HONG KONG— Okta Inc., OKTA -9.78% one of the world’s leading providers of digital identity verification, said that a January data breach revealed by hackers this week may have affected hundreds of customers that rely on its software to manage secure access to their internal computer networks.

Okta said the attack had affected as many as 366 customers, or 2.5% of the more than 15,000 businesses and institutions it services world-wide. The breach, claimed by the Lapsus$ group, originated from the laptop of an engineer employed by a subcontractor, which the hackers had access to between Jan. 16 and 21, Okta said Tuesday.

Okta said it had contacted customers that were potentially affected. Shares of Okta fell 9.2% to $151.12 in morning trading.

Reports of the breach emerged earlier this week after Lapsus$ posted screenshots that appeared to be of Okta internal systems to its Telegram social-media account. The group said its primary target wasn’t Okta but its customers.

Okta said in separate statements on Tuesday that the screenshots were from a computer used by a customer-support engineer from a unit of a subcontractor, Miami-based Sitel Group. Taking control of the computer effectively gave the hackers the same level of access as the engineer, according to Okta.

Support engineers can access only limited data and while they can help reset passwords and multifactor authentication factors, they can’t see the passwords themselves, Okta said. The engineer didn’t have “godlike access,” and had no power to create or delete user accounts, download customer databases or access source code repositories, it said.

“The scenario here is analogous to walking away from your computer at a coffee shop, whereby a stranger has (virtually in this case) sat down at your machine and is using the mouse and keyboard.”

Okta said it notified Sitel of the breach in late January, and Sitel hired an outside forensic firm to investigate. The full results of the investigation were shared with Okta on Tuesday, it said, expressing disappointment at the time taken to issue the results.

The unit of Sitel where the breach took place, Tampa, Fla.-based Sykes Enterprises Inc., said it took swift action to contain the incident after learning of the hack. “Following completion of the initial investigation, working in partnership with the worldwide cybersecurity leader, we continue to investigate and assess potential security risks to both our infrastructure and to the brands we support around the globe,” the company Sykes said in a statement Tuesday.

‘The scenario here is analogous to walking away from your computer at a coffee shop, whereby a stranger has (virtually in this case) sat down at your machine and is using the mouse and keyboard.’

— Okta

In a follow-up Telegram post, Lapsus$ disputed some of Okta’s findings. It denied that it compromised a laptop and said support engineers have more-extensive access than Okta suggested, including to internal communications. It also took issue with Okta’s assertion that the impact of the breach on customers was limited. The ability to reset passwords and multifactor authentication factors “would result in complete compromise of many clients’ systems,” Lapsus$ said.

When asked about the hackers’ claims, an Okta spokeswoman referred to the company’s earlier statement describing the limitations of the breach.

In a blog post on Tuesday, Microsoft Corp. confirmed it had been hacked by the group, and that for weeks had been tracking what it described as a large-scale campaign by Lapsus$ against multiple organizations. It described the group as often acting openly and not trying to cover its tracks, using extortion and destruction of data.

After gaining access to an organization, the group has been known to listen in on crisis communication calls and internal messaging forums, Microsoft said.

The group—which communicates in Portuguese and broken English on Telegram—cut its teeth with attacks in Brazil, Portugal and the U.K. before expanding to target some of the world’s biggest and most prestigious companies. In recent weeks, Lapsus$ has taken credit for hacks on Apple Inc., Samsung Electronics Co. and Nvidia Corp.

It also has taken over individual accounts at cryptocurrency exchanges and drained users’ holdings.

Write to Dan Strumpf at [email protected]

Copyright ©2022 Dow Jones & Company, Inc. All Rights Reserved. 87990cbe856818d5eddac44c7b1cdeb8

This post first appeared on wsj.com

You May Also Like

Why Rain Is Getting Fiercer on a Warming Planet

One of the weirder side effects of climate change is what it’s…

GTA update time for Criminal Enterprises: What time is the GTA update?

THE next big GTA Online update is just a couple of hours…

Elon Musk Says a Cheaper Tesla Model Is Coming in 2025 as Chinese Competition Intensifies

A cheaper model of Tesla electric vehicle is coming late next year,…

What to Do With Old Phones, Cameras, Laptops, and Tablets

Electronic waste is a huge problem, one that’s getting worse: We’re now…