November 10, 2023 Breach

In October 2023, Okta disclosed that attackers had compromised its customer support case management system using stolen credentials. The breach initially appeared limited: Okta reported that only 1% of its customer base had been affected. Weeks later, the company revised that figure to 100% of all Okta customer support customers. This was not Okta's first security incident — the Lapsus$ group had breached one of Okta's third-party support providers in January 2022. The recurrence raised a fundamental question for every organization dependent on Okta: how many times can your identity vendor get compromised before you reconsider the relationship?

What Happened: The Attack Chain

The attack began when threat actors obtained credentials to Okta's customer support case management system. Once inside, the attackers accessed HTTP Archive (HAR) files that customers had uploaded to support cases for troubleshooting purposes. HAR files are browser session recordings that capture network traffic, and critically, they often contain session tokens and cookies. With valid session tokens extracted from these HAR files, attackers could impersonate customers without needing their actual usernames or passwords.

Okta acknowledged the breach on October 20, 2023, initially stating it affected approximately 134 customers, which represented roughly 1% of its customer base. However, on November 29, 2023, Okta's Chief Security Officer David Bradbury disclosed that the actual impact was far broader: the threat actor had run a report that contained names and email addresses of all Okta customer support system users.

Impact Category Details
Initial Disclosure October 20, 2023 — approximately 134 customers (1%)
Revised Disclosure November 29, 2023 — 100% of customer support users
Data Accessed HAR files with session tokens, names, email addresses of all support customers
Attack Vector Stolen credentials for support case management system
Prior Incident January 2022 breach via Lapsus$ through Sitel, a third-party support provider

BeyondTrust and Cloudflare: Customers Who Caught the Breach First

One of the most notable aspects of this incident was that Okta did not discover the breach on its own. BeyondTrust detected suspicious activity on October 2, 2023 — more than two weeks before Okta's public disclosure. According to BeyondTrust's published account, their security team identified an identity-centric attack on an in-house Okta administrator account. They notified Okta on October 2 but reported that Okta did not confirm a breach for over two weeks.

Cloudflare also detected and mitigated an attack stemming from the Okta compromise. On October 18, 2023, Cloudflare's security team identified suspicious activity involving an Okta session token that had been compromised via the support system. Cloudflare's rapid detection and containment prevented any impact on their systems or customers. Both companies published detailed blog posts about their experiences, which ultimately pressured Okta into a more complete public disclosure.

"We identified the threat activity and immediately locked down the compromised account before the attacker could take any action on our systems." — Cloudflare Security Incident Report, October 2023

A Pattern of Incidents: The Vendor Trust Problem

The October 2023 breach was not an isolated event. In March 2022, Okta confirmed that the Lapsus$ hacking group had accessed the laptop of a support engineer at Sitel, one of Okta's third-party customer support providers. That incident affected up to 366 Okta customers. Okta's initial response was also criticized as slow and minimizing.

This pattern — repeated breaches, delayed disclosures, and downplayed impact assessments — creates a significant challenge for third-party risk management programs. Identity providers like Okta sit at the center of enterprise security architectures. They manage authentication and authorization for thousands of applications. A compromise of the identity provider is not equivalent to a compromise of any other vendor; it potentially gives attackers keys to every connected system.

The TPRM Challenge: When Do You Lose Trust?

For risk managers, the Okta situation exposes a difficult decision. Replacing an identity provider is enormously expensive and disruptive, often involving months of migration work. But continuing to trust a vendor with a pattern of breaches also carries clear risk. This is precisely the kind of scenario where quantitative risk analysis outperforms qualitative ratings. A vendor rated "medium risk" on a questionnaire provides no decision support. A FAIR-based analysis that estimates the annualized loss expectancy of continued reliance versus migration cost provides an actionable comparison.

TPRM Lesson Learned: Identity providers represent the highest-concentration vendor risk in most enterprise environments. When an identity vendor suffers repeated breaches, organizations must go beyond standard assessment cadences and perform enhanced due diligence: reviewing incident response timelines, evaluating the vendor's transparency and root cause remediation, and quantifying the financial exposure of continued reliance. Vendor trust is not binary — it must be continuously earned, measured, and re-evaluated. The Okta case also demonstrates that customers with strong internal detection capabilities (like BeyondTrust and Cloudflare) identified the breach before the vendor did, underscoring the value of continuous monitoring over vendor self-reporting.

Risk Mitigation Strategies

Organizations relying on any identity provider should consider several defensive measures in light of the Okta incidents:

Protect Your Organization from Third-Party Risk

Fair TPRM is a free, open-source platform for vendor risk management, GRC compliance, and FAIR risk quantification.

Free Demo Download Source

Sources & References

  1. Unauthorized Access to Okta's Support Case Management System: Root Cause and Remediation - Okta Security Advisory, October 2023
  2. November 2023 Security Incident Update — All Customer Support Users Affected - Okta Blog, November 29, 2023
  3. BeyondTrust Discovers Breach of Okta Support Unit - BeyondTrust Blog, October 2023
  4. How Cloudflare Mitigated Yet Another Okta Compromise - Cloudflare Blog, October 2023
  5. Updated Okta Statement on Lapsus$ Claims - Okta Blog, March 2022