{"id":3679,"date":"2022-12-22T14:47:35","date_gmt":"2022-12-22T14:47:35","guid":{"rendered":"https:\/\/gitprotect.io\/blog\/?p=3679"},"modified":"2024-03-08T11:59:59","modified_gmt":"2024-03-08T11:59:59","slug":"okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable","status":"publish","type":"post","link":"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/","title":{"rendered":"Okta suffers a hacker attack on GitHub repositories. Was it predictable?"},"content":{"rendered":"\n<p>In December a leading provider of authentication services and Identity and Access Management (IAM) tools, Okta, reported a hacker attack on their private GitHub repositories. In this article, we will provide a step-by-step explanation of what has happened, what impact it could have on their users, and what other threat incidents preceded this hacker attack.<\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\">What has happened?&nbsp;&nbsp;<\/h2>\n\n\n\n<p>According to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/oktas-source-code-stolen-after-github-repositories-hacked\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a>, and their \u201cconfidential\u201d resources, Okta\u2019s source code has been stolen by malicious actors earlier this month. It concerns Okta Workforce Identity Cloud (WIC) code repositories. However, the attackers failed to get authorized access to the entire Okta service and their customer data because the company follows strict security means and doesn\u2019t rely on its source code confidentiality. Thus, Okta\u2019s HIPAA, FedRAMP or DoD customers can stay calm\u2026 or not? Let us remind you that among Okta\u2019s customers there are such \u2018behemoths\u2019 as FedEx, T-Mobile, Subaru, Pfizer, Mazda, Rakuten, and other famous brands.<\/p>\n\n\n\n<p>Here is what Okta\u2019s CSO, David Bradbury, wrote in the email to the company\u2019s \u2018security contacts,\u2019 including IT admins: \u201cNo customer actions are required and the Okta service remains fully operational and secure.\u201d&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Was this source code theft predictable?&nbsp;<\/h2>\n\n\n\n<p>Were there any suspicious \u2018bells\u2019 to this incident? Definitely\u2026 Earlier in December GitHub notified Okta about some suspicious activity in Okta\u2019s code repositories. The company\u2019s security team investigated the received notification from the Cloud service provider and made a conclusion \u201cthat such access was used to copy Okta code repositories\u201d &#8211; as stated in the email.&nbsp;<\/p>\n\n\n\n<p>Once the Okta team found out about \u2018possible suspicious access\u2019 to their GitHub repositories, they immediately issued temporary access restrictions to their repos and postponed possible integrations between their GitHub environment and any third-party apps. Moreover, to be sure that threat couldn\u2019t access the company or its customers\u2019 data using \u201cthis\u201d source code, Okta took the following measures:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>reviewed the recent access to Okta GitHub software repos<\/li>\n\n\n\n<li>checked all the latest commits to the company\u2019s GitHub software repositories<\/li>\n\n\n\n<li>rotated GitHub credentials.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Okta security incidents: step-by-step overview<\/h2>\n\n\n\n<p>The year 2022 was a tough time when it comes to security incidents, and Okta is not an exception. The company suffered a few hacker attacks or failures. Let\u2019s look at them in more detail.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">January\/March 2022 &#8211; Lapsus$ hackers\u2019 attack<\/h3>\n\n\n\n<p>On April, 19th, David Bradbury, a CSO at Okta, made an <a href=\"https:\/\/www.okta.com\/blog\/2022\/04\/okta-concludes-its-investigation-into-the-january-2022-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">advisory<\/a> that in January they experienced a hacker attack that potentially impacted 366 Okta customers, yet later after a precise investigation of five-window of time, the company assumed that \u201cimpact of the incident was significantly less than the maximum potential impact\u201d and lasted for \u201c25 consecutive minutes.\u201d&nbsp;<\/p>\n\n\n\n<p>As it turned out during the investigation, on January 21st Lapsus$ hacking group managed to gain unauthorized remote access to a Sitel support engineer\u2019s workstation. The threat actor was unable to perform any modifications to MFA or password resets and failed to access directly to any Okta accounts. However, the malicious group succeeded in accessing two active customer tenants within the SuperUser app. Moreover, the hacker group managed to view \u201climited additional information in certain other applications like Slack and Jira\u201d (So, let\u2019s not forget about <a href=\"https:\/\/gitprotect.io\/blog\/why-backup-jira-is-there-any-risk-of-data-loss\/\" target=\"_blank\" rel=\"noreferrer noopener\">Jira backup<\/a>).&nbsp;<\/p>\n\n\n\n<p>Well, the incident happened in January, why have we mentioned March in the heading? Because in March Lapsus$, a data extortion group, in their Telegram channel posted some screenshots with the catchy statement \u201cof what it alleges to be access to Okta\u2019s backed administrative console and customer data\u201d (according to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/okta-investigating-claims-of-customer-data-breach-from-lapsus-group\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a>). After that incident, Okta started investigating the issue assuming that the hacker attack happened two months earlier.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">September 2022 &#8211; threat actor\u2019s attack on Okta subsidiary Auth0&nbsp;<\/h3>\n\n\n\n<p>Auth0 is an authentication platform owned by Okta which is used by over 2,000 enterprises to authenticate more than 42 million logins every day. The situation which happened to this service is a little bit similar to the recent one &#8211; some third-party threat actors could gain access to Auth0 source code repositories. Though, their motives were unknown. Let\u2019s mention that the hostile actors gained access to multiple code repos from 2020 and earlier in the mentioned year. Okta found out about the incident via notification from some \u201cthird-party individual.\u201d<\/p>\n\n\n\n<p>The company immediately answered the threat and investigated the issue and even involved a third-party cyber security forensics firm, however, as they stated later: \u201cOur investigation has not revealed any customer impact from this event, and no actions are required by our customers&#8221;.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p style=\"font-size:22px\">Eliminate data loss risk and ensure business continuity with <strong>the first TRUE Disaster Recovery software for GitHub<\/strong>.  <\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-background wp-element-button\" href=\"https:\/\/gitprotect.io\/sign-up.html\" style=\"border-radius:50px;background-color:#ff0300\" target=\"_blank\" rel=\"noreferrer noopener\">Start 14 days free GitProtect trial<\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">How to limit such scenarios?&nbsp;<\/h2>\n\n\n\n<p>As a final takeaway from the incident, we can say that the security of GitHub repositories and metadata is a necessary measure for peace of mind. We can say for sure that it\u2019s important for every company that uses GitHub as a git hosting service to understand, weigh and foresee possible risks. Among those dangers, we can name data breaches, hacker attacks, and human errors. Thus, companies should build a relevant security strategy, which can not exist without a proper <a href=\"https:\/\/gitprotect.io\/github.html\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub backup<\/a> and Disaster recovery software. Backup as a final line of data protection against <a href=\"https:\/\/gitprotect.io\/use-cases\/ransomware.html\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware<\/a> and other possible risks ensures organizations with disaster recovery technologies to instantly restore source code from any point in time and guarantee workflow and business continuity. It also significantly reduces the costs associated with business downtime and ransom payment. In addition, such a solution is a requirement of many certification processes (SOC 2 or ISO 27001) and the Shared Responsibility Model so it\u2019s recommended to have by GitHub itself.<\/p>\n\n\n\n<p><em>In Okta&#8217;s scenario, attackers gained access to their repositories and stole their source codes. Such attacks are a real danger to any repositories. Attackers might also remove\/wipe\/erase repositories they accessed, and there is no other safeguard than reliable GitHub backup<\/em> &#8211; said Greg Bak, Product Development Manager at GitProtect.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Security helps to create a healthy environment where your DevOps can build with peace of mind without interruption. Is it possible to avoid attacks as they happened to Okta? Unfortunately, nope\u2026 The threat actors for years have been using vulnerabilities to modify, demand a ransom, and steal and sell data on the darknet.<\/p>\n\n\n\n<p>The most important is what security strategy the enterprise has, and what measures it takes to eliminate the risks.&nbsp;<\/p>\n\n\n\n<p>So, do you still think that you don\u2019t need backup software in place to protect your GitHub repositories and metadata? Try to change your mind and <a href=\"https:\/\/gitprotect.io\/sign-up.html\" target=\"_blank\" rel=\"noreferrer noopener\">sign up for a 14-day free trial<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In December a leading provider of authentication services and Identity and Access Management (IAM) tools, Okta, reported a hacker attack on their private GitHub repositories. In this article, we will provide a step-by-step explanation of what has happened, what impact it could have on their users, and what other threat incidents preceded this hacker attack.<\/p>\n","protected":false},"author":8,"featured_media":3681,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-3679","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-github","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Okta suffers a hacker attack on GitHub repositories. Was it predictable? - Blog | GitProtect.io<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Okta suffers a hacker attack on GitHub repositories. Was it predictable? - Blog | GitProtect.io\" \/>\n<meta property=\"og:description\" content=\"In December a leading provider of authentication services and Identity and Access Management (IAM) tools, Okta, reported a hacker attack on their private GitHub repositories. In this article, we will provide a step-by-step explanation of what has happened, what impact it could have on their users, and what other threat incidents preceded this hacker attack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog | GitProtect.io\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-22T14:47:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-08T11:59:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2022\/12\/okta1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Daria Kulikova, Content Writer at GitProtect.io\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@GitProtectio\" \/>\n<meta name=\"twitter:site\" content=\"@GitProtectio\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Daria Kulikova, Content Writer at GitProtect.io\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/\"},\"author\":{\"name\":\"Daria Kulikova, Content Writer at GitProtect.io\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/6618fde5a7cf7e327fefa4f0035466d3\"},\"headline\":\"Okta suffers a hacker attack on GitHub repositories. Was it predictable?\",\"datePublished\":\"2022-12-22T14:47:35+00:00\",\"dateModified\":\"2024-03-08T11:59:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/\"},\"wordCount\":1118,\"publisher\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2022\/12\/okta1.jpg\",\"articleSection\":[\"GitHub\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/\",\"name\":\"Okta suffers a hacker attack on GitHub repositories. Was it predictable? - Blog | GitProtect.io\",\"isPartOf\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2022\/12\/okta1.jpg\",\"datePublished\":\"2022-12-22T14:47:35+00:00\",\"dateModified\":\"2024-03-08T11:59:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/#primaryimage\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2022\/12\/okta1.jpg\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2022\/12\/okta1.jpg\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/gitprotect.io\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Okta suffers a hacker attack on GitHub repositories. Was it predictable?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#website\",\"url\":\"https:\/\/gitprotect.io\/blog\/\",\"name\":\"GitProtect.io Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gitprotect.io\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\",\"name\":\"GitProtect.io\",\"url\":\"https:\/\/gitprotect.io\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png\",\"width\":528,\"height\":528,\"caption\":\"GitProtect.io\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/XoperoSoftware\/\",\"https:\/\/x.com\/GitProtectio\",\"https:\/\/www.linkedin.com\/company\/xopero-software\/\",\"https:\/\/www.youtube.com\/channel\/UCiEnl6n0mIO6w7twccz-l2w\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/6618fde5a7cf7e327fefa4f0035466d3\",\"name\":\"Daria Kulikova, Content Writer at GitProtect.io\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/09\/daria-kulikova-content-writer-at-gitprotect.io_avatar-96x96.jpg\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/09\/daria-kulikova-content-writer-at-gitprotect.io_avatar-96x96.jpg\",\"caption\":\"Daria Kulikova, Content Writer at GitProtect.io\"},\"description\":\"Daria is a Content Specialist at GitProtect.io, who has a degree in linguistics and an extensive translation background in different areas, including technology, IT, economics, etc. She loves self-improvement, so when she is offline, it\u2019s easy to find her learning and expanding her knowledge in Cybersecurity, and DevSecOps.\",\"url\":\"https:\/\/gitprotect.io\/blog\/author\/daria-kulikova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Okta suffers a hacker attack on GitHub repositories. Was it predictable? - Blog | GitProtect.io","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/","og_locale":"en_US","og_type":"article","og_title":"Okta suffers a hacker attack on GitHub repositories. Was it predictable? - Blog | GitProtect.io","og_description":"In December a leading provider of authentication services and Identity and Access Management (IAM) tools, Okta, reported a hacker attack on their private GitHub repositories. In this article, we will provide a step-by-step explanation of what has happened, what impact it could have on their users, and what other threat incidents preceded this hacker attack.","og_url":"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/","og_site_name":"Blog | GitProtect.io","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2022-12-22T14:47:35+00:00","article_modified_time":"2024-03-08T11:59:59+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2022\/12\/okta1.jpg","type":"image\/jpeg"}],"author":"Daria Kulikova, Content Writer at GitProtect.io","twitter_card":"summary_large_image","twitter_creator":"@GitProtectio","twitter_site":"@GitProtectio","twitter_misc":{"Written by":"Daria Kulikova, Content Writer at GitProtect.io","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/#article","isPartOf":{"@id":"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/"},"author":{"name":"Daria Kulikova, Content Writer at GitProtect.io","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/6618fde5a7cf7e327fefa4f0035466d3"},"headline":"Okta suffers a hacker attack on GitHub repositories. Was it predictable?","datePublished":"2022-12-22T14:47:35+00:00","dateModified":"2024-03-08T11:59:59+00:00","mainEntityOfPage":{"@id":"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/"},"wordCount":1118,"publisher":{"@id":"https:\/\/gitprotect.io\/blog\/#organization"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/#primaryimage"},"thumbnailUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2022\/12\/okta1.jpg","articleSection":["GitHub"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/","url":"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/","name":"Okta suffers a hacker attack on GitHub repositories. Was it predictable? - Blog | GitProtect.io","isPartOf":{"@id":"https:\/\/gitprotect.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/#primaryimage"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/#primaryimage"},"thumbnailUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2022\/12\/okta1.jpg","datePublished":"2022-12-22T14:47:35+00:00","dateModified":"2024-03-08T11:59:59+00:00","breadcrumb":{"@id":"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/#primaryimage","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2022\/12\/okta1.jpg","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2022\/12\/okta1.jpg","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/gitprotect.io\/blog\/okta-suffers-a-hacker-attack-on-github-repositories-was-it-predictable\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/gitprotect.io\/blog\/"},{"@type":"ListItem","position":2,"name":"Okta suffers a hacker attack on GitHub repositories. Was it predictable?"}]},{"@type":"WebSite","@id":"https:\/\/gitprotect.io\/blog\/#website","url":"https:\/\/gitprotect.io\/blog\/","name":"GitProtect.io Blog","description":"","publisher":{"@id":"https:\/\/gitprotect.io\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gitprotect.io\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/gitprotect.io\/blog\/#organization","name":"GitProtect.io","url":"https:\/\/gitprotect.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png","width":528,"height":528,"caption":"GitProtect.io"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/GitProtectio","https:\/\/www.linkedin.com\/company\/xopero-software\/","https:\/\/www.youtube.com\/channel\/UCiEnl6n0mIO6w7twccz-l2w"]},{"@type":"Person","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/6618fde5a7cf7e327fefa4f0035466d3","name":"Daria Kulikova, Content Writer at GitProtect.io","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/image\/","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/09\/daria-kulikova-content-writer-at-gitprotect.io_avatar-96x96.jpg","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/09\/daria-kulikova-content-writer-at-gitprotect.io_avatar-96x96.jpg","caption":"Daria Kulikova, Content Writer at GitProtect.io"},"description":"Daria is a Content Specialist at GitProtect.io, who has a degree in linguistics and an extensive translation background in different areas, including technology, IT, economics, etc. She loves self-improvement, so when she is offline, it\u2019s easy to find her learning and expanding her knowledge in Cybersecurity, and DevSecOps.","url":"https:\/\/gitprotect.io\/blog\/author\/daria-kulikova\/"}]}},"_links":{"self":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/3679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/comments?post=3679"}],"version-history":[{"count":7,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/3679\/revisions"}],"predecessor-version":[{"id":5107,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/3679\/revisions\/5107"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/media\/3681"}],"wp:attachment":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/media?parent=3679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/categories?post=3679"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/tags?post=3679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}