Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

Auth0 Finds No Breach Following Source Code Compromise

Okta-owned Auth0 this week announced that it has not identified an intrusion into its environment after a third-party said they were in the possession of older source code repositories.

Okta-owned Auth0 this week announced that it has not identified an intrusion into its environment after a third-party said they were in the possession of older source code repositories.

In late August, after Okta was informed by an individual that they possessed copies of certain Auth0 code repositories dating from October 2020 and earlier, the company launched an investigation that did not reveal a potential data breach.

The investigation, the company says, “confirmed that there was no evidence of unauthorized access to our environments, or those of our customers, nor any evidence of any data exfiltration or persistent access”.

Auth0 notes that it also decided to retain a cybersecurity forensics firm to investigate the claim, and that both investigations have arrived at the same conclusion.

Furthermore, the company says that it has taken the necessary precautions to ensure that the exposed code cannot be used to access its network or any customer environments.

“Our investigation has not revealed any customer impact from this event, and no action is required by our customers. Additionally, we confirm that the Auth0 service remains fully operational and secure,” the company says.

It has not shared any information on how the source code may have been obtained.

Auth0 offers an authentication and authorization platform that provides organizations with various customization and monitoring options, and with support for multi-factor authentication.

Advertisement. Scroll to continue reading.

In May 2021, Okta completed a $6.5 billion acquisition of Auth0, which continues to operate as an independent business unit.

Related: Fast Company Hack Impacts Website, Apple News Account

Related: Data Breach at Australian Telecoms Firm Optus Could Impact Up to 10 Million Customers

Related: Breached American Airlines Email Accounts Abused for Phishing

Related: Samsung Sued Over Recent Data Breaches

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...