cyberplace.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Cybersecurity, fandom, video games, technology, dog photos and most importantly, you.

Server stats:

882
active users

Somebody is claiming to have exfiltrated 6 million lines of data with Oracle Cloud’s SSO and LDAP that includes JKS files, encrypted SSO passwords, key files and enterprise manager JPS keys from servers on login.*.oraclecloud.com

The poster has no prior reputation, it is unclear if they're LARPing. Some of the sample data does align with prior infostealer logs, I'm told. breachforums.st/Thread-SELLING

If anybody is interested, the servers they claim they targeted all run Oracle WebLogic and are managed by Oracle as a SaaS service.

Has anybody else got Oracle to comment on this? No reply to my queries.

Kevin Beaumont

Oracle are denying a breach to @BleepingComputer, but the threat actor has provided an archived URL which suggests they somehow uploaded a file to the Oracle Access Manager (SaaS solution) frontend.

web.archive.org/web/2025030116

The Oracle thing keeps getting more strange. The threat actor has supplied an hour long YouTube video, which appears to be taken from an endpoint inside Oracle... in 2019. They've also supplied a dump of data from 2025, to Hudson Rock. youtube.com/watch?v=375_G9wAff

If anybody from Oracle follows me, I definitely think the OCI team needs to spin up security incident response on that YouTube video to try to find out what was happening. It looks like it may be a Citrix session recording of a staff member's access in OCI.

Hudson Rock are reporting the Oracle Cloud breach claim threat actor has provided 10k records, and they appear genuine according to one of their customers.

linkedin.com/posts/alon-gal-ut

It’s unclear to me exactly what is happening with this one as the threat actor doesn’t appear to understand basic English grammar.. but there are signs something has happened at Oracle.

Big problem for Oracle as I’m not sure how plausible denials will be when threat actor, who sounds 12, is dumping data online.

Also, that YouTube video I linked above has two hours of audio of Oracle employees talking. I haven’t transcribed it yet.

Separately, the threat actor has shared what they claim to be current config files from Oracle Cloud servers with a different reporter.

I’m deliberately staying out of this one for now as I’m trying to finish Assassin’s Creed Shadows first.. but I think Oracle may have a pending PR disaster when the TikTok deal is due to complete.

@GossiTheDog What are the odds on CVE-2024-8068 and CVE-2024-8069?

@GossiTheDog Never enough popcorn for #Oracle, my least favorite tech company of all time, including those dudes who claimed to own Linux I can't remember the name of.

@DJGummikuh @GossiTheDog Oracle is the IT Vendor equivalent of Lucy moving thw football on Charlie Brown. I don't know how they still exist.

@GossiTheDog why would they tell the truth? Isn’t Larry buddies with Trump? I think we’re about to see just how much oligarchy we have already.

@GossiTheDog I deeply respect that you got your priorities straight 🤣 👍

@GossiTheDog p.s. doesn't appear to have any sensitive customer information in this sample:

ChatGPT:
After reviewing it, there do not appear to be any sensitive details such as:

Email addresses

Usernames

Passwords

API keys

Personally identifiable information (PII)

The transcript is primarily a technical discussion about system upgrades, pre-checks, configuration files, CLI usage, and server operations. It references general hostnames and commands but does not disclose any security credentials or private user data.

@GossiTheDog is available a public list with the domains involved ?

@GossiTheDog @hacks4pancakes as they finalize their talks to control US TikTok

@GossiTheDog OAM11g I haven’t seen used in well over a decade. Surprising they would be using that in a production server let alone unpatched. This CVE was patched by them in January 2022

@GossiTheDog looks like recorded support calls that could have been in breached storage to me.

@GossiTheDog @BleepingComputer

One thing you point out here has me thinking...
Does Oracle Cloud = Oracle Access Manager?

Looking at Oracle's own page on that, one could see it as a middleware component

oracle.com/middleware/technolo

Feels like Oracle is being very specific in their denial, but should we be asking a more specific question?

@definity @GossiTheDog @BleepingComputer ive been wondering that too. Or even the word breach. They arent even saying theres an incident to talk about.

Definitions are useful and important, but a vendor does the public great disservice by hanging them by the neck with word play

@0ddj0bb @definity @BleepingComputer yeah, I’ve had similar thoughts on both counts.