Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape
/Incidents
Incidents
/
Oracle Cloud Potential Supply Chain Breach

Oracle Cloud Potential Supply Chain Breach

Type
Incident
Actors
❓Unknown
Pub. date
March 21, 2025
Initial access
1-day vulnerability
Impact
Data exfiltrationSupply chain attack
Observed techniques
Vulnerability exploitation
Targeted technologies
Oracle Cloud
References
https://www.cloudsek.com/blog/the-biggest-supply-chain-hack-of-2025-6m-records-for-sale-exfiltrated-from-oracle-cloud-affecting-over-140k-tenants
Status
Finalized
Last edited
May 8, 2025 9:50 AM

On March 21, 2025, CloudSEK reported that a threat actor using the alias "rose87168" is claiming to have exfiltrated over 6 million records from Oracle Cloud’s SSO and LDAP systems. According to CloudSEK’s assessment, the leaked data includes sensitive authentication materials such as JKS files, encrypted passwords, and key files. The actor is reportedly offering the data for sale and urging affected organizations to pay for its removal. These claims, if verified, could implicate over 140,000 Oracle Cloud tenants, but at the time of writing, Oracle has denied any breach, claiming that the published credentials are not for Oracle Cloud. As of March 23, 2025, actual impact isn't clear.

CloudSEK’s analysis suggests the attacker may have exploited an undisclosed vulnerability in an Oracle Cloud login endpoint (login.region-name.oraclecloud.com). One potential vector is CVE-2021-35587, a known critical vulnerability in Oracle Access Manager (OpenSSO Agent) associated with Oracle Fusion Middleware. The affected endpoint (login.us2.oraclecloud.com) was reportedly last updated in 2014 and may have been running legacy middleware versions.

While the attacker’s claims have not been independently verified, CloudSEK's findings indicate that the accessed data includes JPS keys, key stores, and encrypted credentials. A text file allegedly uploaded by the threat actor and subsequent darknet activity point to possible exploitation of outdated systems. There is currently no public proof of concept or confirmed exploit path, and Oracle has denied the occurrence of any security incident related to this claim.

Made with 💙 by Wiz

Last Updated: April 3, 2025