Valtik Studios
Back to blog
OktacriticalUpdated 2026-04-17orig. 2026-03-296 min

Okta Rate Limit Abuse in 2026: What Scattered Spider Is Doing Now

Scattered Spider evolved their Okta-targeted attacks after the 2023-2024 MGM and Caesars incidents. April 2026 intelligence shows the group hitting Okta tenants through a narrow rate-limit bypass plus social engineering of help desk staff. Here is what we are seeing and the detection rules that work.

TT
Tre Trebucchi·Founder, Valtik Studios. Penetration Tester

Founder of Valtik Studios. Pentester. Based in Connecticut, serving US mid-market.

# Okta rate limit abuse in 2026: what Scattered Spider is doing now

Everyone wrote Scattered Spider off in 2024 after the FBI indictments. I don't know how many times I had to push back on clients asking if the group was "still a threat." They were. They are. The arrests took out some of the frontline operators. The ones left behind rebuilt the infrastructure and kept working.

April 2026 activity we're tracking shows a refined Okta playbook that combines narrow rate-limit bypass patterns with help desk social engineering. The rate-limit trick is technical. The help desk call is social. Chained together they produce working authentication against hardened tenants that should have been immune.

If you run an Okta tenant for a Fortune 1000 org, or any company with a big help desk footprint that ends in "@outsourced-managed-service-provider.com," this is intelligence you need today.

The 2026 playbook

Here's the part consultants don't put in the glossy PDF.

  1. OSINT reconnaissance. Target company name, executive names from LinkedIn, IT help desk phone number, employee naming conventions from exposed email signatures on support forums and press releases.

  1. Help desk impersonation. Group operator calls the IT help desk during overnight hours (typically 2am-5am local), impersonates an executive or senior engineer, claims lost device or locked account, requests MFA reset.

  1. Okta factor enrollment. If help desk resets MFA, the operator immediately enrolls a new factor (push notification or WebAuthn) on attacker-controlled device before the legitimate user can.

  1. Okta rate limit bypass. For accounts where help desk refuses reset, the operator uses a rate limit bypass against Okta's API to brute force the password or OTP at a rate that slips under Okta's detection.

  1. Lateral movement via federated apps. Once in Okta, the operator pivots to sensitive federated applications (Salesforce, AWS SSO, GitHub, Workday) using the compromised session. Data exfiltration and ransomware staging follow.

The rate limit bypass

Okta's API rate limiting is tiered. Different endpoints have different thresholds. The bypass pattern Scattered Spider is using in April 2026 specifically abuses:

  • The /api/v1/authn endpoint's password validation subflow
  • Repeated requests that cycle through deviceToken values to reset the per-device rate count
  • Distributed source IPs via residential proxy pools (Bright Data, Oxylabs residential tier) to avoid IP-based throttling
  • Timing gaps between attempts tuned to stay below Okta's anomaly-detection thresholds

This isn't a public vulnerability. It's an abuse pattern exploiting default configuration and the inherent tension between availability and security. Okta has been deploying incremental detection improvements, but the detection is only as good as the tenant's configuration.

Detection rules that work

We have seen these rules catch Scattered Spider activity in tenants where they were deployed before the attack:

1. Alert on deviceToken diversity per user in short windows

Rule: if a single Okta username produces authentication attempts with more than 5 distinct deviceToken values in a 1-hour rolling window, alert.

This catches the rate-limit bypass pattern directly. Legitimate users rarely change device tokens. An attacker cycling tokens to reset rate limits trips this immediately.

2. Alert on help desk MFA reset followed by rapid factor enrollment from new IP

Rule: if a user's MFA factor is reset via the Okta Admin API or Okta Workflows. And a new factor is enrolled within 15 minutes from an IP that has never authenticated for this user, alert with critical severity.

This catches the help desk impersonation stage. Legitimate MFA resets usually involve the user enrolling from a familiar IP over a longer timeline.

3. Alert on low-success-rate authentication bursts

Rule: per username, rolling 10-minute window. If authentication attempts exceed 30 with success rate below 5%, alert.

Standard password spray / credential stuffing detection. Tune thresholds to your baseline.

4. Alert on Okta user events from residential ASNs

Rule: authenticate or enroll events from ASN ranges associated with residential proxies (AS397423 Bright Data, AS45102 Oxylabs, etc.). Tag these as high-risk and require step-up authentication.

Scattered Spider uses residential proxies because they look like legitimate home connections to geolocation-based controls. Flagging the specific ASNs cuts through that.

5. Alert on session hijacking indicators

Rule: Okta session becomes active from an IP geographically distant from the last observed IP within 60 minutes, with no preceding user.session.start event from the new location.

Tokens copied from a compromised workstation show as sessions appearing from attacker infrastructure without a proper login event. This is the "impossible travel" pattern adapted to Okta specifically.

Configuration hardening

Beyond detection, there are specific Okta tenant settings that harden against this playbook.

Require phishing-resistant MFA for all privileged access

WebAuthn (FIDO2) or Okta FastPass with biometric. Push notifications with number matching are better than old-style push but can still be socially engineered. SMS is out.

Enforce Okta ThreatInsight in blocking mode

ThreatInsight is Okta's reputation database of authentication attempts. Configure it to block (not log) authentication attempts from known threat IPs.

Disable password reset via help desk for privileged accounts

Executive, engineer, and admin accounts shouldn't be resettable by help desk. Self-service recovery via pre-enrolled backup FIDO2 keys, or in-person verification at a physical office, are the alternatives. MGM and Caesars both lost their breaches to help desk resets.

Restrict Okta API tokens

API tokens are a secondary compromise vector. Use Okta API token rotation, scope tokens narrowly, monitor for new token creation, revoke tokens immediately when a user leaves.

Require step-up authentication on sensitive apps

Configure Okta Authentication Policies to require additional authentication (PIV card, FIDO2 second factor, etc.) when accessing sensitive federated applications. Specifically anything with broad data access (Salesforce Admin, AWS Master Payer, GitHub Enterprise Owner, Workday HR).

Deploy Okta Verify with Fastpass

Okta's own FastPass is phishing-resistant and reduces the social engineering surface. Move legacy TOTP users to FastPass aggressively.

Incident response if you're hit

If you suspect Scattered Spider activity in your Okta tenant right now:

  1. Force-revoke all active sessions across the tenant via the Okta Admin API.
  2. Disable API tokens created in the last 72 hours until you can audit.
  3. Disable the "password reset via help desk" flow for all privileged accounts for the next 72 hours while you investigate.
  4. Audit the last 30 days of Okta system logs for the patterns above.
  5. Check for new factor enrollments in the last 72 hours. Review each one.
  6. Look for federated app access from unfamiliar IPs in the same window.
  7. Engage external IR. Scattered Spider engages quickly and pivots to ransomware staging in hours.

If the group has already moved to AWS, Salesforce, or other federated apps, the blast radius expands. AWS access keys, Salesforce admin, GitHub Enterprise. These each need their own containment playbook.

Broader context

Scattered Spider isn't unique. The Okta-targeted playbook is being adopted by other threat groups. LAPSUS$ used similar tradecraft in 2022. Muddled Libra (overlapping membership with Scattered Spider) uses it. Newer affiliates of ALPHV / BlackCat successors like RansomHub are observed using the pattern.

The underlying weakness is that identity providers concentrate authentication into a single-sign-on system. And the SSO is only as strong as the weakest recovery flow. If the help desk can reset MFA with social engineering, the entire SSO protection is recovery-flow deep.

What we check during an Okta-focused engagement

Our Okta security reviews cover:

  • Authentication policy configuration review against Scattered Spider attack patterns
  • Help desk procedure review and social engineering test
  • Okta System Log configuration and SIEM integration
  • Detection rule deployment for the patterns above
  • Privileged access audit (who has access to what federated apps, are roles appropriately scoped)
  • API token inventory and lifecycle review
  • Incident response tabletop exercise specifically for identity compromise scenarios

Most Okta tenants we review have 2-4 critical misconfigurations. The most common: legacy SMS MFA still enabled for some users, help desk reset allowed for privileged accounts, and ThreatInsight in log-only mode.

Resources

  • Okta Threat Research: https://sec.okta.com/
  • Microsoft Threat Intelligence on Scattered Spider: https://www.microsoft.com/en-us/security/blog/
  • CISA Advisory AA23-320A: Scattered Spider tradecraft
  • CrowdStrike's annual Global Threat Report coverage
  • Okta's Identity Threat Hub

Hire Valtik Studios

Identity compromise is where breaches start in 2026. We run Okta security reviews, Microsoft Entra ID (Azure AD) reviews. And general identity posture assessments that specifically test against the current Scattered Spider and adjacent threat group playbooks. If your identity provider hasn't been reviewed in 12 months, now is the time.

Reach us at valtikstudios.com.

oktascattered spideridentityauthenticationrate limitingincident response

Want us to check your Okta setup?

Our scanner detects this exact misconfiguration. plus dozens more across 38 platforms. Free website check available, no commitment required.

Get new research in your inbox
No spam. No newsletter filler. Only new posts as they publish.