Company Details
okta
3
0
54131
okta.com.de
0
OKT_8655135
In-progress


okta Company CyberSecurity Posture
okta.com.deokta ist ein Unternehmen, dass sich auf New Urbansim und Stadtforschung spezialisiert. Existierende Stadtstrukturen werden analysiert und in der Planung angewendet.
Company Details
okta
3
0
54131
okta.com.de
0
OKT_8655135
In-progress
Between 750 and 799

okta Global Score (TPRM)XXXX

Description: ShinyHunters Gang Behind Vishing Attacks Targeting SSO Accounts at Okta, Microsoft, and Google The extortion group ShinyHunters has claimed responsibility for a series of voice phishing (vishing) attacks targeting single sign-on (SSO) accounts at Okta, Microsoft Entra, and Google, enabling threat actors to breach corporate SaaS platforms and steal data for extortion. In these attacks, cybercriminals impersonate IT support staff, calling employees and tricking them into entering credentials and multi-factor authentication (MFA) codes on phishing sites mimicking legitimate login portals. Once compromised, the attackers gain access to the victim’s SSO account, which often serves as a gateway to connected enterprise applications, including Salesforce, Microsoft 365, Google Workspace, Dropbox, Slack, and Atlassian. The phishing kits used in these attacks feature real-time control panels, allowing attackers to dynamically adjust phishing pages during calls prompting victims to approve MFA requests or enter one-time codes as needed. Okta confirmed the use of such kits in a recent report, though it declined to comment on the breaches themselves. ShinyHunters told BleepingComputer that it is behind some of the attacks, with Salesforce as its primary target, though other platforms are also exploited. The group leverages stolen employee data including phone numbers, job titles, and names from previous breaches to make social engineering calls more convincing. Recent victims listed on ShinyHunters’ Tor data leak site include SoundCloud, Betterment, and Crunchbase. While SoundCloud and Betterment had previously disclosed breaches, Crunchbase confirmed a new incident involving data exfiltration from its corporate network, though no operational disruptions occurred. The company has engaged cybersecurity experts and law enforcement. Microsoft and Google have not reported evidence of their products being abused in the campaign, with Google stating it has no indication its systems were affected. ShinyHunters disputed Okta’s attribution of a specific phishing kit, claiming its infrastructure was built in-house.


okta has 66.67% fewer incidents than the average of same-industry companies with at least one recorded incident.
okta has 28.57% fewer incidents than the average of all companies with at least one recorded incident.
okta reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
okta cyber incidents detection timeline including parent company and subsidiaries

okta ist ein Unternehmen, dass sich auf New Urbansim und Stadtforschung spezialisiert. Existierende Stadtstrukturen werden analysiert und in der Planung angewendet.


China State Construction Engineering Corporation Ltd (in short: China Construction; Stock code: 601668), formally established on December 10, 2007, was co-initiated by four Fortune Global 500 enterprises: China State Construction Engineering Corp. (CSCEC), China National Petroleum Corporation (CNPC)
.png)
Okta is warning about custom phishing kits built specifically for voice-based social engineering (vishing) attacks.
Cybersecurity and compliance company Proofpoint has brought on former Okta senior strategic alliance manager Johann Ramchandra to lead its...
As previously reported, Stephens upgraded Okta (OKTA) to Overweight from Equal Weight with a price target of $120, up from $97,...
If you are wondering whether Okta's share price reflects its true worth today, you are not alone. This article will help you frame that...
Identity and endpoint security are converging in 2026, and its reshaping the cybersecurity sector; this article provides an outlook for...
Okta Investment Narrative Recap. To own Okta, you need to believe identity will remain central to securing cloud and AI workloads, and that an...
They're certainly some kind of cybercrime organization or fraud organization that is doing this at scale,” says Okta Threat Intelligence VP...
Okta, Inc. (Nasdaq: OKTA), the leading independent identity partner, today announced the appointment of Rob Bernshteyn and Paul Sagan to the...
Okta (OKTA) shares rose 1.5% in premarket trading on Tuesday as Jefferies upgraded the identity access management firm to Buy.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of okta is https://http://okta.com.de.
According to Rankiteo, okta’s AI-generated cybersecurity score is 775, reflecting their Fair security posture.
According to Rankiteo, okta currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, okta has been affected by a supply chain cyber incident involving okta, with the incident ID OKTSALGOO1769222214.
According to Rankiteo, okta is not certified under SOC 2 Type 1.
According to Rankiteo, okta does not hold a SOC 2 Type 2 certification.
According to Rankiteo, okta is not listed as GDPR compliant.
According to Rankiteo, okta does not currently maintain PCI DSS compliance.
According to Rankiteo, okta is not compliant with HIPAA regulations.
According to Rankiteo,okta is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
okta operates primarily in the Architecture and Planning industry.
okta employs approximately 3 people worldwide.
okta presently has no subsidiaries across any sectors.
okta’s official LinkedIn profile has approximately 0 followers.
okta is classified under the NAICS code 54131, which corresponds to Architectural Services.
No, okta does not have a profile on Crunchbase.
Yes, okta maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/okta.
As of January 25, 2026, Rankiteo reports that okta has experienced 1 cybersecurity incidents.
okta has an estimated 9,922 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with cybersecurity experts engaged (crunchbase), and law enforcement notified with yes (crunchbase)..
Title: ShinyHunters Gang Behind Vishing Attacks Targeting SSO Accounts at Okta, Microsoft, and Google
Description: The extortion group ShinyHunters has claimed responsibility for a series of voice phishing (vishing) attacks targeting single sign-on (SSO) accounts at Okta, Microsoft Entra, and Google, enabling threat actors to breach corporate SaaS platforms and steal data for extortion. Attackers impersonate IT support staff to trick employees into entering credentials and MFA codes on phishing sites, gaining access to SSO accounts and connected enterprise applications like Salesforce, Microsoft 365, Google Workspace, Dropbox, Slack, and Atlassian.
Type: Vishing (Voice Phishing)
Attack Vector: Social Engineering (Impersonation of IT support staff), Phishing Sites
Vulnerability Exploited: Multi-factor Authentication (MFA) Bypass, Credential Theft
Threat Actor: ShinyHunters
Motivation: Extortion, Data Theft
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Vishing calls and Phishing sites.

Data Compromised: Corporate data, Employee credentials, MFA codes
Systems Affected: SSO AccountsSaaS Platforms (Salesforce, Microsoft 365, Google Workspace, Dropbox, Slack, Atlassian)
Operational Impact: Data exfiltration, Unauthorized access to corporate networks
Brand Reputation Impact: Potential reputational damage due to data breaches
Identity Theft Risk: High (stolen employee and customer data)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Employee Credentials, Mfa Codes, Corporate Data and .

Entity Name: SoundCloud
Entity Type: Company
Industry: Music Streaming

Entity Name: Betterment
Entity Type: Company
Industry: Financial Services

Entity Name: Crunchbase
Entity Type: Company
Industry: Business Information

Entity Name: Okta
Entity Type: Company
Industry: Identity and Access Management

Entity Name: Microsoft
Entity Type: Company
Industry: Technology

Entity Name: Google
Entity Type: Company
Industry: Technology

Third Party Assistance: Cybersecurity experts engaged (Crunchbase)
Law Enforcement Notified: Yes (Crunchbase)
Third-Party Assistance: The company involves third-party assistance in incident response through Cybersecurity experts engaged (Crunchbase).

Type of Data Compromised: Employee credentials, Mfa codes, Corporate data
Sensitivity of Data: High (Personally Identifiable Information, Corporate Data)
Data Exfiltration: Yes
Personally Identifiable Information: Employee data (phone numbers, job titles, names)

Source: BleepingComputer

Source: Okta Report

Source: Crunchbase Statement
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: BleepingComputer, and Source: Okta Report, and Source: Crunchbase Statement.

Investigation Status: Ongoing

Entry Point: Vishing calls, Phishing sites
High Value Targets: Salesforce, Microsoft 365, Google Workspace,
Data Sold on Dark Web: Salesforce, Microsoft 365, Google Workspace,

Root Causes: Social engineering, MFA bypass, Credential theft
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Cybersecurity experts engaged (Crunchbase).
Last Attacking Group: The attacking group in the last incident was an ShinyHunters.
Most Significant Data Compromised: The most significant data compromised in an incident were Corporate data, Employee credentials and MFA codes.
Most Significant System Affected: The most significant system affected in an incident were SSO AccountsSaaS Platforms (Salesforce, Microsoft 365, Google Workspace, Dropbox, Slack, Atlassian).
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Cybersecurity experts engaged (Crunchbase).
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Corporate data, Employee credentials and MFA codes.
Most Recent Source: The most recent source of information about an incident are Crunchbase Statement, BleepingComputer and Okta Report.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Vishing calls and Phishing sites.
.png)
Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.
A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.
A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.
A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.
An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.