
In the context: As with recognition, data violations have become real in life. We cannot go more than a month without a company or another that one of the infiltrators or weak security hygiene left its customers exposed. Although this is annoying, it is more annoying when the company tries to hide infiltration.
Earlier this month, the actor of the threat that Rose87168 would have claimed that he violated the Oracle Cloud SSO and ignored about 6 million records, affecting more than 144,000 Oracle customers. The infiltrators provided an internal customer list and threatened to sell data unless customers are paid to remove their data from TRVE, which included one registration adoption data, passwords for access to light guide, OAUTH2 switches, tenant data, and more. Rose87168 also requested help from the piracy community to break the retail passwords in the trade of some data.
A day after the representative of the threat published a small sample of data, Oracle Bleeping Computer told that there was nothing Break From her cloud service. When Oracle denies, the Rose87168 began to leak a “proof” of the media and security searches. Hudson Rock and experts in CloudSek have concluded that data and accreditation data are legitimate.
CloudSek said that the infiltrator appears to have used a security vulnerability for a zero day (Cve-2021-35587In the Oracle Fusion Middleware Break Oracle Cloud Systems without approval.
“Oracle has denying a very crazy this leak, which was independently verified by many cyber security companies,” Hudson Rock CTO Alon Gal to publish LinkedIn on Monday.
TRUSTWAVE SpiderLabs also reviewed evidence conclude The data was definitely from Oracle Cloud servers.

“The data set for the provided heads is a very detailed and sensitive user guide, which is likely to be extracted from the company’s identity management system and access management or integrated human resources guide such as Microsoft Active Directory or Oracle Identity Manager or a similar platform”, the security consultative reading of Trustwave.
Al -Aman also confirmed that the interim memory included personal identification information such as the first and last names, full display names, email addresses, job addresses, departments numbers, phone numbers, mobile phone numbers and even home communication details. The infiltrator also downloaded a registration From the inner Oracle meeting.
“This data is coordinating a leak that forms severe cybersecurity and the operational risks of the affected organization,” added Trustwave.
Moreover, cyber security specialist Kevin Boumont noticed that Oracle.Repeat“Legacy Oracle Cloud Services As” Oracle Classic. “It claims that the company’s accurate formulation in its response is a technically realistic but deceptive denial.
“There was no violation of Oracle Claude. The published accreditation data is not dedicated to Oracle Cloud. Oracle Cloud customers have not experienced a violation or lost any data.”
Beaumont found the repeated use of the suspicious “Oracle Cloud” as if he had prepared Oracle Classic to take autumn. However, regardless of the age of the penetrated servers, CloudSek confirmed through some of its customers that the data was accurate and modern. This conclusion exposes any idea that the breach was unimportant or contained old information.
Despite many researchers who reported that the data breach is seriously concerned, Oracle remained silent because he denied the attack. Poemont says the company’s silence is not responsible. Likewise, Gall called Oracle’s lack of transparency and guidance “crazy”. After there is no advice from the company, the GAL gave the affected customers to the recommendations of the cloudsek to reduce any possible damage of the leakage.