Blog | G5 Cyber Security

Okta Breach Timeline, Attack Method Analyzed

Security researcher Bill Demirkapi says he has obtained copies of a Mandiant security report detailing the Sitel/Sykes breach timeline and the methodology of the Lapsus$ group. Sitel, a third-party customer support firm, says it is “no longer a security risk” and refutes some of the claims made by security researchers. The report, allegedly produced by cybersecurity firm Mandiant, offers a step-by-step account of how the threat group gained access to the identity management company’s environment.”]

Source: https://www.cuinfosecurity.com/okta-breach-timeline-attack-method-analyzed-a-18802

Exit mobile version