<img src="https://secure.leadforensics.com/86554.png" alt="" style="display:none;">

Alleged Oracle Cloud Supply Chain Attack

Alleged Oracle Cloud Supply Chain Attack: Six Million Records Stolen, 140K Companies Affected

Written on: Mar 25, 2025 9:54:47 AM

Written by: Alex Raben

Topic

[Data Security, COOLSPIRiT, Cyber Security, Arctic Wolf]

This article provides situational awareness regarding a claimed breach impacting Oracle Cloud, allegedly affecting 140,000 companies. We strongly recommend reviewing the details to understand the situation and follow the recommendations to protect against potential impact.

 Summary

On March 20, 2025, a Breach Forums user, "rose87168," claimed to have stolen six million records from Oracle Cloud’s SSO and LDAP services and offered the data for sale or in exchange for zero-day exploits. Breach Forums is a known marketplace for cybercriminals to trade stolen data and exploits. The threat actor's post included a list of 140,000 alleged impacted organisations, claiming the stolen records contained encrypted SSO and LDAP passwords, Java Keystore (JKS) files, key files, and enterprise manager JPS keys. However, the threat actor stated that they could not decrypt the stolen passwords.

The data was allegedly stolen by compromising 'login.(region-name).oraclecloud.com' Oracle servers. They further claimed to an independent news outlet that the breach targeted a vulnerable Oracle Cloud server affected by a publicly known CVE, though no public proof-of-concept (PoC) or exploit exists.

Credibility of the Breach

Oracle has denied the breach, stating to multiple media outlets that no Oracle Cloud customers experienced data loss or compromise.

The cybersecurity firm CloudSEK analysed the forum post, and despite Oracle’s denial of the breach, asserts that their investigation revealed a compromised production SSO endpoint that supports the forum member's claim. They suggest that the attack may have leveraged a known critical vulnerability in Oracle Fusion Middleware, possibly CVE-2021-35587. CloudSEK confirmed that the affected server (login.us2.oraclecloud.com) was a legitimate production SSO endpoint used for OAuth2 authentication and token generation.

Impact

Out of an abundance of caution, for organisations listed among the 140,000, it is recommended to reset Oracle LDAP and SSO passwords, updating Oracle authentication methods, and rotating any other associated credentials.

While the extent of this alleged data breach is still being clarified, it is likely that several organisations beyond the 140,000 listed could also be affected, even if they are not direct Oracle Cloud customers. Many organisations use Software as a Service (SaaS) products hosted within Oracle Cloud, which could lead to more downstream impact.

Recommendation

While the extent of this alleged data breach is currently unknown, it is recommended to take the following precautions if your organisation was listed.

  • Reset/Rotate Oracle Credentials: Reset and/or rotate Oracle SSO and LDAP passwords, along with any associated credentials. Enforce strong password policies and implement Multi-Factor Authentication (MFA) to enhance security.
  • Update Oracle Authentication: Regenerate SASL/MD5 hashes for Oracle systems or migrate to a more secure authentication method.

References

 



Article Information Source: Artic Wolf

If you need further advice or help contact us today: hello@coolspirit.co.uk

Discover our latest insights

Enhance your knowledge by browsing our extensive library of case studies, brief sheets, data sheets, ebooks and white papers. If you have any immediate queries or requests, why not reach out to our team?