Dive Brief:
- Security researchers are analyzing a 10,000-line dataset provided by a hacker who claimed to have breached Oracle Cloud. The threat actor claimed to have 6 million Oracle Cloud records, which may have impacted more than 140,000 tenants.
- The sample being analyzed has information on about 1,500 organizations, which, if confirmed, would underscore the breadth of the exfiltrated data, according to researchers at CloudSEK.
- There is evidence that indicates the hacker gained access to production environments based on the formatting of tenant IDs, according to researchers.
Dive Insight:
Oracle previously denied the claims of a breach, and it has not responded to numerous requests for comment by Cybersecurity Dive.
As previously reported, a hacker identified as rose87168 claimed credit for the incident, which they said was done by exploiting a vulnerability in Oracle Cloud’s login endpoint.
The alleged breach involved CVE-2021-35587, a vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware. The vulnerability, with a CVSS score of 9.8, allows an unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager.
CloudSek plans to release additional findings on the threat actor sample, but it said existing evidence points to the sample being authentic and without any test or dummy data.
Researchers said the dataset contains numerous individual email addresses, which point to organizations allowing or using SSO-based authentication.