Alerts
Events
DCR
Explore Cyware Products
Alerts
Events
DCR
Go to listing page
Okta Post-Exploitation Method Exposes User Passwords
Malware and Vulnerabilities
March 27, 2023
Dark Reading
Researchers from Mitiga discovered that the IAM system saves Okta user passwords to audit logs if a user accidentally types them in the "username" field when logging in, thereby allowing threat actors with access to a company system to harvest them.
Read More
Okta
Post-Exploitation Attack Method
cleartext passwords
audit logs
Enterprise systems
Publisher
Previous
Kids tech camp iD Tech still silent weeks after data br ...
Breaches and Incidents
Next
MITRE Rolls Out Supply Chain Security Prototype
Security Tips and Advice