Internal · Confidential · Tlp:Amber ⚠ Action Required
Advisory
SEC-2025-0147
Security Advisory · Memorandum

Active Phishing
Campaign Detected.

A targeted credential-harvesting operation impersonating our IT Helpdesk has been delivered to ≈340 Northgate mailboxes since 06:00 ET this morning.

From
Dana Okonkwo, CISO
To
All Employees & Contractors
Issued
Nov 14, 2025 · 09:42 ET
Severity
HIGH
01 / SITUATION

What we are seeing.

At approximately 06:14 ET, the Security Operations Center began observing a coordinated phishing wave impersonating Northgate IT Helpdesk. The lure claims that the recipient's Okta session has expired and requires "immediate re-authentication" to avoid account lockout in 24 hours.

The messages are convincingly branded, use our internal ticket numbering scheme, and reference the actual name of the employee's direct manager — suggesting reconnaissance via LinkedIn or a prior data exposure. Early telemetry shows 11 users have clicked the link; we are working individually with those accounts.

DO THIS FIRST

If you entered credentials into a site called northgate-okta-verify.com in the last 24 hours — stop reading, call x4911 now, and disconnect your laptop from the network.

02 / THE LURE

What the email looks like.

A redacted sample of the phishing message, as it appears in Outlook. Hover-preview of any link reveals the true destination.

03 / INDICATORS OF COMPROMISE

IOCs — block, report, and watch for.

Forward to personal vigilance; our email gateway and EDR have been updated. If you see any of these artifacts outside of corporate-managed tooling, report immediately.

TypeIndicatorFirst Seen
DOMAINnorthgate-okta-verify.com2025-11-14 06:07
DOMAINmail-verify-9921.cc2025-11-14 06:11
URLhxxps://northgate-okta-verify[.]com/sso/login?u=2025-11-14 06:14
IP185.244.192.47 (sender) · AS202425, NL2025-11-14 06:14
IP103.77.88.214 (credential drop)2025-11-14 06:28
SHA-256a1f4c9…e73b2d (attached "Okta_Verify.html")2025-11-14 07:02
SHA-2569c2d88…41ae70 (second-stage payload)2025-11-14 07:49
04 / REQUIRED ACTIONS

What you must do today.

01

Reset your password

All Northgate employees must reset their SSO password via okta.northgate.internal. Passphrases of 16+ characters are required.

DUE BY FRI · 17:00 ET
02

Re-enroll MFA

After password reset, re-register your authenticator. Remove any device you do not personally recognize in the Okta dashboard.

DUE BY FRI · 17:00 ET
03

Report & delete the email

Use the "Report Phish" button in Outlook. Do not forward to colleagues. After reporting, delete from Inbox and Deleted Items.

04

Complete the 8-min refresher

A short KnowBe4 module titled "Spotting Okta Impersonation" has been assigned to your learning queue.

DUE BY MON · 18 NOV
24/7 SOC Hotline
x4911
from any internal line
Report a Phish
or Outlook "Report Phish" button
Incident Slack
#sec-incident-0147
monitored by SOC on-call
05 / A NOTE FROM ME

One click is all it takes — and also all it takes to stop it.

These attackers did their homework. They used real names, real ticket formats, and real urgency. Reporting fast is how we contain them, not shame — if you clicked, tell us. We will help, not punish.

Thank you for taking this seriously. A follow-up advisory with remediation metrics will be circulated Monday morning.

Dana Okonkwo
Chief Information Security Officer
Northgate Financial · Security & Risk
Ref: SEC-2025-0147
Classification: TLP:AMBER
Supersedes: none