top of page

Oracle Cloud Reported Data Breach: A Wake-Up Call for Enterprise Security

  • Writer: Cytopus
    Cytopus
  • Mar 26
  • 2 min read

A recent cybersecurity controversy has surfaced. A hacker, identified as rose87168, claims to have breached Oracle Cloud's Single Sign-On (SSO) servers, exfiltrating 6 million data records. The hacker allegedly sells encrypted SSO passwords, Java Keystore (JKS) files, and other sensitive data on dark web forums, raising concerns about the security of cloud environments.


The Alleged Breach and Data Theft

The threat actor asserts that they gained access to Oracle Cloud servers around February 13th, 2025, by exploiting an undisclosed vulnerability. They claim the breach impacted the US2 and EM2 Oracle Cloud regions, allowing them to exfiltrate critical enterprise credentials. While Oracle maintains that there has been no compromise, the hacker has released samples of encrypted SSO passwords, LDAP hashed credentials, and enterprise key files to substantiate their claims.


Further adding to concerns, the hacker attempted to extort Oracle, demanding 100,000 XMR (Monero) for details about the exploited vulnerability. Oracle reportedly refused, leading to the data being put up for sale on underground forums. The actor has also offered to decrypt buyers' passwords and has pushed affected companies to pay ransom for data removal from the leaked lists.


Cloud-Based Threats Growing - Credential Theft

If proven true, this alleged breach could have devastating implications, including:

  • Credential Compromise: With access to SSO Credentials and LDAP hashes, attackers could pivot across enterprise environments, potentially breaching interconnected services.

  • Supply Chain Vulnerabilities: Exposure of Java Keystore (JKS) files could allow attackers to manipulate authentication mechanisms across multiple enterprise systems.

  • Regulatory Consequences: Data breaches of this scale may trigger investigations under GDPR, CRA, and NIS2, leading to fines up to €20 million or 4% of annual global revenue.

  • Reputational and Financial Damage: Companies relying on Oracle Cloud may face operational disruptions and loss of stakeholder trust due to the weak Cyber Intelligence and Posture.


Industry-Wide Implications: Growing Cloud Vulnerabilities

The Oracle Cloud incident is part of a broader trend of credential-based attacks on cloud environments. Similar incidents in recent years highlight the danger of unpatched vulnerabilities and weak access controls:

  • January 2024: Midnight Blizzard (APT29) hacked Microsoft corporate email accounts using a compromised test account with weak authentication settings.

  • 2023: LastPass suffered a breach where attackers stole password vaults due to unencrypted metadata exposure.

  • 2022: Okta, a leading identity provider, was compromised after a threat actor exploited a third-party vendor’s system, granting unauthorized access to customer accounts.


How Cytopus Can Help Your Business

By working with Cytopus, organizations can strengthen their security posture, mitigate risks, and achieve compliance with cybersecurity frameworks like GDPR, DORA, CRA, and NIS2.

  • Compliance and Regulatory Alignment: Our experts ensure adherence to global security regulations, preventing financial and legal consequences from cloud-based breaches.

  • Vulnerability Management and Threat Detection: Cytopus continuously scans enterprise networks for unpatched cloud vulnerabilities and credential exposure risks.

  • Continuous Monitoring and Incident Response: We provide 24/7 cloud security monitoring to detect unauthorized access attempts and neutralize potential threats.

  • Business Continuity and Disaster Recovery Planning: Our team helps organizations develop and test disaster recovery plans, ensuring resilience against credential-based cyberattacks and cloud service disruptions.

bottom of page