Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Facebook removes ICE-tracking page after US government ‘outreach’

    October 14, 2025

    Mark Cuban Would Still Have Dinner With Donald Trump

    October 14, 2025

    Apple teases M5 MacBook

    October 14, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Okta Breach Impacted All Customer Support Users—Not 1 Percent
    Security

    Okta Breach Impacted All Customer Support Users—Not 1 Percent

    News RoomBy News RoomDecember 1, 20233 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    In late October, the identity management platform Okta began notifying its users of a breach of its customer support system. The company said at the time that about 1 percent of its 18,400 customers were impacted by the incident. But in a massive expansion of this estimate early this morning, Okta said that its investigation has uncovered additional evidence that, in fact, all of its customers had data stolen in the breach two months ago.

    The original 1 percent estimate related to activity in which attackers used stolen login credentials to take over an Okta support account that had some customer system access for troubleshooting. But the company admitted on Wednesday that its initial investigation had missed other malicious activity in which the attacker simply ran an automated query of the database that contains names and email addresses of “all Okta customer support system users.” This also included some Okta employee information.

    While the attackers queried for more data than just names and email addresses—including company names, contact phone numbers, and the data of last login and last password changes—Okta says that “the majority of the fields in the report are blank and the report does not include user credentials or sensitive personal data. For 99.6 percent of users in the report, the only contact information recorded is full name and email address.”

    The only Okta users not impacted by the breach are high-sensitivity customers that must comply with the United States Federal Risk and Authorization Management Program or US Department of Defense Impact Level 4 restrictions. Okta provides a separate support platform for these customers.

    Okta says it didn’t realize that all customers had been affected by the incident because, while its initial investigation had looked at the queries the attackers ran on the system, “the file size of one particular report downloaded by the threat actor was larger than the file generated during our initial investigation.” In the initial assessment, when Okta regenerated the report in question as part of retracing the attackers’ steps, it didn’t run an “unfiltered” report, which would have returned more results. This meant that in Okta’s initial analysis, there was a discrepancy between the size of the file the investigators downloaded and the size of the file the attackers had downloaded, as recorded in the company’s logs.

    Okta did not immediately respond to WIRED’s requests for clarification on why it took a month for the company to run an unfiltered report and reconcile this inconsistency.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleThe Problems Lurking in Hollywood’s Historic AI Deal
    Next Article iA Writer can now track what you or ChatGPT wrote

    Related Posts

    ‘Happy Gilmore’ Producer Buys Spyware Maker NSO Group

    October 14, 2025

    Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits

    October 14, 2025

    Apple Took Down These ICE-Tracking Apps. The Developers Aren’t Giving Up

    October 13, 2025

    How a Travel YouTuber Captured Nepal’s Revolution for the World

    October 11, 2025

    Tile Tracking Tags Can Be Exploited by Tech-Savvy Stalkers, Researchers Say

    October 9, 2025

    Google’s Latest AI Ransomware Defense Only Goes So Far

    October 6, 2025
    Our Picks

    Mark Cuban Would Still Have Dinner With Donald Trump

    October 14, 2025

    Apple teases M5 MacBook

    October 14, 2025

    The Mystery of How Quasicrystals Form

    October 14, 2025

    Motorola has a super-thin Air phone too

    October 14, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Business

    Programming in Assembly Is Brutal, Beautiful, and Maybe Even a Path to Better AI

    By News RoomOctober 14, 2025

    Rollercoaster Tycoon wasn’t the most fashionable computer game out there in 1999. But if you…

    Discord blamed a vendor for its data breach — now the vendor says it was ‘not hacked’

    October 14, 2025

    ‘Happy Gilmore’ Producer Buys Spyware Maker NSO Group

    October 14, 2025

    California cracks down on ‘predatory’ early cancellation fees

    October 14, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.