{"id":30284,"date":"2025-03-27T12:36:39","date_gmt":"2025-03-27T12:36:39","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=30284"},"modified":"2025-03-29T09:20:39","modified_gmt":"2025-03-29T09:20:39","slug":"oracle-cloud-breach","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/oracle-cloud-breach\/","title":{"rendered":"Oracle Cloud Breach Plausible, Experts Research Confirms"},"content":{"rendered":"<p>Recent reports indicate <strong>a potential major security incident involving Oracle Cloud<\/strong>, detected on March 21, 2025. Researchers claim a threat actor is selling sensitive data, while Oracle firmly denies any breach.<\/p>\n<h2>Alleged Oracle Cloud Breach Analysis<\/h2>\n<p>On March 21, 2025, <a href=\"https:\/\/www.cloudsek.com\/blog\/part-2-validating-the-breach-oracle-cloud-denied-cloudseks-follow-up-analysis\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CloudSEK published a blog post<\/a> claiming a significant data breach in Oracle Cloud, detected through their platform. They reported that <strong>a threat actor, identified as &#8220;rose87168,&#8221; is selling 6 million records<\/strong> exfiltrated from Oracle Cloud&#8217;s Single Sign-On (SSO) and Lightweight Directory Access Protocol (LDAP) systems. This data includes sensitive components such as Java KeyStore (JKS) files, encrypted SSO passwords, key files, and enterprise manager Java Platform Security (JPS) keys, potentially impacting over 140,000 tenants across multiple regions and industries.<\/p>\n<figure id=\"attachment_30293\" aria-describedby=\"caption-attachment-30293\" style=\"width: 1732px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/Oracle-Cloud-Breach.webp\" alt=\"Oracle Cloud breach post screenshot\" width=\"1732\" height=\"803\" class=\"size-full wp-image-30293\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/Oracle-Cloud-Breach.webp 1732w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/Oracle-Cloud-Breach-300x139.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/Oracle-Cloud-Breach-1024x475.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/Oracle-Cloud-Breach-768x356.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/Oracle-Cloud-Breach-1536x712.webp 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/Oracle-Cloud-Breach-860x399.webp 860w\" sizes=\"auto, (max-width: 1732px) 100vw, 1732px\" \/><figcaption id=\"caption-attachment-30293\" class=\"wp-caption-text\">Oracle Cloud breach post<\/figcaption><\/figure>\n<p>Researchers verified the breach using their XVigil platform and cyber HUMINT, publishing a TLP Green report for public awareness and a TLP RED report sent to Oracle on the same day. They also <a href=\"https:\/\/exposure.cloudsek.com\/oracle\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">released a free tool<\/a> on a specially crafted website for organizations to check if their data was exposed.<\/p>\n<h2>Evidence Supporting the Breach<\/h2>\n<p>CloudSEK provided detailed evidence to support Oracle Cloud breach. The breach likely stemmed from an exploited vulnerability in Oracle Cloud\u2019s login endpoint, <strong>specifically login.(region-name).oraclecloud.com, with evidence suggesting the use of CVE-2021-35587<\/strong>, a critical vulnerability in Oracle Access Manager (OpenSSO Agent) within Oracle Fusion Middleware, last updated in 2014, with a CVSS score of 9.8, allowing unauthenticated remote code execution. This is supported by Oracle.<\/p>\n<p>Further evidence includes a 10,000-line sample shared by the threat actor on March 25, 2025, <strong>containing data from 1,500+ unique organizations<\/strong>, including personal emails and production access indicators (tenantIDs like {tenant}-dev, {tenant}-test, {tenant}). Researchers confirmed real customer domains (e.g., sbgtv.com, nexinfo.com) matching the threat actor\u2019s list, with system logs indicating the compromised production SSO endpoint, login.us2.oraclecloud.com, was active approximately 30 days ago and taken down by Oracle a few weeks before the breach. An archived file uploaded by the threat actor at web.archive.org contains the attacker&#8217;s email, also adding credibility.<\/p>\n<p>Multiple cybersecurity outlets have analyzed this incident, supporting the researchers&#8217; findings. Oracle Cloud breach May Impact 140000 Enterprise Customers CSO Online reports the breach\u2019s potential to endanger <strong>140,000 enterprise customers<\/strong>, with the threat actor demanding ransom and marketing data on underground forums.<\/p>\n<h2>Oracle&#8217;s Response and Denial<\/h2>\n<p>Oracle has categorically denied the breach. Oracle&#8217;s statement, as of March 21, 2025, is: \u201cThere has been no breach of Oracle Cloud. The published credentials are not for the Oracle Cloud. No Oracle Cloud customers experienced a breach or lost any data.\u201d This denial has created a significant controversy, with Oracle maintaining silence on further details.<\/p>\n<p>An X\/Twitter post mentions rose87168 claiming to use CVE-2021-35587 <a href=\"https:\/\/gridinsoft.com\/vulnerability\">vulnerability<\/a> to compromise login.us2.oraclecloud.com, with Oracle allegedly disconnecting the server, though current checks show the server is still accessible.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/oracle-cloud-breach-twitter.png\" alt=\"Oracle Cloud breach Twitter\" width=\"730\" height=\"412\" class=\"aligncenter size-full wp-image-30307\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/oracle-cloud-breach-twitter.png 730w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/oracle-cloud-breach-twitter-300x169.png 300w\" sizes=\"auto, (max-width: 730px) 100vw, 730px\" \/><\/p>\n<h2>Impact and Remediation<\/h2>\n<p>The potential impacts of Oracle Cloud breach are common for <a href=\"https:\/\/gridinsoft.com\/data-breaches\">this kind of incident<\/a>, including mass data exposure, credential compromise if passwords are cracked, and supply chain risks due to exposed JKS and key files. Security researchers heavily recommend changing all SSO and LDAP credentials, <a href=\"https:\/\/gridinsoft.com\/mfa\">enforcing multi-factor authentication<\/a> (MFA), conducting forensic investigations, and monitoring dark web forums for leaked data discussions.<\/p>\n<p>As of the time of writing, the situation remains unresolved, with no new updates beyond March 25, 2025, reports. Organizations are advised to use the researchers\u2019 tool to check exposure and follow recommended security measures, while awaiting further official statements from Oracle and independent verifications.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recent reports indicate a potential major security incident involving Oracle Cloud, detected on March 21, 2025. Researchers claim a threat actor is selling sensitive data, while Oracle firmly denies any breach. Alleged Oracle Cloud Breach Analysis On March 21, 2025, CloudSEK published a blog post claiming a significant data breach in Oracle Cloud, detected through [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":30332,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[697],"class_list":{"0":"post-30284","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-data-breach"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/GS_Blog_Oracle-Cloud-Breach-Allegations_-What-We-Know-About-the-6M-Record-Data-Sale_1280x674.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/30284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=30284"}],"version-history":[{"count":16,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/30284\/revisions"}],"predecessor-version":[{"id":30333,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/30284\/revisions\/30333"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/30332"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=30284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=30284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=30284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}