Demo Request
Take a personalized product tour with a member of our team to see how we can help make your existing security teams and tools more effective within minutes.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Home
Blog

Securing Your Okta Environment After the HAR Breach: How SSPM Can Help

Gal Nakash
Updated
November 8, 2023
March 27, 2025
4 min read
Ready to Close the SaaS Security Gap?
Chat with us

A security breach reported by Okta in October of 2023 involved the theft of HAR files from its customer support system. Subsequently, attackers set their sights on Okta's customer base, aiming to compromise identity instances and associated applications. What were the techniques used by attackers in the Okta HAR breach and how can organizations detect session hijacking before it exposes data?

Overview of a HAR File

HAR, short for HTTP archive format, is used for tracking information between a web browser and a website. A HAR file keeps track of each resource loaded by the browser along with timing information for each resource.

These files, used for support session browser recordings, can include session cookies and tokens. In the instance of the recent Okta breach, the HAR file chronicled all traffic between the browser and Okta servers, encompassing sensitive session information such as session tokens and authentication cookies.

Hacking Techniques Used in the Okta HAR Breach

Attackers are leveraging the stolen HAR files to conduct session hijacks of Okta customers, exploiting session tokens that may not have been properly sanitized. This allows attackers to hijack authenticated support sessions within Okta. 

Additionally, many support personnel have elevated or administrative permissions, enabling the creation and modification of policies and policy rules within the Okta environment. The attack pattern often follows the following steps shown in the SaaS Matrix from the MITRE ATT&CK framework

Gain Unauthorized Access

  • The attacker used a session from one of the stolen HAR files to enter a customer's Okta tenant through the console or API and gain unauthorized access.

Enabling or Creating an Account

  • The attacker was able to maintain access to the files by activating an inactive user account and or by creating a new one. 

Manipulating MFA Settings

  • The attacker modified Multi-Factor Authentication (MFA) settings to add their own controlled tokens.They were able to maintain persistent access to the compromised accounts. 

Disabling MFA on Other Accounts

  • Subsequently, the attacker disabled MFA on other IT and security-related accounts. They were able to subvert security policies and preserve the life of the compromised credentials. 

How SaaS Security (SSPM) Can Help

In the wake of the Okta HAR breach and the subsequent wave of attacks, an enterprise SSPM platform plays a crucial role in securing your Okta environment. Here's how SSPM solutions can assist:

  • Continuous Monitoring - SSPM solutions proactively secure and continuously monitor your Okta instance's attack surface and security configurations.
  • Threat Detection - SSPM can alert you to specific threat events and anomalous activities within your Okta instance. This ensures that you are notified promptly in the event of any suspicious behavior.
  • Prioritized Alerts - Considering the tactics used by attackers in the Okta breach, here's a partial list of alerts and monitoring that a SSPM solution can provide out of the box to prevent takeovers of your Okta environment.

Conclusion

The Okta HAR breach serves as a stark reminder of the constant threat to SaaS applications. In this ever-evolving landscape, SSPM solutions are vital for proactively securing your Okta environment, detecting suspicious activities, and preventing unauthorized access and data breaches. Monitoring and alerting capabilities provided by SSPM enable organizations to protect their identities and data against emerging threats.

No items found.

Gal Nakash

ABOUT THE AUTHOR

Gal is the Cofounder & CPO of Reco. Gal is a former Lieutenant Colonel in the Israeli Prime Minister's Office. He is a tech enthusiast, with a background of Security Researcher and Hacker. Gal has led teams in multiple cybersecurity areas with an expertise in the human element.

Technical Review by:
Gal Nakash
Technical Review by:
Gal Nakash

Gal is the Cofounder & CPO of Reco. Gal is a former Lieutenant Colonel in the Israeli Prime Minister's Office. He is a tech enthusiast, with a background of Security Researcher and Hacker. Gal has led teams in multiple cybersecurity areas with an expertise in the human element.

Ready to Close the SaaS Security Gap?
Chat with us
Table of Contents
Get the Latest SaaS Security Insights
Subscribe to receive updates on the latest cyber security attacks and trends in SaaS Security.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Explore Related Posts

Malicious Extensions That Lock You Out While They Steal Your Session
Dr. Tal Shapira
Five malicious Chrome extensions disguised as enterprise productivity tools stole session tokens from Workday, NetSuite, and SuccessFactors while simultaneously blocking admins from revoking access or resetting credentials. The attack exposed a blind spot in SaaS security: the browser, where stolen session cookies render SSO and MFA irrelevant.
Why the Hidden Cost of AI Sprawl Is Rising in Modern Enterprises
Gal Nakash
AI adoption is accelerating across modern enterprises, but the rapid growth of AI tools and agents often introduces hidden operational and security risks. This article explores the hidden cost of AI sprawl, including duplicate tools, fragmented workflows, and expanding SaaS integrations. It also outlines practical frameworks and best practices that help organizations detect uncontrolled AI adoption and maintain visibility, governance, and security across enterprise environments.
Model Context Protocol (MCP) Is Rewiring SaaS Trust, One Agent Action at a Time
Gal Nakash
The Model Context Protocol (MCP) is an emerging standard that enables AI agents to seamlessly connect with SaaS tools and APIs, allowing them to perform actions like fetching files, updating records, and sending messages autonomously. However, this power introduces significant security risks, including identity drift, weak authentication, data leakage, and invisible access that bypasses traditional monitoring. Organizations can mitigate these risks by enforcing least-privilege OAuth scopes, using short-lived tokens, binding agents to human owners, and adopting platforms that provide continuous visibility into MCP-based trust paths.
See more featured resources

Ready for SaaS Security that can keep up?

Request a demo