CloudSEK Challenges Oracle’s Denial of Data Breach with Fresh Evidence

Oracle is currently embroiled in a significant cybersecurity crisis, following allegations of a major data breach impacting its cloud infrastructure. Recent investigations by cybersecurity firm CloudSEK revealed that a threat actor, known by the alias “rose87168,” purportedly exfiltrated 6 million records from Oracle Cloud. This breach reportedly stemmed from the compromise of a key Single Sign-On (SSO) endpoint, leading to the unauthorized access of sensitive information such as SSO and LDAP credentials, OAuth2 tokens, and details regarding customer tenants.

In response to the mounting accusations, Oracle has firmly denied any breach, asserting that “There has been no breach of Oracle Cloud.” The company contends that the credentials leaked by the threat actor are not connected to Oracle’s systems, insisting that none of its customers have been impacted. This assertion stands in stark contrast to CloudSEK’s findings, which were disclosed in detailed reports shared with both the public and Oracle.

CloudSEK has since conducted further analysis to solidify its claims about the breach, asserting that its research uncovered compelling evidence of malicious activity. In a recent blog post, the firm explained how they tracked the threat actor’s operations back to a compromised production SSO endpoint, specifically hosted at login.us2.oraclecloud.com, where they accessed data from over 140,000 tenant accounts.

Moreover, CloudSEK’s investigation revealed that the compromised domain was utilized for authenticating API requests through OAuth2 tokens. The evidence includes previously archived data from a public GitHub repository connected to Oracle’s official account, lending weight to claims that the endpoint was indeed operational and utilized for legitimate purposes, countering Oracle’s denial that the credentials were unrelated to its infrastructure.

One critical piece of evidence pertains to actual customer domain names identified by the hacker, which CloudSEK has confirmed as belonging to valid Oracle Cloud customers. These domains surfaced in various GitHub repositories and Oracle partner documents, undermining assertions that they were mere dummy accounts. The validity of the compromised endpoint has also been corroborated, demonstrating its active role in production configurations by major players like OneLogin and Rainfocus.

If the breach is validated, the implications could be severe. The potential exposure of 6 million records, which include encrypted SSO and LDAP passwords, raises significant concerns regarding unauthorized access, espionage, and further data breaches across impacted organizations. The detection of JKS files along with OAuth2 tokens within the compromised data may facilitate long-term control for attackers over the affected services.

CloudSEK has cautioned that these compromised credentials could be exploited further, suggesting a risk to enterprise systems if not addressed imminently. Additional complications arise from reported demands for ransom payments from the hacker to the affected businesses, compounding both financial and reputational risks.

In light of Oracle’s denial, CloudSEK’s CEO, Rahul Sasi, emphasized the importance of transparency over speculation, stating that the firm strives to provide concrete evidence through its findings. He advises that companies should promptly change their SSO and LDAP credentials, implement multi-factor authentication (MFA), and assess logs for any atypical activity linked to the compromised endpoint, while remaining vigilant against potential data leaks on dark web forums.

Security professionals have begun to express skepticism towards Oracle’s swift dismissal of the claims. Experts are pressing the company to clarify key aspects surrounding the alleged data breach. Questions abound regarding how a file purportedly uploaded by the threat actor was present in the Oracle Cloud subdomain, suggesting that unauthorized access may have occurred even if a full-scale compromise did not.

As the situation develops, the potential use of MITRE ATT&CK tactics could provide a framework for understanding the mechanisms of the attack. Techniques pertinent to initial access, such as exploiting vulnerabilities within the SSO endpoint, may have been employed alongside persistence mechanisms to ensure continued access to compromised services. Business owners are encouraged to monitor this unfolding situation closely as Oracle’s response and the implications of this breach will likely shape the landscape of enterprise cybersecurity practices moving forward.

Source