Obsidian Security’s session hijacking feature prevents attackers from stealing tokens

Obsidian Security unveiled the ability to detect SaaS session hijacking attempts early in the kill chain across multiple platforms like Okta, Azure AD, Microsoft 365 and more.

Obsidian Security session hijacking

The capability is used by more than 80 customers worldwide, including eight customers in the Fortune 1000. Attackers have recognized that credential stealing is less effective due to the broad adoption of multi-factor authentication (MFA) by organizations today. However, tokens associated with sessions of SaaS applications can be reused within time limits to access any and all applications associated with the identity provider (IDP), which is exemplified in the recent breach at Okta.

In addition, Obsidian is expanding its comprehensive posture management capabilities to support ServiceNow, which joins an already expansive portfolio of SaaS applications including Microsoft 365, Salesforce, GitHub, Workday, Atlassian, etc.

94% of enterprises depend on cloud services and SaaS apps to operate in today’s modern, hybrid workforce, complete daily tasks, and store sensitive information. When an IDP is breached, this results in access to all SaaS applications and sensitive data behind them as well. There is a shared responsibility that needs to be recognized between application vendors, the security team and lines-of-business owners to ensure that all SaaS applications are protected in an organization’s network.

Sophisticated attacks are becoming more common for cloud-first organizations today, so taking precautions to prevent session hijacking via identity providers like Okta and Azure AD with Obsidian’s new offering are critical. The unique aspect of our session hijacking detection was it came through 18 months of work directly with the red team at one of our customers.

“In today’s dynamic world, where architecture and infrastructure changes are constant and new threats pop-up daily, having a red team that can emulate real-world threat actors and identify areas vulnerable to attack, is worth every penny.” said Snowflake Vice President of Security Mario Duarte. You can learn more about Obsidian’s session hijacking feature here.

“Too often, organizations rely on out-of-the-box security protection for the slew of mission-critical SaaS apps deployed in their networks, including their IDP, but that is no longer sufficient in today’s environment,” said Glenn Chisholm, CPO and Co-founder at Obsidian. “Now, with our new preventative session hijacking feature, security leaders and teams have more comprehensive protection of their IDP and SaaS apps, beyond the endpoints alone, and a better understanding of where cyber risk exists within their digital infrastructure to prevent future exploits and sophisticated attacks that bypass MFA.”

More about

Don't miss