blog に戻る

2023年11月02日 George Gerchow

Okta evolving situation: Am I impacted?

With so many simultaneous events going on, heightened awareness in response to state actors, US President Biden’s cybersecurity call-to-action, and the Microsoft Event, all of us need to remain aware and vigilant as supply chain attacks continue. We highly recommend taking a proactive approach to secure your environment with a defense-in-depth strategy and appropriate monitoring. 

Early today, news outlets reported the recent compromise of a support engineer's laptop at the Identity and Authentication (IAM) firm, Okta. Soon thereafter, Okta’s Chief Security Officer, David Bradbury, blogged that the Okta service has not been breached and remains fully operational.

Our Global Operations Center investigated Okta’s evolving situation and so far we have no evidence that Sumo Logic, our employees or services are impacted in any way. 

Sumo Logic customers 

If you are a Sumo Logic customer or if you are trialing Sumo Logic services, we can help you determine if you are at risk. 

You can use the Okta App for Sumo Logic to get started with securing your environment by using the Okta logs to determine this potential compromise and much more, including:

  • Identify top 10 user account lockouts in the last 24 hours
  • Correlate user account lockout with a successful login
  • Identify abnormal user activities
  • Perform geo-velocity analysis
  • Detect successful and failed logins
  • Monitor admin activities
  • Identify accounts with MFA disabled

Example: User Event Analysis using Okta App

If you are a Sumo Logic Cloud SIEM customer you have more fine-grained capabilities! Cloud SIEM includes targeted searches that you can use now, such as:

  • Okta_API_Token_Created
  • Okta_Admin_App_Access_Attempt_Failed
  • Okta_Admin_App_Accessed
  • Okta_Account_Lockout
  • Okta_User_Attempted_to_Access_Unauthorized_App
  • Okta_Administrator_Access_Granted
  • Okta_Account Primary Email Address Update
  • Okta_Credential Access User Impersonation
  • Okta_MFA Bypass Attempt
  • Okta_MFA Deactivated for User
  • Okta_MFA Device Reset

Alternatively, from the Sumo Logic platform you can search Okta logs for signs of an attacker attempting to flood the target victim with Multi-Factor Authentication (MFA) push notifications until the victim accepts an MFA request.

_source="Okta" (user.authentication.auth_via_mfa or OKTA_VERIFY_PUSH)
| json field=_raw "outcome.result" as result
| json field=_raw "actor.alternateId" as user
| timeslice 10m
| if(result="SUCCESS",1,0) as success
| if(result="FAILURE",1,0) as failure
| count as total_pushes,sum(success) as success, sum(failure) as failure by user,_timeslice
| failure/total_pushes as push_fail_ratio
| "No Finding" as finding
| if(failure=total_pushes AND total_pushes>1,"Authentication attempts not successful because multiple pushes denied",finding) as finding
| if(total_pushes=0,"Multiple pushes sent and ignored",finding) as finding
| if(success>0 AND total_pushes>3,"Multiple pushes sent, eventual successful authentication!",finding) as finding
| if(push_fail_ratio>.1,"High push fail Ratio with successful login detected",finding) as finding
| where finding = "High push fail Ratio with successful login detected" and total_pushes > 1

I am not a Sumo Logic customer

Don't worry, you can get started in minutes! Sign up for your free trial today. Once you sign up, our onboarding team will help you navigate the steps to be taken to get you going. You will be able to use all relevant Okta (or other) logs to help you determine if you are compromised.

Next steps

Sumo Logic Global Operations Center, Threat Labs and Engineering teams are working on releasing additional content to help you to stay ahead of such compromises.

If you are a Sumo Logic customer, reach out to us now for help.

If you want to get started with Sumo Logic, reach out to us.

Complete visibility for DevSecOps

Reduce downtime and move from reactive to proactive monitoring.

Sumo Logic cloud-native SaaS analytics

Build, run, and secure modern applications and cloud infrastructures.

Start free trial
George Gerchow

George Gerchow

CSO and SVP of IT

As Sumo Logic's CSO and SVP of IT, George Gerchow brings over 20 years of information technology and systems management expertise to the application of IT processes and disciplines. George has been on the bleeding edge of public cloud security, privacy and modernizing IT systems since being a co-founder of the VMware Center for Policy & Compliance. He is a Faculty Member for IANS - Institute of Applied Network Security and sits on several industry advisory boards. Mr. Gerchow is also a known philanthropist and CEO of a nonprofit corporation, XFoundation.

More posts by George Gerchow.

これを読んだ人も楽しんでいます