The Register: There are perhaps 10,000 reasons to doubt Oracle Cloud’s security breach denial

Source URL: https://www.theregister.com/2025/03/25/oracle_breach_update/
Source: The Register
Title: There are perhaps 10,000 reasons to doubt Oracle Cloud’s security breach denial

Feedly Summary: Customers come forward claiming info was swiped from prod
Oracle Cloud’s denial of a digital break-in is now in clear dispute. A infosec researcher working on validating claims that the cloud provider’s login servers were compromised earlier this year says some customers have confirmed data allegedly stolen and leaked from the database giant is genuine.…

AI Summary and Description: Yes

Summary: The recent dispute over Oracle Cloud’s claim of no security breach highlights potential vulnerabilities and customer data risks. An infosec researcher asserts that evidence suggests compromised login servers and genuine stolen data, raising concerns for security professionals managing data integrity and access control.

Detailed Description:
The text discusses a disputed security incident involving Oracle Cloud, where an infosec researcher claims that Oracle’s denial of a breach contradicts accounts from several impacted customers. Here are the significant points of interest:

– **Claims of a Security Breach**: A researcher, identified as rose87168, asserts that approximately six million records, including customer security keys and encrypted credentials, were stolen from Oracle Cloud’s login servers.
– **Customer Confirmation**: Multiple customers of security firm Hudson Rock confirmed that the leaked data includes sensitive information belonging to their users, indicating potential validity to the breach claims.
– **Oracle’s Denial**: Oracle has categorically denied any breach and claims that the published credentials are unrelated to Oracle Cloud and that no customers lost data.
– **Exploitation of Vulnerabilities**: Alleged exploitation of CVE-2021-35587, a critical vulnerability in Oracle Access Manager, is highlighted as the possible entry point for the attacker, raising questions about the company’s patching practices.
– **Nature of Leaked Data**: The leaked information is extensive and structured, making fabrication improbable, according to experts from CloudSEK.
– **Potential Impacts**: Should the data prove authentic, it could lead to significant cybersecurity threats, including supply chain attacks, ransomware, and identity theft, given the nature of the stolen credentials.
– **Recommendation to Organizations**: Experts recommend that affected organizations rotate their SSO and LDAP credentials, reinforce strong password policies, and consider implementing multi-factor authentication (MFA).
– **Incident Response Guidelines**: Companies are advised to activate their incident response plans to detect unauthorized access or intrusions.

This incident underscores the importance of proactive security measures, patch management, and established protocols for addressing potential breaches in cloud environments, making it pertinent for professionals engaged in AI, infrastructure, and security compliance.