Hackers Use Twilio’s Access To Steal OTPs From Okta Customers

August 29, 2022

The attackers behind the Twilio breach were able to use their access to steal one-time passwords sent via text message to customers of identity and access management company Okta.

At the time of the break-in, Twilio was providing one of the services that Okta offered to customers who chose SMS as a form of verification.

According to Okta, on August 8, the company learned that the Twilio hack revealed “unspecified data relevant to Okta” and started to route SMS-based communications through a different provider. After analyzing an internal system log from Twilio’s security team, Okta discovered that the threat actor had access to phone numbers and codes belonging to its customers.

Okta’s investigation revealed that the intruder did not use these mobile numbers, and the company has linked the attack to Scatter Swine, a phishing campaign that targets logins to gain access to corporate networks.

To mitigate Oktapus attacks, Okta advises users to pay more attention to suspicious emails and phishing sites, and to use Network Zones to deny or perform step-up authentication on requests from rarely used networks.

Other steps users can take include restricting access to applications to only registered devices or devices managed by endpoint management tools and restricting access to the most sensitive applications and data using application-specific authentication policies.

The sources for this piece include an article in BleepingComputer.

Top Stories

Related Articles

March 27, 2026 Microsoft is updating GitHub Copilot to train on real-world developer interactions, expanding beyond public code datasets to more...

March 23, 2026 David Shipley, co-host of Cybersecurity today is covering RSAC for Tech Newsday and Cybersecurity Today.  SAN FRANCISCO more...

March 23, 2026 The U.S. Federal Communications Commission has banned the import of all new foreign-made consumer routers following a more...

March 19, 2026 The FBI has gone back to purchasing commercially available data, including Americans’ location histories, to support federal more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn