Okta hackers

7 Suspected Okta Hackers Have Been Arrested By The London Police

Following an unprecedented cybercrime rampage over the previous month, seven teens suspected of being the Okta Hackers were detained in England. According to Bloomberg, cybersecurity specialists looking into the hacking organization Lapsus$ have linked the assaults to a 16-year-old boy who lives with his mother.

Over the last month, Okta hackers have piqued the interest of the security community by infiltrating four of the world’s most well-known corporate technology companies: Nvidia, Samsung, Microsoft, and Okta. Lapsus$ appears to be less financially driven than usual ransomware groups, encrypting victim networks only sometimes and frequently returning data before demanding payment.

Okta Hackers Are Part Of Lapsus$

Based on forensic evidence and publicly accessible information, four researchers investigating the hacking organization Lapsus$ on behalf of firms who were hacked think the Oxford, England teenager is the mastermind. The adolescent is suspected of being involved in several of Lapsus$’s largest hacks, although this hasn’t been proven convincingly.

According to one individual participating in the investigation, the kid is so proficient at hacking – and so quick – that the researcher originally mistook the behavior they were seeing for automated. Another member of Lapsus$ is said to be a Brazilian adolescent.

When Nvidia purportedly conducted a retaliatory strike against the Okta hackers in late February to prevent the dissemination of the chipmaker’s stolen data, Lapsus$ sprang onto the scene. According to Nvidia, Lapsus$ gained the company’s network credentials and obtained two-factor authentication capabilities and access to Nvidia’s network through fraud. After then, Lapsus$ exposed some confidential Nvidia material on the internet.

Lapsus$ claimed to have stolen Samsung’s source code and biometric unlocking algorithms for Galaxy smartphones earlier this month, exposing crucial hardware controls. The data breach contained 190 TB of Samsung data, including leaked source code for trusted applets, biometric unlock algorithms, bootloader source code for newer Samsung devices, and authentication codes.