Skip to main content
NewsOct 19, 20232 min read

Okta Support System Breach: Customer Data and HAR Files Exposed

Okta disclosed unauthorized access to its customer support system exposing support case data and HAR files. Here is what that means for affected organizations and practical steps to respond.

By 3SN Editorial
#Okta#Data Breach#Identity#Support Systems#Incident Response
Okta Support System Breach: Customer Data and HAR Files Exposed
Identity & Access
Oct 19, 20233SN Newsroom

Okta Support System Breach: Customer Data and HAR Files Exposed

Okta disclosed unauthorized access to its customer support system exposing support case data and HAR files. Here is what that means for affected organizations and practical steps to respond.

Okta Support System Breach: Customer Data and HAR Files Exposed

TL;DR

  • Okta disclosed that an attacker gained unauthorized access to its customer support system using stolen credentials.
  • The breach exposed customer support case data and HAR files containing session tokens from approximately 134 customers.
  • Organizations should audit session tokens, rotate credentials for affected users, and review recent access logs for anomalies.

The short version

Okta disclosed a security incident where attackers accessed its customer support system using stolen credentials. The breach exposed support case data and HAR files containing session tokens for approximately 134 customers. While the number seems small, the impact for affected organizations is significant because session tokens can be replayed to gain unauthorized access without needing passwords.

This incident serves as a reminder that support infrastructure often holds sensitive diagnostic data that users willingly share during troubleshooting. Organizations must treat vendor support channels as part of their attack surface and establish clear protocols for sanitizing sensitive data before sharing it externally.

Why this matters beyond a single product

Identity providers sit at the center of modern security architectures. When Okta experiences a breach, even one limited to support systems, the ripple effects extend to every organization relying on that identity infrastructure. This incident highlights a broader pattern: attackers increasingly target the support and administrative layers that organizations assume are trusted internal systems.

The exposure of HAR files is particularly concerning because these files often contain authentication artifacts that users do not realize are sensitive. Many IT administrators upload HAR files during troubleshooting without understanding the security implications. This creates a hidden risk surface that persists long after the original incident is resolved.

Practical next steps for teams

Start by identifying any support cases your organization opened with Okta during the breach window. If you shared HAR files or diagnostic data, treat those artifacts as potentially compromised. Invalidate any session tokens that could have been captured and rotate credentials for affected accounts. Review access logs for unauthorized activity using potentially compromised tokens.

Going forward, establish internal guidelines for sanitizing diagnostic data before sharing it with vendors. Remove cookies, authorization headers, and session tokens from HAR files. Consider using vendor provided tools that automatically redact sensitive data. If you only have time for one action today, audit your recent support interactions with Okta and invalidate any potentially exposed sessions.

3SN perspective

Security is only as strong as the weakest link in the chain. Support systems, diagnostic workflows, and vendor interactions are often that weak link. We believe organizations need security practices that extend beyond their direct control to include how they interact with critical vendors. That means clear protocols, better tooling for data sanitization, and a mindset that treats every data handoff as a potential exposure point.

What happened

Okta disclosed that an attacker accessed its customer support system using stolen service account credentials. The intruder gained access to customer support case data and HTTP Archive files containing session tokens for approximately 134 Okta customers. This is separate from a later breach attributed to the Lapsus$ group that affected all Okta customer support system users.

Who’s affected

Organizations with support cases opened with Okta during the affected period should assume potential exposure. The 134 customers whose HAR files were accessed face the highest risk, as session tokens in those files could be used to impersonate users.

What to do now

  1. Audit and invalidate any session tokens that may have been captured in HAR files shared with Okta support.
  2. Rotate credentials for any accounts that had support cases opened during the breach window.
  3. Review access logs for unauthorized activity using potentially compromised session tokens.

Technical analysis

Mitigations & recommendations

critical

Invalidate exposed session tokens immediately

Force logout of all active sessions for potentially affected accounts and invalidate any tokens that may have been captured in HAR files.

high

Rotate credentials for affected accounts

Change passwords and API keys for any accounts tied to support cases during the breach window, prioritizing admin and privileged accounts.

high

Review access logs for anomalies

Hunt for unusual login patterns, unexpected geolocations, or access to sensitive resources using potentially compromised tokens.

medium

Sanitize diagnostic data before sharing

Establish procedures to redact sensitive tokens and credentials from HAR files and logs before sending them to vendors for troubleshooting.