Oasis Ticket Sales Scams: How to Stay Safe
During our weekly meetings with the banking industry and Police Scotland, we continue to see a significant increase in ticket scams over the last three…
Credential stuffing attacks have recently targeted Okta’s Customer Identity Cloud (CIC) feature, posing a significant risk to businesses using this service.
Credential stuffing is a type of cyber attack where threat actors use lists of stolen usernames and passwords, often obtained from previous data breaches, to gain unauthorised access to user accounts. These attacks exploit the common practice of password reuse across multiple sites, making them particularly effective.
On April 15, 2024, Okta detected a wave of credential stuffing attacks targeting its CIC feature. This feature, specifically the Cross-Origin Resource Sharing (CORS) functionality, allows customers to add JavaScript to their websites and applications to send authentication calls to the Okta API. To function properly, customers must grant access to specific URLs from which cross-origin requests can originate. However, these URLs became the focal point of the credential stuffing attacks.
In these attacks, cyber criminals targeted endpoints utilising Okta’s cross-origin authentication feature. By orchestrating credential stuffing attempts, they aimed to exploit the CORS feature to gain unauthorised access. Okta’s investigation revealed that these attacks were part of a larger campaign also targeting Cisco Talos products since March 2024.
Okta promptly notified affected customers and provided detailed remediation guidance. Admins were advised to review logs for specific events such as fcoa (Failed Cross-Origin Authentication), scoa (Successful Cross-Origin Authentication), and pwd_leak (Login Attempt with Leaked Password). These events can indicate credential stuffing attempts, especially if there are spikes or unusual patterns.
To protect against credential stuffing attacks, Okta recommends several measures:
If you suspect that your business has been targeted by a credential stuffing attack, take the following steps immediately:
Credential stuffing attacks pose a significant threat to businesses, exploiting weaknesses in password management and authentication processes. By understanding the tactics, techniques, and procedures (TTP) used in these attacks, and by implementing robust security measures, businesses can defend against such threats and ensure the integrity of their systems.
For more detailed information, you can refer to Okta’s official announcements and guidelines on their security blog and BleepingComputer.