Migliaccio & Rathod is currently investigating identity and authentication management provider Okta, for its alleged failure to protect sensitive customer data in the wake of a massive data breach on October 2, 2023 that Okta first disclosed on October 19, 2023. At this time, Okta has reported that a threat actor “leveraged access to a stolen credential to access Okta’s support case management system” and that they were “able to view files uploaded by certain Okta customers as part of recent support cases”. Okta also stated that the files could “contain sensitive data, including cookies and session tokens, that malicious actors can use to impersonate valid users”.
Customers of Okta notified Okta about their detection of a potential breach, but Okta did not acknowledge or confirm concerns for a significant amount of time. Due to the lapse in time between the data breach and Okta’s notice to affected customers, hackers may have already been able to acquire customer information and fraudulently misuse it. Victims of data theft in other similar data breaches have previously been forced to spend money on credit monitoring services or otherwise resolve the negative impact of identity theft or fraud on their personal finances. Some individuals affected by the Okta data breach may have already noticed one or more of the following types of fraudulent activity related to the loss of their personal information from Okta systems: suspicious credit card charges, unauthorized account usage, or phishing attacks that target a user’s personal and/or business finances.
Are you a current or former Okta user?
If so, we would like to hear from you. Please complete the contact form on this page, send us an email at [email protected], or give us a call at (202) 470-3520 for a free consultation.
The lawyers at Migliaccio & Rathod LLP have years of experience in class action litigation against large corporations, including in cases involving data breaches. More information about our current cases and investigations is available on our blog.