URL has been copied successfully!
Oracle Cloud breach may impact 140,000 enterprise customers
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Business impact and risks: In an alarming development, the threat actor has initiated an extortion campaign, contacting affected companies and demanding payment to remove their data from the stolen cache. This creates immediate financial pressure and complex legal and ethical decisions for victims regarding ransom payments.To increase pressure on both Oracle and affected organizations, the attacker has established a presence on social media platform X (formerly Twitter), following Oracle-related accounts and presumably preparing to increase public visibility of the breach if ransom demands aren’t met.”Companies affected by the breach can contact me to publicly verify if their data originates from Oracle Cloud, and I’ll remove it from my dataset slated for sale,” the hacker with the alias “rose87168″ wrote in an X post.With over 140,000 tenants potentially affected, the breach carries substantial supply chain implications, as compromised authentication mechanisms could allow attackers to pivot between connected organizations and systems. This multiplier effect dramatically increases the potential damage radius beyond the initial breach. Recommended mitigation steps: CloudSEK has outlined a comprehensive response strategy for potentially affected organizations.”The first priority is immediate credential rotation resetting all passwords for LDAP user accounts, with particular attention to privileged accounts such as Tenant Administrators that could provide broad access across systems,” the report suggested.Security teams should implement stronger authentication controls, including multi-factor authentication (MFA) and enhanced password policies. This helps mitigate the risk of credential reuse even if the stolen encrypted passwords are eventually decrypted by attackers.The report also added that organizations must regenerate and replace all affected certificates, including any SSO, SAML, or OIDC secrets associated with the compromised LDAP configurations. This cryptographic hygiene is essential to restore trust in the authentication mechanisms.”The sophistication of this attack highlights the continued challenges in securing cloud environments, particularly around authentication systems,” CloudSEK said in the report. “Organizations using Oracle Cloud services should treat this as a critical security incident requiring immediate action, regardless of whether they’ve been directly notified of compromise.”

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3852643/oracle-cloud-breach-may-impact-140000-enterprise-customers.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link