Article Details
Scrape Timestamp (UTC): 2025-03-21 20:50:54.596
Original Article Text
Click to Toggle View
Oracle denies breach after hacker claims theft of 6 million data records. Oracle denies it was breached after a threat actor claimed to be selling 6 million data records allegedly stolen from the company's Oracle Cloud federated SSO login servers. "There has been no breach of Oracle Cloud. The published credentials are not for the Oracle Cloud. No Oracle Cloud customers experienced a breach or lost any data," the company told BleepingComputer. This statement comes after a threat actor known as rose87168 released multiple text files yesterday containing a sample database, LDAP information, and a list of the companies that they claimed were stolen from Oracle Clouds' SSO platform. As further proof that they had access to Oracle Cloud servers, the threat actor shared this URL with BleepingComputer, showing an Internet Archive URL that indicates they uploaded a .txt file containing their ProtonMail email address to the login.us2.oraclecloud.com server. BleepingComputer contacted Oracle again to explain how the threat actor uploaded a text file containing their email address without access to Oracle Cloud servers. Alleged Oracle data breach rose87168 is now selling the allegedly stolen data from Oracle Cloud's SSO service for an undisclosed price or in exchange for zero-day exploits on the BreachForums hacking forum. They say the data (including encrypted SSO passwords, Java Keystore (JKS) files, key files, and enterprise manager JPS keys) was stolen after hacking into 'login.(region-name).oraclecloud. com' Oracle servers. "The SSO passwords are encrypted, they can be decrypted with the available files. also LDAP hashed password can be cracked," rose87168 says. "I'll list the domains of all the companies in this leak. Companies can pay a specific amount to remove their employees' information from the list before it's sold." They've also offered to share some of the data with anyone who can help decrypt the SSO passwords or crack the LDAP passwords. The threat actor told BleepingComputer they gained access to Oracle Cloud servers around 40 days ago and claimed to email the company after exfiltrating data from the US2 and EM2 cloud regions. In the email exchange, rose87168 said they asked Oracle to pay 100,000 XMR for information on how they breached the servers, but the company allegedly refused to pay after asking for "all information needed for fix and patch BleepingComputer has contacted various companies whose data was allegedly stolen to confirm whether it's valid. We will update this article if we hear back. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.
Daily Brief Summary
Oracle refutes allegations of a breach following claims by a hacker, rose87168, that they stole 6 million records from Oracle Cloud’s federated SSO login servers.
Rose87168 provided evidence including text files and LDAP information purportedly from Oracle Cloud, even showing a .txt file upload to an Oracle server.
The data for sale included encrypted SSO passwords and other sensitive files, with rose87168 claiming the ability to decrypt these passwords.
The hacker demanded that companies pay to exclude their employees' information from the sell list, posing a targeted threat to affected enterprises.
Oracle insists that no Oracle Cloud customers experienced a breach or data loss according to their investigation.
The situation remains unresolved as rose87168 continues to offer the data in exchange for money or zero-day exploits, underlining the ongoing risk to the affected entities.
BleepingComputer has reached out to potentially affected companies to validate the claims of stolen data; updates are pending based on these confirmations.