Modern Australian
Men's Weekly

.

Okta Study Finds Fraudulent Registrations and Credential Stuffing to be Top Threats to Digital Identities

Robust and resilient Customer Identity and Access Management (CIAM) exists at the vanguard of identity security

SINGAPORE - Media OutReach - 1 February 2023 - Okta, Inc. (NASDAQ: OKTA), the leading independent identity provider, today unveiled the APAC findings of its second annual State of Secure Identity Report highlighting key areas of concern for security professionals tasked with managing digital identities, including the exponential rise of fraudulent registration, credential stuffing attacks, and the widespread use of breached credentials.

Based on the data across the world from Okta Customer Identity Cloud, powered by Auth0, this report presents trends, examples, and real-world observations from the billions of identity attacks at various authentications touchpoints.

Research into these Okta global customers found the following key facts and figures:

  1. Fraudulent registrations are an ever-present and growing threat: In the first 90 days of 2022, Okta observed almost 300 million fraudulent account creation attempts, accounting for about 23% of signup attempts, up from 15% in the same period last year. Energy/Utilities and Financial Services experienced the highest proportion of signup attacks, with such threats accounting for most of the registration attempts in those two industries.
  2. Credential stuffing is on a record pace: Credential stuffing attacks are the most common threats to Retail/eCommerce (more than 80% login activity), Financial Services and Entertainment verticals. In the first 90 days of 2022, the platform detected almost 10 billion credential stuffing events, representing some 34% of overall traffic or authentication events. In Southeast Asia, which was buoyed by several large-scale attacks, credential stuffing accounts for the majority of identity events. The situation in Australia and New Zealand was more sanguine — normal traffic represents the majority of login events (63%), and only during a large attack does credential stuffing overtake legitimate traffic.
  3. Threat actors are targeting multi-factor authentication (MFA): In Asia Pacific, MFA bypass attacks are responsible for more events than signup attacks. Because of its proven merits, more application and service providers are recommending or requiring MFA. As attackers become more sophisticated at targeting this important defensive measure, it's critical that MFA be implemented correctly and that strong secondary factors are chosen.
  4. Every company faces unique challenges. The threats facing any particular application or service vary enormously by geography, industry, and brand prominence, among other factors. At the same time, different organizations have different risk appetites and exposures. The appropriate level of friction introduced by security measures will therefore vary on a company-to-company basis.
"Digital transformation will continue to be high on the priority list for many organizations, and a reliable CIAM could help businesses combat account takeover to protect consumers and businesses while boosting seamless consumer experience," said Ben Goodman, Senior Vice President and General Manager for Asia Pacific & Japan, Okta. "The first step towards implementing CIAM securely is to understand why and how adversaries are attacking these customer-oriented businesses," he added.

Applications gain users, identity takes on even greater Importance

As adversaries focus greater attention on attacking identity systems and evolving their tactics, techniques, and procedures (TTPs), the report highlighted that it is essential for application and service providers to:
  • Implement defence-in-depth tools that work in combination across the user, application, and network layers
  • Continually monitor their applications for signs of attacks and changes in TTPs; and
  • Make adjustments (e.g., tune parameters, tighten restrictions, introduce new tools, etc.) as needed.
Leaders across these functions should work together to implement CIAM in a manner that balances quality of customer experience and system security, in the context of desired use cases, customer types, data types, industry-specific risks, and risk appetite.

"Trust between customers and organizations is sacred and hard-earned, therefore it is crucial to make identity security a board-level issue. Placing identity security at the core of your business will allow your workers to focus on innovation, collaboration, and productivity while reducing overall identity-related risk," Goodman added.

Managing CIAM Threats

The report also highlighted that an agile, secure-by-design CIAM solution permits a considerable amount of flexibility that allow organizations to tailor customer identity and access management — and continually tune as needed — without drawing in resources better applied toward advancing core competencies.

The report recommends several solutions that involve combining multiple security tools that can operate at different layers and form a unified defensive position. These include implementing MFA, using generic failure messages that do not reveal system details, limiting failed login attempts, and implementing secure session management practices.

About The State of Secure Identity Report

This report is based on data from Okta customers around the world using Okta Customer Identity Cloud, powered by Auth0. As a result, it represents real-world observations of identity attacks. The data was retrieved by Okta security researchers by running simple and anonymous queries against our aggregate database of operational telemetry. Industry segmentations are based upon each customer's self-reported segment. Observations are from the first 90 days of 2022 unless otherwise noted. Okta's 2022 State of Secure Identity Report can be downloaded here.

Hashtag: #Okta

The issuer is solely responsible for the content of this announcement.

About Okta

Okta is the World's Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We're building a world where Identity belongs to you. Learn more at okta.com.

Why Ugly Websites Sometimes Outperform Beautiful Ones

In the digital age, we're constantly told that first impressions matter, and nowhere does this seem more apparent than in web design. However, a cur...

TPD Claims & Super: What Does It All Mean?

Many Australians hear the term "TPD" in relation to their superannuation and feel completely lost. If you're scratching your head, wondering what it...

What Does Breastfeeding Feel Like? A Guide for New Moms

Frequently, numerous new mothers wonder, "What does breastfeeding feel like?" The feeling is different for each individual - a few describe it as a ...

Best Nail Care Routine for Frequent Nail Polish Wearers

For many people, nail polish is more than a beauty statement – it’s part of their everyday routine. Whether you love bold colours, chic neutrals...

Reinventing Research: How E-Libraries Are Changing Education Forever

A New Chapter for Learning For centuries libraries stood as temples of knowledge filled with shelves that smelled of dust and paper. Today the same...

Psychologists Explore Gestalt Vs Schema Therapy for PTSD Treatment

Recent research has revealed that in 2022, 1 in 9 Australians experienced post-traumatic stress disorder (PTSD). For some, this can significantly im...

Beyond Sunscreen: Building a Sun-Smart Culture in Modern Australia

Australia’s sun-soaked lifestyle is a defining part of its national identity. From beaches and sports fields to weekend barbecues and bushwalks, t...

What is Power BI & Why Should Your Business Use It?

In today's data-driven world, businesses are constantly searching for ways to gain a competitive edge. One tool that has emerged as a game-changer i...

From Service to Strength: How Aussie Veterans Are Rebuilding Their Lives with Everyday Support

Life after military service can bring new challenges. From physical limitations to mental health hurdles, many Australian veterans find everyday hou...

The Best Times of Year to Buy a Caravan

If you're shopping for caravans for sale, timing matters almost as much as the layout and features you desire. The calendar shapes price, stock and ...

The Growing Demand for Smart Living Through Home Automation

Technology has reshaped how we communicate, work, and travel—but now, it’s also changing the way we live at home. The rise of home automation i...

Beyond Clicks and Likes: Why Many Small Businesses in Australia Still Aren’t Leveraging Digital Marketing in 2025

Introduction In 2025, online marketing has become the driving force behind business growth for companies of all sizes. Yet, despite its proven effect...

Lighting Shop Perth: Your Comprehensive Guide to Choosing the Right Lighting Solutions

Lighting is a fundamental element in defining the ambiance, functionality, and aesthetic appeal of any space. Whether you are renovating your home, ...

Private Booze Cruisers – The New Must-Have Toy for Cashed Up Millennials

Did you hear that your 30s are the new 20s? We’ve finally rocked up that adult money and now it’s time to play with it. I was going for a walk ...

Grinding & Jaw Soreness: Signs You Might Need Night Guards and How We Protect Enamel

Waking with a tight jaw, tender muscles, or a dull temple headache is more than a bad night’s sleep. Many Australians grind or clench their teeth ...

Circular Interior Design: Furnishing with Salvaged & Reclaimed Materials

Circular interior design is gradually making its way from niche circles into mainstream Australian homes. At its core, this approach revolves around...

Invisible Braces vs Traditional Braces: Which Is Best for Adults?

Straightening teeth as an adult is common in Australia, and the options are better than ever. The two main choices are clear aligners, also called i...

Smoking, Vaping, and Healing: How Nicotine Affects Sockets and What you can do About it

Nicotine and oral surgery are a poor mix. After an wisdom teeth removal in Sydney, your body needs a stable blood clot and steady blood flow to rebu...