{"id":1229,"date":"2022-03-25T03:23:00","date_gmt":"2022-03-25T03:23:00","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=1229"},"modified":"2026-01-25T07:52:58","modified_gmt":"2026-01-25T07:52:58","slug":"dear-hacker-better-luck-next-time","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dear-hacker-better-luck-next-time","title":{"rendered":"Dear Hacker, Better Luck Next Time"},"content":{"rendered":"\n<p>Hackers are bloody good at what they do. Every other week there\u2019s a new headline: \u201c<a href=\"https:\/\/cisomag.eccouncil.org\/global-affairs-canada-hit-by-cyberattack\/\" target=\"_blank\" rel=\"noreferrer noopener\">Global Affairs Canada Hit by Cyberattack<\/a>\u201d, \u201c<a href=\"https:\/\/therecord.media\/cyberattack-brings-down-vodafone-portugal-mobile-voice-and-tv-services\/#:~:text=February%208%2C%202022-,Cyberattack%20brings%20down%20Vodafone%20Portugal%20mobile%2C%20voice%2C%20and%20TV%20services,to%20cause%20damage%20and%20disruption.%E2%80%9D\" target=\"_blank\" rel=\"noreferrer noopener\">Cyberattack brings down Vodafone Portugal mobile<\/a>\u201d, \u201c<a href=\"https:\/\/www.nme.com\/en_au\/news\/gaming-news\/hacker-group-threatens-to-leak-1tb-of-nvidia-data-3172715\" target=\"_blank\" rel=\"noreferrer noopener\">Tech giant Nvidia has been completely compromised<\/a>\u201d.<\/p>\n\n\n\n<p>These headlines are designed to grab our attention. Granted, the three above are fairly tame, all things considered, but others certainly sensationalize the story, taking whatever angle is going to get the most clicks and plasters that &#8211; front and center, 36pt &#8211; where it can\u2019t be missed. And the more terrible \/ shocking \/ horrifying the title is, the more attention it gets. Humans absolutely LOVE some drama, a \u2018bit of juice\u2019 to follow. It\u2019s in our nature to tune in with a carton of popcorn when something goes wrong, and watch it all unfold.<\/p>\n\n\n\n<p>Often the actual story is no way near as spectacular, dire, foreboding, world-ending as the headline leads us to believe, and the whole things blows over and is forgotten about in a matter of weeks or months.<\/p>\n\n\n\n<p>But what does eveyone do when they hear even an<em>&nbsp;inkling<\/em>&nbsp;of a new cyber attack? They write the next sensational headline: \u201c<a href=\"https:\/\/www.bbc.com\/news\/technology-60849687\" target=\"_blank\" rel=\"noreferrer noopener\">Hundreds of companies potentially hit by Okta hack<\/a>\u201d. Okay &#8211; I&#8217;m intrigued.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Okta Attack: Whodunit<\/h2>\n\n\n\n<p>The same hackers responsible for several of the titles listed above are also to blame for the latest big headline putting Okta in the hot seat.<\/p>\n\n\n\n<p>Lapsus$ hacking group (or, allegedly, a bunch of teenagers led by another&nbsp;<a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2022-03-23\/teen-suspected-by-cyber-researchers-of-being-lapsus-mastermind\" target=\"_blank\" rel=\"noreferrer noopener\">teenager living at his Mom\u2019s house in London<\/a>) put the Identity Access Management (IAM) company \u2013 and their customers \u2013 on high-alert when they posted&nbsp;<a href=\"https:\/\/twitter.com\/_MG_\/status\/1506109152665382920\" target=\"_blank\" rel=\"noreferrer noopener\">screenshots that then circulated Twitter<\/a>&nbsp;early this week (March 22nd).<\/p>\n\n\n\n<p>They claimed to have gained \u2018Superuser\/Admin\u2019 access to Okta.com, called the company out for having poor security measures in place, and stated that (before the account got suspended) they did not steal any databases from Okta; that their focus was on Okta customers only. They also emphasized, \u201cfor the 100th time\u201d (quote, unquote) that they had been in there since January (two whole months) before being detected and having their access revoked.<\/p>\n\n\n\n<p>To cut a long story short: Lapsus$ used RDP (<a href=\"\/en\/blogs\/RDP-Exposed-Literally\" target=\"_blank\" rel=\"noreferrer noopener\">WHEN will people learn?!<\/a>) to gain access to the computer of a Customer Support tech in Costa Rica, who was employed by outsourcing firm, Skyes, which was owned by call-center giant, Sitel, which was contracted as a sub-processor by Okta.<\/p>\n\n\n\n<p>In order to do their jobs, Customer Support personnel need access to customer data, which is why they are popular targets for hackers. Hackers can use them as a sneaky way in to the bigger players, which is exactly what was attempted in this attack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Series of Unfortunate Events<\/h2>\n\n\n\n<p>After a few days of confusion, outrage, and carefully-worded statements over dates and potential impact, the Okta CSO (David Bradbury) cleared the air once and for all with a&nbsp;<a href=\"https:\/\/www.okta.com\/blog\/2022\/03\/oktas-investigation-of-the-january-2022-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">timeline of when and how it all went down<\/a>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>January 20, 2022, 23:18<\/strong>&nbsp;&#8211; Okta Security received an alert that a new factor was added to a Sitel employee\u2019s Okta account from a new location. The target did not accept an MFA challenge, preventing access to the Okta account.<\/li>\n\n\n\n<li><strong>January 20, 2022, at 23:46<\/strong>&nbsp;&#8211; Okta Security investigated the alert and escalated it to a security incident.<\/li>\n\n\n\n<li><strong>January 21, 2022, at 00:18<\/strong>&nbsp;&#8211; The Okta Service Desk was added to the incident to assist with containing the user\u2019s account.<\/li>\n\n\n\n<li><strong>January 21, 2022, at 00:28<\/strong>&nbsp;&#8211; The Okta Service Desk terminated the user\u2019s Okta sessions and suspended the account until the root cause of suspicious activity could be identified and remediated.<\/li>\n\n\n\n<li><strong>January 21, 2022, at 18:00<\/strong>&nbsp;&#8211; Okta Security shared indicators of compromise with Sitel. Sitel informed us that they retained outside support from a leading forensic firm.<\/li>\n\n\n\n<li><strong>January 21, 2022, to March 10, 2022<\/strong>&nbsp;&#8211; The forensic firm\u2019s investigation and analysis of the incident was conducted until February 28, 2022, with its report to Sitel dated March 10, 2022.<\/li>\n\n\n\n<li><strong>March 17, 2022<\/strong>&nbsp;&#8211; Okta received a summary report about the incident from Sitel<\/li>\n\n\n\n<li><strong>March 22, 2022, at 03:30<\/strong>&nbsp;&#8211; Screenshots shared online by LAPSUS$<\/li>\n\n\n\n<li><strong>March 22, 2022, at 05:00<\/strong>&nbsp;&#8211; Okta Security determined that the screenshots were related to the January incident at Sitel<\/li>\n\n\n\n<li><strong>March 22, 2022, at 12:27<\/strong>&nbsp;&#8211; Okta received the complete investigation report from Sitel<\/li>\n<\/ul>\n\n\n\n<p>To sum it up, the screenshots were from an attack that occurred in late January, was investigated over the course of about six weeks, within which time, the hackers posted their expose online and made Okta look\u2026 the opposite of transparent. Opaque, that\u2019s the word I\u2019m looking for.<\/p>\n\n\n\n<p>Also in his statement, Bradbury expressed embarrassment over the event, apologized about the delay in taking action after receiving the initial report from Sitel, and pointed out a particularly noteworthy (and reassuring) factor:<\/p>\n\n\n\n<p>At Okta, policies and security protocols in place limit the access provided to Support Engineers to \u201cbasic duties in handling inbound support queries\u201d, with the majority of support tasks performed via an \u201cinternally-built application called SuperUser (SU) \u2026 an application built with least privilege in mind to ensure that support engineers are granted only the specific access they require to perform their roles. They are unable to create or delete users. They cannot download customer databases. They cannot access our source code repositories\u2026 Because of the access that the support engineers had, the information and the actions were constrained.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Sliver of a Silver Lining<\/h2>\n\n\n\n<p>What Bradbury is saying is that once the hackers got in, there wasn\u2019t a whole lot they could do \u2013 a claim that was more or less validated in the fact that a mere 366 customers were potentially impacted in the attack, but not to the extent that they had to take any restorative action. And that, dear reader, is the power of the Principle of Least Privilege (POLP).<\/p>\n\n\n\n<p>Where it really mattered, Okta\u2019s implementation of the Principle of Least Privilege worked: the victim engineer had only enough privileges required to do his \/ her job, and these privileges simply weren\u2019t enough to give Lapsus$ the foothold needed to cause widespread damage.<\/p>\n\n\n\n<p>Maybe I\u2019m too much of an optimist, but I feel there\u2019s at least&nbsp;<em>some&nbsp;<\/em>positivity to be seen here. Yes, an attacker got in. No, they weren\u2019t able to do any real damage. At this stage, I feel like a more appropriate headline would be: \u201cPrivileged Access Management controls prevent hackers from launching widescale attack\u201d (what a breath of fresh air!)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Point<\/h2>\n\n\n\n<p>The point is, Privileged Access Management (PAM) is an absolute must. It\u2019s a safety net to catch anything (or anyone) malicious that slips through the other security layers, as in the Okta case.<\/p>\n\n\n\n<p><a href=\"\/en\/product-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Admin By Request\u2019s Privileged Access Management solution<\/a>\u00a0exists to act as that safety net, with minimal input or management required from you. Install the client, and the Principle of Least Privilege is immediately enforced on every user, along with the ability for Just-In-Time, fully audited elevation \u2013 so that employees can continue to do their jobs, safely.<\/p>\n\n\n\n<p>Where third-party contractors are concerned, they can get protected too \u2013 Admin By Request offers a\u00a0<a href=\"\/en\/freeplandownload\" target=\"_blank\" rel=\"noreferrer noopener\">completely free, life time plan<\/a>\u00a0for smaller organizations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>This latest story acts as proof that appropriate use and enforcement of least-privilege principles can be the saving grace in the event of a cyber attack, and they should be implemented in every enterprise with a comprehensive PAM solution such as\u00a0<a href=\"\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\">Admin By Request<\/a>.<\/p>\n\n\n\n<p>Yes, hackers are good at what they do. But they\u2019re often not quite good enough to circumvent advanced cybersecurity software built on POLP.<\/p>\n\n\n\n<p>Better luck next time, hackers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There&#8217;s no denying that hackers are good. We see this reflected in the frequent cyberattack stories that populate the news channels almost daily &#8211; most recently, the Lapsus$ attack on Okta. What we don&#8217;t hear so much about? That Privileged Access Management software is better.<\/p>\n","protected":false},"author":2,"featured_media":1230,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[130,131,90,129,106,91,82,67,68,132,79],"ppma_author":[9],"class_list":["post-1229","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-antimalware","tag-antivirus","tag-cyber-criminal","tag-cyberattack","tag-features","tag-hacker","tag-malware","tag-pam","tag-privileged-access-management","tag-protection","tag-ransomware","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"There&#039;s no denying that hackers are good. We see this reflected in the frequent cyberattack stories that populate the news channels almost daily - most recently, the Lapsus$ attack on Okta. What we don&#039;t hear so much about? That Privileged Access Management software is better.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"S Dodson\"\/>\n\t<meta name=\"keywords\" content=\"antimalware,antivirus,cyber criminal,cyberattack,features,hacker,malware,pam,privileged access management,protection,ransomware\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/dear-hacker-better-luck-next-time\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Dear Hacker, Better Luck Next Time \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"There&#039;s no denying that hackers are good. We see this reflected in the frequent cyberattack stories that populate the news channels almost daily - most recently, the Lapsus$ attack on Okta. What we don&#039;t hear so much about? That Privileged Access Management software is better.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/dear-hacker-better-luck-next-time\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2022-03-25T03:23:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-25T07:52:58+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Dear Hacker, Better Luck Next Time \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"There&#039;s no denying that hackers are good. We see this reflected in the frequent cyberattack stories that populate the news channels almost daily - most recently, the Lapsus$ attack on Okta. What we don&#039;t hear so much about? That Privileged Access Management software is better.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dear-hacker-better-luck-next-time#blogposting\",\"name\":\"Dear Hacker, Better Luck Next Time \\u00bb Admin By Request\",\"headline\":\"Dear Hacker, Better Luck Next Time\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/OktaBanner-1.png\",\"width\":1982,\"height\":1313,\"caption\":\"A hacker typing on their computer as their access get denied.\"},\"datePublished\":\"2022-03-25T03:23:00+00:00\",\"dateModified\":\"2026-01-25T07:52:58+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dear-hacker-better-luck-next-time#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dear-hacker-better-luck-next-time#webpage\"},\"articleSection\":\"Blogs, Antimalware, Antivirus, Cyber Criminal, Cyberattack, Features, Hacker, Malware, PAM, Privileged Access Management, Protection, Ransomware, S Dodson\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dear-hacker-better-luck-next-time#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dear-hacker-better-luck-next-time#listItem\",\"name\":\"Dear Hacker, Better Luck Next Time\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dear-hacker-better-luck-next-time#listItem\",\"position\":3,\"name\":\"Dear Hacker, Better Luck Next Time\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dear-hacker-better-luck-next-time\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dear-hacker-better-luck-next-time\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin\",\"name\":\"S Dodson\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dear-hacker-better-luck-next-time#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dear-hacker-better-luck-next-time\",\"name\":\"Dear Hacker, Better Luck Next Time \\u00bb Admin By Request\",\"description\":\"There's no denying that hackers are good. We see this reflected in the frequent cyberattack stories that populate the news channels almost daily - most recently, the Lapsus$ attack on Okta. What we don't hear so much about? That Privileged Access Management software is better.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dear-hacker-better-luck-next-time#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/OktaBanner-1.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dear-hacker-better-luck-next-time\\\/#mainImage\",\"width\":1982,\"height\":1313,\"caption\":\"A hacker typing on their computer as their access get denied.\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/dear-hacker-better-luck-next-time#mainImage\"},\"datePublished\":\"2022-03-25T03:23:00+00:00\",\"dateModified\":\"2026-01-25T07:52:58+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Dear Hacker, Better Luck Next Time \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"Dear Hacker, Better Luck Next Time \u00bb Admin By Request","description":"There's no denying that hackers are good. We see this reflected in the frequent cyberattack stories that populate the news channels almost daily - most recently, the Lapsus$ attack on Okta. What we don't hear so much about? That Privileged Access Management software is better.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dear-hacker-better-luck-next-time","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"antimalware,antivirus,cyber criminal,cyberattack,features,hacker,malware,pam,privileged access management,protection,ransomware","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dear-hacker-better-luck-next-time#blogposting","name":"Dear Hacker, Better Luck Next Time \u00bb Admin By Request","headline":"Dear Hacker, Better Luck Next Time","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/OktaBanner-1.png","width":1982,"height":1313,"caption":"A hacker typing on their computer as their access get denied."},"datePublished":"2022-03-25T03:23:00+00:00","dateModified":"2026-01-25T07:52:58+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dear-hacker-better-luck-next-time#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dear-hacker-better-luck-next-time#webpage"},"articleSection":"Blogs, Antimalware, Antivirus, Cyber Criminal, Cyberattack, Features, Hacker, Malware, PAM, Privileged Access Management, Protection, Ransomware, S Dodson"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dear-hacker-better-luck-next-time#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dear-hacker-better-luck-next-time#listItem","name":"Dear Hacker, Better Luck Next Time"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dear-hacker-better-luck-next-time#listItem","position":3,"name":"Dear Hacker, Better Luck Next Time","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dear-hacker-better-luck-next-time\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dear-hacker-better-luck-next-time\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin","name":"S Dodson"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dear-hacker-better-luck-next-time#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dear-hacker-better-luck-next-time","name":"Dear Hacker, Better Luck Next Time \u00bb Admin By Request","description":"There's no denying that hackers are good. We see this reflected in the frequent cyberattack stories that populate the news channels almost daily - most recently, the Lapsus$ attack on Okta. What we don't hear so much about? That Privileged Access Management software is better.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dear-hacker-better-luck-next-time#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/OktaBanner-1.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dear-hacker-better-luck-next-time\/#mainImage","width":1982,"height":1313,"caption":"A hacker typing on their computer as their access get denied."},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dear-hacker-better-luck-next-time#mainImage"},"datePublished":"2022-03-25T03:23:00+00:00","dateModified":"2026-01-25T07:52:58+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Dear Hacker, Better Luck Next Time \u00bb Admin By Request","og:description":"There's no denying that hackers are good. We see this reflected in the frequent cyberattack stories that populate the news channels almost daily - most recently, the Lapsus$ attack on Okta. What we don't hear so much about? That Privileged Access Management software is better.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dear-hacker-better-luck-next-time","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2022-03-25T03:23:00+00:00","article:modified_time":"2026-01-25T07:52:58+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Dear Hacker, Better Luck Next Time \u00bb Admin By Request","twitter:description":"There's no denying that hackers are good. We see this reflected in the frequent cyberattack stories that populate the news channels almost daily - most recently, the Lapsus$ attack on Okta. What we don't hear so much about? That Privileged Access Management software is better.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"1229","title":"#post_title #separator_sa #site_title","description":"#post_excerpt","keywords":null,"keyphrases":null,"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":null,"og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":null,"robots_max_videopreview":null,"robots_max_imagepreview":"large","priority":null,"frequency":null,"local_seo":null,"seo_analyzer_scan_date":"2026-01-25 07:58:52","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":null,"created":"2023-05-22 22:00:14","updated":"2026-01-25 07:58:52"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tDear Hacker, Better Luck Next Time\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"Dear Hacker, Better Luck Next Time","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/dear-hacker-better-luck-next-time"}],"authors":[{"term_id":9,"user_id":2,"is_guest":0,"slug":"sophie-admin","display_name":"S Dodson","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/02\/Avatars-Dark-02.png","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/02\/Avatars-Dark-02.png"},"author_category":"","user_url":"","last_name":"Dodson","first_name":"S","job_title":"","description":"With a solid background in computer science and graphic design, my career kicked off writing tech manuals for various companies in both the software and hardware realms. I then side-stepped into marketing and found my passion in cybersecurity.\r\n\r\nI fuse my tech know-how with design skills to craft engaging blogs that spotlight cybersecurity for businesses. My main focus now is championing the marketing efforts of Admin By Request Zero Trust Platform, where my creative take on cybersecurity helps me create content that's enlightening, entertaining, and impactful.\r\n\r\nMy articles have graced the pages of InfoSec Magazine and top-tier security websites like OPSWAT. I'm on a mission to stress the significance of cybersecurity and to showcase how Admin By Request is shaking things up by making enterprise solutions simple, intuitive, accessible, and affordable to organizations of all sizes, in any industry.\r\n\r\nMy goal is to craft content that informs, intrigues, and motivates action, helping businesses understand the pivotal role of cybersecurity in the digital age we're now living in. Through my work, I aim to close the gap between technology and its real-world applications, keeping our audience well-informed, interested, and ready for the ever-evolving cybersecurity landscape.\r\n\r\nI bring a blend of extensive experience, deep expertise, recognized authority, and unwavering commitment to trustworthiness in cybersecurity. My goal? To make complex topics relatable and actionable for businesses of all sizes - just like Admin By Request strives to do."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/1229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=1229"}],"version-history":[{"count":1,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/1229\/revisions"}],"predecessor-version":[{"id":10678,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/1229\/revisions\/10678"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/1230"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=1229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=1229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=1229"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=1229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}