Headlines

“Unveiling the Tentacles of the Elusive ‘0ktapus’ Threat Group: 130 Firms Victimized”

"Unveiling the Tentacles of the Elusive '0ktapus' Threat Group: 130 Firms Victimized"cybersecurity,threatgroup,0ktapus,victimized,firms
The tentacles of the 0ktapus threat group have victimized over 130 firms in a sophisticated phishing campaign that spoofed a multi-factor authentication system. The compromise resulted in 9,931 accounts being breached at these organizations, including targeted attacks on Twilio and Cloudflare employees. The phishing campaigns employed the abuse of identity and access management firm, Okta, which enabled the attackers to steal Okta identity credentials and multi-factor authentication (MFA) codes from users of the targeted firms. This was achieved via text messages sent to the victims’ mobile phones containing links to phishing sites that:

“mimicked the Okta authentication page of their organization.”

The campaign targeted 114 US-based firms, with additional victims in 68 other countries. Group-IB researchers have revealed that the campaign was “incredibly successful,” and the full scale of the compromise remains unknown.

The 0ktapus hackers are believed to have begun their campaign by targeting telecommunications companies, in hopes of winning access to potential targets’ phone numbers. Despite not knowing how 0ktapus attackers obtained a list of phone numbers used in MFA-related attacks, one theory proposes that they may have collected the numbers from their initial attacks on mobile operators and telecommunications firms.

The compromise began with the phishing links sent to targets via text messages that led them to webpages mimicking the Okta authentication page used by their employer. This targeted compromise of mostly software-as-a-service (SaaS) firms was phase-one in a multi-pronged attack. 0ktapus’ ultimate goal was to access company mailing lists or customer-facing systems to facilitate supply-chain attacks.

In a related incident in which DoorDash was the victim, Group-IB identified the hallmark signs of an 0ktapus-style attack. DoorDash revealed that the attackers compromised the vendor’s employees’ stolen credentials to gain unauthorized access to the company’s internal tools. They then stole personal information, including names, phone numbers, email and delivery addresses, from customers and delivery people. Group-IB reported that a total of 5,441 MFA codes had been compromised by the attackers.

The compromise of MFA codes highlights how attackers can overcome even the most secure barriers. This is another phishing attack demonstrating how easy it is for adversaries to bypass supposedly secure multifactor authentication, warns Roger Grimes, data-driven defense evangelist at KnowBe4. He emphasizes that much needs to be done to move users from easily phish-able passreplaces to more secure multifactor authentication. This involves investing resources, time, and money to get the benefits when implementing an MFA system. To reduce the risks of 0ktapus-type attacks, researchers recommend good hygiene around URLs and passwords and using FIDO2-compliant security keys for MFA.

In conclusion, this sophisticated phishing campaign demonstrates the increasing sophistication of hacking groups and their ability to breach almost any security barrier. The compromise of MFA systems is particularly worrisome, given their promotion as an effective cybersecurity measure to protect against unauthorized access. The focus on better cybersecurity education and training for the users of MFA systems may help organizations reduce the risks of these types of threats. However, MFA remains a critical cybersecurity measure, and stricter policies and procedures are needed to enhance its resilience against these sophisticated hacking attempts.

Cybersecuritycybersecurity,threatgroup,0ktapus,victimized,firms


"Unveiling the Tentacles of the Elusive
<< photo by George Becker >>

You might want to read !