Lapsus$

The Lapsus$ cluster has, through the past two months, compromised a sequence of major technology firms — NVIDIA in late February, Samsung in early March, Vodafone in mid-March, Microsoft on the 21st-22nd of March, Okta on the 22nd of March (where the compromise was actually executed in mid-January through an Okta support contractor) — and has been publicising the compromises through their Telegram channel (Microsoft on Lapsus$ / DEV-0537, March 22). The cluster's operational pattern is distinctive in ways that have produced substantial security-research-community discussion this week.

The operator profile. The cluster is, on the public investigation, principally composed of young individuals based in the UK and Brazil, operating without the apparent state-actor sponsorship or organised-crime structure that characterises most major operator clusters. The operational tradecraft is, in some respects, less sophisticated than the Russian-and-Chinese state-actor clusters and the major ransomware operators — the operational-security mistakes that have led to the City of London Police arrests in late March are evidence of that — but the social-engineering capability has been remarkably effective. The cluster has used SIM-swap attacks against employees and contractors at target organisations, has paid third-party insiders for credential access, and has executed multi-step social-engineering campaigns that exploit employee help-desk processes to gain credentialled access. The combination of unsophisticated tradecraft on the technical side and effective social-engineering on the human side has produced operational outcomes that are, in scale, comparable to substantially more sophisticated operator clusters.

The Okta compromise is the part of the campaign that has the wider operational implications. Okta is a substantial identity-management platform used by many enterprise customers including a substantial fraction of major cloud-native organisations. The Lapsus$ access to an Okta support contractor's environment — gained in mid-January and persisting until March's disclosure — produced potential exposure across Okta's customer base. The actual customer-impact has, on Okta's subsequent investigation, been limited to approximately 366 customer organisations whose support cases the contractor had access to during the exposure window, with the actual data-impact being limited to support-related metadata rather than direct authentication credential access. The operational lessons, however, are substantial — the customer-organisation trust model for identity-management vendors must incorporate vendor-side support-chain risk as a substantive concern.

For the customer-portfolio response. The audit cycle this week has covered customer-organisation Okta deployments (we have three customers using Okta — Browne Jacobson, the financial-services firm, and one of the EmilyAI commercial customers). The customer-side action has been credential-rotation across affected accounts, session-revocation for any sessions originating from the exposure window, and review of the Okta administrative-tool access patterns during the relevant period. The customer-organisation conversations have included the broader vendor-side support-chain risk question, which is now a substantive theme.

The wider strategic point about Lapsus$ specifically is that the operator-cluster ecology is more diverse than the post-2018 customer-organisation conversations had typically envisaged. The state-actor clusters and the major ransomware-as-a-service operators are the most prominent categories, but the smaller, less-organised, social-engineering-centric operator clusters can produce operationally consequential outcomes against substantial enterprise targets, and the customer-organisation defensive posture has to address the full range of operator types rather than the highest-profile categories only.

The arrests in late March of seven individuals connected to the Lapsus$ activity (City of London Police statement, March 24) have produced an apparent disruption to the cluster's operations, but the residual capability and the possibility of restart are non-trivial. The post-arrest operational picture will firm up over the coming months.

I will return to this. The Lapsus$ case is an interesting departure from the usual operator-profile pattern and the lessons are still settling.


Back to all writing