Federal cybersecurity officials on Wednesday warned of the potential fallout of a data breach impacting Oracle.
For weeks, Oracle privately warned customers of a January incident where hackers stole information and accessed client credentials held on legacy Oracle systems.
BleepingComputer and Bloomberg reported throughout March and April that Oracle customers were told privately of multiple security incidents, even though the company avoided publicly addressing the issue. The company claimed in one email to customers that Oracle Cloud Infrastructure (OCI) was not breached but a hacker “did access and publish user names from two obsolete servers that were never a part of OCI.” The FBI and CrowdStrike are investigating the incident, according to the letter Oracle sent to customers.
The incident came into public view when the alleged hacker behind the incident took to social media to boast of the theft and offer the stolen documents for sale on cybercriminal forums.
CloudSEK, CybelAngel and several other cybersecurity firms confirmed the threat actor, known as “rose87168,” was selling 6 million records extracted from Oracle Cloud’s Single Sign-On (SSO) and Lightweight Directory Access Protocol (LDAP) systems, impacting over 140,000 tenants across multiple regions and industries.
CloudSEK and others examined the data breach and found encrypted passwords, key files and other sensitive information. The hacker, according to CloudSEK, was seen soliciting help from other hackers to decrypt the stolen credentials and threatening Oracle customers — pledging to remove their data for a fee.
On Wednesday, the Cybersecurity and Infrastructure Security Agency (CISA) said that while the scope of the incident remains unconfirmed, the “nature of the reported activity presents potential risk to organisations and individuals, particularly where credential material may be exposed, reused across separate, unaffiliated systems, or embedded.”
“When credential material is embedded, it is difficult to discover and can enable long-term unauthorised access if exposed,” CISA said.
“The compromise of credential material, including usernames, emails, passwords, authentication tokens, and encryption keys, can pose significant risk to enterprise environments.”
The agency added that threat actors often weaponise these kinds of credentials to escalate their privileges and move around networks; access cloud and identity management systems; conduct phishing and business email compromise campaigns; resell access to stolen credentials; and enrich previously stolen data for targeted intrusions.
CISA urged organisations to reset all passwords for any affected services, review source code for any potential issues, monitor authentication logs for anomalous activity, and report any incidents to authorities.
At least three Oracle Cloud customers confirmed to news outlets that their information was in the leaked data set.
"*" indicates required fields
Software Asset Management is a business practice that involves managing and optimising the life cycle of software within an organisation.
Software asset management is relevant to many facets of a business - take a look at some of the roles that it can form part of the focus of.
Software vendors come in all shape and sizes - all with their own set of licensing models and rules. We take a look at just a few of them.
As a constantly evolving subject, SAM is not without its challenges. We take a look at some of the most common ones.
Wondering what an investment in SAM could do for your business? Fill out a few details and find out what return you could get!
Answer a few questions about your SAM infrastructure & experience, and we'll put together a personalised recommendation for the future.
A simple health check of what's being used across your Office 365 estate in this FREE, Microsoft backed and easy to setup review.
Just like you would with your vehicle each year, get an annual check up of your software asset management programme.
Overwhelmed by the task of documenting the steps for a successful SAM programme? Get the experts in to help!
Concerned your SAM tools aren't covering your whole estate? Or on the look out for an entirely new tool? Get us in to assist.
Not content with covering all things SAM related, we've teamed up with Capital to provide a comprehensive hardware asset management review.
A simple, one-time reconciliation of the software you have deployed versus the licence entitlement you own.
A regularly scheduled analysis of your organisation's estate, specifically adapted to your needs and budget.
A full appraisal of your Microsoft 365 setup and how best to optimise it through automated recommendations.
An add-on to our SAMplicity One, MOT and Plus offerings, quickly diagnose your ability to migrate your resources to the cloud.
In collaboration with law firm Addleshaw Goddard, ensure the legality of your SAM programme and get assistance with any contract disputes.
Available as standard with SAMplicity Plus, ensure you're compliant if you're unexpectedly audited by a vendor.
We've teamed up with some of the forefront experts in licensing knowledge so you can teach yourself to be an expert too.
Stumped by the continually evolving complexities of SAM? Join us for one of our comprehensive courses, either in-person or online.
It’s chock full of useful advice, exclusive events and interesting articles. Don’t miss out!