Cloud Security

The Oracle Breach: Data exposure, denial, and cloud security lessons

Oracle Corporate Headquarters and Trademark Logo

COMMENTARY: Just a short couple of weeks ago, Oracle Corporation became the center of a major cybersecurity incident involving the unauthorized access and theft of sensitive data from its cloud services.

Reports suggest that the compromised information includes 6 million records, credentials, encryption keys, and other authentication-related data belonging to both Oracle and its customers.

[SC Media Perspectives columns are written by a trusted community of SC Media cybersecurity subject matter experts. Read more Perspectives here.]

This breach has sparked significant concerns among Oracle Cloud users and the broader tech community—not only regarding the security of their data, but also Oracle’s apparent lack of transparency in responding to the attack. The threat actor, identified as “rose87168,” has released evidence supporting their claims, adding pressure on Oracle to acknowledge the incident.

Oracle Cloud provides a comprehensive suite of cloud-based applications and services, including infrastructure, platform, and Software-as-a-Service. It’s particularly attractive to enterprises with complex database needs and organizations using enterprise applications such as customer relationship management (CRM), human capital management (HCM), and supply chain management (SCM).

Oracle's cloud products are widely-adopted across industries including healthcare, life sciences, telecommunications, finance, and technology, with many Fortune 500 companies among its users.

Over the years, Oracle has expanded its portfolio through strategic acquisitions, such as its 2022 purchase of Cerner for $28 billion, strengthening its presence in the healthcare sector. This raises concerns about potential HIPAA violations and regulatory fines resulting from data exposure, concerns that were realized just the other day when it was reported that the legacy data migration servers were attacked at Oracle Health.

The March breach

On March 21, 2025, cybersecurity firm CloudSEK revealed details of the original attack, alleging that a threat actor had gained access to Oracle Cloud’s single sign-on (SSO) and LDAP systems. Stolen data reportedly includes Java KeyStore (JKS) files, encrypted authentication credentials, key files, and Enterprise Manager Java Platform Security (JPS) keys—critical components for securing authentication and communication in Oracle’s cloud infrastructure.

It's suspected that the attackers exploited a previously patched vulnerability in Oracle Access Manager. While no official post-mortem has been released, it’s possible that some servers were left unpatched, legacy systems were involved, or the attacker had established persistence before the fix was applied in 2022. Reports indicate that the breach entry point was an outdated version of Oracle Fusion Middleware hosted at login.us2.oraclecloud.com, which was taken offline after the attack became public.

Despite multiple findings from independent security researchers, Oracle has categorically denied any breach, stating:

"There has been no breach of Oracle Cloud. The published credentials are not for the Oracle Cloud. No Oracle Cloud customers experienced a breach or lost any data."

Even if there’s a small chance that Oracle’s claims are accurate, the company’s response appears inadequate for a public company subject to global regulatory requirements. Transparency and accountability are critical when handling security incidents, as they affect not just a company’s own operations, but also those of customers and partners across the supply chain. A lack of clear communication can erode trust and leave users uncertain about the safety of their data.

In response to this incident, organizations using Oracle Cloud should take immediate steps to assess and secure their environments. The following actions are recommended:

  • Credential discovery and reset: Identify all credentials, keys, identities and roles in the organization’s cloud environment. Review their last usage to verify legitimacy and reset or revoke any unused credentials to prevent exploitation.
  • Enhanced monitoring: Implement additional security monitoring to detect unauthorized access and suspicious activities, especially focusing on attack patterns linked to this breach.
  • System audit: Conduct a thorough audit of logs and security tools, paying particular attention to access patterns and authentication mechanisms that could have been targeted.
  • Demand accountability from Oracle: As a cloud customer, request clear answers from Oracle regarding data integrity and security assurances. Stay updated on any new findings or changes to Oracle’s security posture.
  • Beyond responding to this particular breach, all organizations—whether using Oracle Cloud or other providers—should follow best practices to enhance their cloud security posture:

    • Keep systems up-to-date: Regularly apply security patches and updates to remediate vulnerabilities before attackers can exploit them.
    • Adopt a zero-trust model: Strengthen security by enforcing strict access controls and continuously verifying users, devices, and services attempting to access sensitive resources.
    • Prioritize security awareness: Conduct ongoing cybersecurity training to ensure employees recognize potential threats and follow best security practices.
    • Develop a robust incident response plan: Establish, test, and regularly update an incident response plan to ensure readiness for future breaches. Tabletop exercises and simulations can help improve preparedness.
    • The March incident involving Oracle reinforces the principle that cloud security is a shared responsibility. Organizations cannot assume that their cloud provider offers absolute protection. Mistakes, misconfigurations, and vulnerabilities are inevitable. Security and DevOps teams must proactively prepare for such risks, implementing the right security measures to limit the impact of breaches.

      Moreover, this breach raises broader questions about vendor transparency and accountability. Customers should demand higher standards, choosing cloud providers not just based on features and pricing, but on their commitment to security, transparency, and trust.

      Shira Shamban, vice president of cloud, CYE

      SC Media Perspectives columns are written by a trusted community of SC Media cybersecurity subject matter experts. Each contribution has a goal of bringing a unique voice to important cybersecurity topics. Content strives to be of the highest quality, objective and non-commercial.

      An In-Depth Guide to Cloud Security

      Get essential knowledge and practical strategies to fortify your cloud security.

      Get daily email updates

      SC Media's daily must-read of the most current and pressing daily news

      By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

      You can skip this ad in 5 seconds