Okta is again on the report with one other cybersecurity incident, this time by way of a breach of its third-party vendor, Rightway Healthcare, which has uncovered the non-public and healthcare knowledge of practically 5,000 Okta workers.
In accordance with Okta’s submitting with the Maine Legal professional Common, the Rightway breach occurred on Sept. 23 and was found on Oct. 12.
Okta, in a press release, emphasised that solely its workers, not its prospects, have been impacted by the incident.
“An Okta vendor, Rightway Well being, had a safety incident in September 2023 during which recordsdata from April 2019 by 2020 have been exfiltrated from its IT atmosphere,” an Okta spokesperson defined. “These contained private details about workers and their dependents from 2019/2020.”
The assertion added Okta companies stay safe.
“On October 12, 2023, Rightway knowledgeable Okta that an unauthorized actor gained entry to an eligibility census file maintained by Rightway in its provision of companies to Okta,” a letter despatched to compromised workers defined. “Upon discovering the incident, we promptly launched an investigation and reviewed the affected file to find out the extent of the affect to our present and former workers, and their dependents. The investigation revealed that your private data was contained within the impacted file.”
Compromised knowledge included names, Social Safety numbers, and well being or medical insurance coverage, a letter despatched to potential victims by Okta learn. The corporate added a proposal without spending a dime identification and credit score monitoring companies.
Ongoing Okta Safety Woes
Actually, compared to latest compromises tied to Okta, this particular knowledge leak by Rightway is not a standout occasion; but it surely could not come at a worse time for the cybersecurity firm.
From risk actors gaming the corporate’s software program platform to breach MGM Resorts to catastrophic impact in September, to October’s incident when attackers compromised Okta’s personal methods to steal buyer knowledge, together with session tokens and cookies (adopted days later by a provide chain assault on its buyer 1Password), it has been a tough few weeks for the identification and entry administration (IAM) vendor.
“If it weren’t for seeing Okta’s title within the press these days for some lower than inspiring safety occasions, I in all probability would not even take any discover of this occasion,” Netenrich’s John Bambenek tells Darkish Studying. “That being stated, I ought to hope for his or her workers sake that they’re taking this occasion significantly, and what they’ll do to shore up the delicate knowledge that they’re having their third-party distributors course of on their behalf.”
Nevertheless, disclosure of one other cybersecurity incident anyplace in its software program provide chain may elevate questions on Okta’s total safety posture, notably amongst its cybersecurity-conscious clientele.
“The belief of cybersecurity professionals might be fragile with regards to knowledge breaches,” Vital Begin risk intelligence analysis analyst Sarah Jones says. “Whereas cybersecurity incidents can occur to any group, the extent of belief loss depends upon how nicely the corporate handles the scenario.”
Jones provides that Okta’s response has been proactive and optimistic on this case. “Okta has taken steps to inform, and assist affected people, providing credit score monitoring companies as a precaution,” Jones provides. “Nevertheless, long-term belief is contingent on the corporate’s dedication to enhancing its safety measures and stopping future breaches.”
Requested about how Okta would reassure its prospects it’s taking proactive steps to shore up its total cybersecurity posture, the corporate spokesperson stated they’re sticking to the assertion, for now.