Saturday, April 12, 2025
HomeCyber Security NewsOracle Confirms The Data Breach- Starts Initiating Client Notifications

Oracle Confirms The Data Breach- Starts Initiating Client Notifications

Published on

SIEM as a Service

Follow Us on Google News

Oracle Corporation has confirmed a data breach involving its older Gen 1 servers, marking its second cybersecurity incident disclosed in recent weeks.

This breach underscores vulnerabilities in legacy systems and raises concerns about the company’s ability to safeguard sensitive client data.

Details of the Breach

According to a Cyber Security News report, the breach was first reported by a threat actor known as “rose87168,” on Breachforums on March 20, 2025.

- Advertisement - Google News

The attacker claimed access to approximately 6 million data records, including usernames, email addresses, hashed passwords, and sensitive authentication credentials such as Single Sign-On (SSO) and Lightweight Directory Access Protocol (LDAP) information.

Additionally, Java Key Store (JKS) files and Enterprise Manager JPS keys were exfiltrated. While no complete Personally Identifiable Information (PII) was exposed, Oracle confirmed that the compromised data is about 16 months old.

The hacker exploited a 2020 Java vulnerability to deploy malware and a web shell targeting Oracle’s Identity Manager (IDM) database.

The attacker reportedly gained access in January 2025 and remained undetected until late February, prompting Oracle to launch an internal investigation.

Oracle’s Response and Client Notifications

Oracle swiftly notified affected clients and reinforced security measures for its Gen 1 servers. The company emphasized that its Gen 2 servers and primary Oracle Cloud infrastructure remain unaffected.

It has reassured stakeholders that the breach was confined to legacy systems and took steps to mitigate the damage.

Despite Oracle’s assurances, cybersecurity firm CybelAngel reported that Oracle privately acknowledged unauthorized access to legacy systems.

The company is urging impacted clients to reset credentials, monitor for suspicious activity, and implement additional security measures to prevent further exploitation.

The attacker, “rose87168,” appears to be relatively new to the cybercrime scene, with their account created in March 2025.

Their primary motive seems to be financial extortion, as they demanded a $20 million ransom from Oracle. However, the hacker also expressed interest in exchanging stolen data for zero-day exploits, suggesting broader ambitions.

To substantiate their claims, “rose87168” released sample databases and LDAP credentials as proof. Security researchers validated portions of this data, confirming the breach’s authenticity.

This incident has drawn additional scrutiny over Oracle’s security measures given its recent history of similar cyberattacks.

Just weeks prior, Oracle disclosed another breach involving its Health division’s legacy Cerner servers, where patient data from U.S. healthcare organizations was compromised.

Although Oracle maintains these incidents are unrelated, the timing of the breaches has raised concerns about the company’s overall cybersecurity posture.

Experts warn that vulnerabilities in legacy systems, like the Gen 1 servers, pose significant risks if left unaddressed.

The incident underscores the challenges large enterprises face in securing outdated infrastructure while migrating to modern platforms.

Oracle’s response highlights the complexities of defending against evolving cyber threats and reinforces the need for comprehensive security measures in the face of increasingly sophisticated attacks.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...