting of third-party contractors and help desks rather than exploiting technical vulnerabilities. In March 2022, UK police arrested several individuals connected to the group, including teenagers.

The Third-Party Risk Dimensions

The Okta-Lapsus$ incident illustrates multiple layers of vendor risk that TPRM programs must address:

Risk Layer Description
Nth-Party Risk Okta's customers did not have a direct relationship with Sitel, yet Sitel's compromise affected them. This is classic fourth-party (or nth-party) risk.
Identity Provider Concentration Thousands of organizations depend on a single identity vendor, creating systemic risk across entire industries.
Privileged Access in Support Support contractors often receive broad access to customer environments, creating high-value targets for attackers.
Incident Disclosure Timeliness Vendor contracts must specify notification timelines; Okta's two-month delay left customers unable to respond.
TPRM Lesson Learned: Identity providers represent uniquely high-impact vendors because their compromise can cascade to every downstream customer. TPRM programs must treat identity vendors as Tier 1 critical vendors regardless of spend, mandate contractual breach notification timelines (ideally 72 hours or less), and require visibility into the vendor's own third-party relationships — including support contractors with privileged access. Vendor risk assessments for identity providers should explicitly evaluate their subcontractor access controls and incident response practices.

Practical TPRM Takeaways

Applying FAIR Quantification

The Okta incident is well-suited to FAIR risk quantification. The loss event frequency can be modeled by examining how often identity providers experience breaches (increasing), while loss magnitude must account for the cascading impact across all downstream organizations. For any company using Okta, the probable loss magnitude from an identity provider breach includes incident response costs, credential rotation, potential unauthorized access, and regulatory exposure — costs that dwarf the annual subscription fee.

Protect Your Organization from Third-Party Risk

Fair TPRM is a free, open-source platform for vendor risk management, GRC compliance, and FAIR risk quantification.

Free Demo Download Source

Sources & References

  1. Updated Okta Statement on LAPSUS$ - Okta Official Blog
  2. The Lapsus$ Hacking Group Is Off to a Chaotic Start - Wired
  3. Threat Actors Exploiting Multiple CVEs Against Zimbra Collaboration Suite (includes Lapsus$ context) - CISA
  4. Okta's Investigation of the January 2022 Compromise - Okta Security
  5. British Police Arrest 7 in Connection with Lapsus$ Hacking Gang - Reuters