Hacker alleged breaking into Oracle Cloud's servers through a vulnerability.
Oracle has dismissed the purported compromise of its Oracle Cloud single sign-on servers.
After claims were made by the threat actor 'rose87168' about exfiltrating six million records belonging to the firm's customers, including encrypted Oracle Cloud SSO and LDAP passwords, Java KeyStore files, and Enterprise Manager JPS keys, an Oracle spokesperson said "there has been no breach of Oracle Cloud.”
In a statement to The Register, the spokesperson said: “The published credentials are not for the Oracle Cloud. No Oracle Cloud customers experienced a breach or lost any data.”
In a post on BreachForums, rose87168 alleged breaking into Oracle Cloud's servers through a vulnerability, which CloudSEK believes might have been the CVE-2021-35587.
Oracle was also allegedly demanded to pay over $200 million worth of cryptocurrency as ransom, with the company's refusal now prompting rose87168 to seek assistance in decrypting the stolen credentials. "...[I]f someone can tell me how to decrypt them, I can give them some of the data as a gift," said rose87168.
Written by
Dan Raywood is a B2B journalist with 25 years of experience, including covering cybersecurity for the past 17 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.
He has spoken at events including 44CON, Infosecurity Europe, RANT Forum, BSides Scotland, Steelcon and the National Cyber Security Show, and served as editor of SC Media UK, Infosecurity Magazine and IT Security Guru. He was also an analyst with 451 Research and a product marketing lead at Tenable.