{"id":8889,"date":"2025-03-05T02:03:08","date_gmt":"2025-03-04T17:03:08","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=8889"},"modified":"2025-09-08T02:06:02","modified_gmt":"2025-09-07T17:06:02","slug":"oracle-cloud-breach-6-million-records-exposed","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/oracle-cloud-breach-6-million-records-exposed\/","title":{"rendered":"Oracle Cloud Breach 6 Million Records Exposed"},"content":{"rendered":"\n<p>A major breach targeted Oracle Cloud in March 2025, with the threat actor \u201crose87168\u201d claiming to have stolen 6 million records containing sensitive credentials, including SSO passwords and Java KeyStore files, impacting over 140,000 tenant organizations worldwide. <br>The attacker attempted to extort Oracle, demanding $20 million in exchange for technical information. Oracle initially denied the breach but later began notifying affected customers, attributing the exposed data to outdated systems in a move met with skepticism. Security researchers linked the incident to exploitation of the CVE-2021-35587 vulnerability in Oracle Fusion Middleware, raising concern about cloud providers&#8217; ongoing vulnerability to aggressive, high-stakes extortion campaigns and making this one of the month\u2019s most widely discussed incidents.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A major breach targeted Oracle Cloud in March 2025, with the threat actor \u201crose87168\u201d claiming to have stolen 6 million records containing sensitive credentials, including SSO passwords and Java KeyStore files, impacting over 140,000 tenant organizations worldwide. The attacker attempted to extort Oracle, demanding $20 million in exchange for technical information. Oracle initially denied the breach but later began notifying<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":8419,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[226,220,10,2],"tags":[],"class_list":["post-8889","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-finance-and-legal","category-government-advisory","category-latest_vulnerabilities","category-ce_news"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2023\/05\/Picture1-11.jpg?fit=1375%2C917&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8889"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=8889"}],"version-history":[{"count":1,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8889\/revisions"}],"predecessor-version":[{"id":8890,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8889\/revisions\/8890"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/8419"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=8889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=8889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=8889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}