Skip to content

Financial impact deemed 'minimal' by Okta after attack on customer support portal

Despite pledges from the identity and access management company to prioritize security, the Chief Financial Officer admits that the aftermath of the attack remains "unmeasurable."

Financial consequences of Okta's support portal breach deemed minimal
Financial consequences of Okta's support portal breach deemed minimal

Financial impact deemed 'minimal' by Okta after attack on customer support portal

Okta, the identity and access management company, has taken significant steps to regain customer trust following a major cyberattack in September. The attack, which was one of the largest and most significant of 2023, targeted Okta's support portal and had minimal impact on the company's financial performance, according to CEO and Co-Founder Todd McKinnon.

In response to the attack, Okta has reoriented around security and made defense its top priority. The company announced more than a dozen security enhancements in tandem with its fourth-quarter results, which ended with approximately 19,000 customers, including 150 net customer additions.

Okta CSO David Bradbury is working on regaining the trust of the company's customers. He has pledged to harden Okta's corporate infrastructure and has been focusing on improving security controls and increasing transparency.

According to James Maude, director of research at BeyondTrust, Okta has made significant improvements to the security of their products since the recent breaches. Maude stated that Okta should aim to prevent customers from being easy targets for threat actors due to weak security configurations. He proposed that the key for Okta in the future will be to help customers help themselves by making things secure by default to ensure strong security configurations.

The recovery and resilience strategies described by industry sources provide a relevant framework for Okta's post-attack measures. It is plausible that Okta implemented structured recovery steps involving clean-room environments for workload restoration and strict malware-free attestations before systems rejoined production. Lessons learned from the breach would have been reviewed in dedicated sessions within two weeks, with root cause analysis dashboards highlighting timeline gaps, detection misses, and access control failures to inform improvements.

Security resilience hardening measures generally involve accelerated adoption of zero-trust segmentation, ransomware-locked snapshots, and enhanced penetration testing. It is likely that Okta adopted similar controls post-attack to reduce credential-stuffing and lateral movement risks. Moreover, updated runbooks and employee training institutionalize these new defenses to ensure faster detection and containment in the event of future incidents.

The role of Chief Information Security Officers (CISOs) has become more strategic and integral to managing complex technology stacks and emerging threats. CISOs are now expected to lead formal vulnerability management programs, shift from reactive incident firefighting to strategic risk management, embed key risk indicators into board-level reports, utilise threat intelligence, and conduct frequent tabletop exercises and penetration testing.

Okta plans to invest $50 million in a fund to address cybersecurity challenges outside the company over the next five years. The company has yet to report a quarterly profit since it went public in 2017, but the fourth quarter of fiscal 2024 represented a 19% year-over-year increase in revenue.

Progress Software, a downstream victim of the attack against Okta's support portal, reported minimal business impact from a mass exploit of a zero-day vulnerability in its file-transfer service MOVEit. BeyondTrust, Cloudflare, and 1Password were also affected by the attack.

The September cyberattack on Okta exposed all of its customer support system clients. Okta has been working to regain the trust of its customers and strengthen its security measures to prevent such incidents from happening in the future.

  1. Okta has reoriented its focus to prioritize cybersecurity, announcing numerous security enhancements to harden their corporate infrastructure and improve security controls, aiming to prevent customers from being easy targets for threat actors.
  2. As part of its recovery strategies, Okta is likely to have implemented measures such as zero-trust segmentation, ransomware-locked snapshots, and enhanced penetration testing to reduce credential-stuffing and lateral movement risks.
  3. Recognizing the importance of cybersecurity in today's technology-driven business environment, Okta plans to invest $50 million over the next five years in a fund aimed at addressing cybersecurity challenges outside the company.

Read also:

    Latest