Okta, a leading identity and access management solutions provider, has recently issued a warning about a significant increase in credential stuffing attacks targeting its systems. Read on to learn more.
These attacks, described as unprecedented in both frequency and scale, involve cybercriminals using automated scripts to test stolen username and password combinations across various user accounts. This method, known as credential stuffing, leverages large databases of previously compromised credentials to gain unauthorized access to accounts.
The recent surge in these attacks has been linked to infrastructure, which was also noted in earlier reports by Cisco’s Talos, describing similar patterns in brute-force attacks. The attackers predominantly utilized the TOR network and various residential proxies to mask their activities, making the attacks more difficult to trace and block.
Organizations using the Okta Classic Engine, particularly those with ThreatInsight configured in Audit-only mode, were found to be more vulnerable. In these settings, the system logs suspicious activities but does not actively block them, which attackers have exploited to successfully breach accounts.
In response to these threats, Nuspire has taken proactive measures to safeguard client environments. This includes the immediate application of security patches following vendor recommendations and conducting active threat hunting to detect any signs of compromise within client systems. These steps are crucial in identifying and stopping threats before they can cause significant damage.
To mitigate the risk of account takeover, use passwordless authentication, enforce multi-factor authentication, use strong passwords, deny requests outside the company’s locations, block malicious IP addresses, and monitor and respond to anomalous sign-ins.
Okta also outlined broader recommendations for adding layers to the defenses against account takeover attempts and has shared the tactics, techniques and procedures (TTPs) used in these most recent attacks.