In March 2025, Oracle faced a significant security incident when a threat actor publicly claimed a breach of their cloud infrastructure on Breachforums. The breach reportedly involved unauthorized access to Oracle's Gen 1 servers, prompting the company to notify affected customers about the data exposure.
"Oracle has acknowledged a security incident involving unauthorized access to its cloud infrastructure to select clients," stated Todd Carroll. The data in question included a trove of sensitive information, with estimates suggesting around 6 million records were compromised. This data was allegedly being offered for sale online, complete with ransom demands and propositions for trading zero-day exploits, highlighting a troubling trend in the cybersecurity landscape.
"Oracle has acknowledged a security incident involving unauthorized access to its cloud infrastructure to select clients,"
Following the initial claims, the hacker reinforced their credibility by supplying proof and samples of the stolen data. This breach signifies a shift as attackers increasingly seek not just financial gain but also leverage their stolen information to acquire further exploits.

In response to the breach allegations, Oracle took proactive steps to fortify their security. According to leaked information, the exposed data comprised sensitive SSO (Single Sign-On) and LDAP credentials, JKS files, passwords, and enterprise manager keys. Additionally, data including email addresses, usernames, and hashed passwords were reported as part of the compromise.
Despite the claims of a breach, Oracle firmly denied any successful infiltration of their systems. In a statement to Bleeping Computer, the company asserted, "There has been no breach of Oracle Cloud. The published credentials are not for the Oracle Cloud. No Oracle Cloud customers experienced a breach or lost any data." This denial proposes a complex narrative, leaving customers and industry experts questioning the extent of the incident.
CybelAngel's investigation has unveiled further details surrounding the breach. According to an anonymous source, Oracle communicated with its stakeholders about a security incident involving their Gen 1 servers. Reports suggest that the attacker exploited a Java vulnerability that dated back to 2020, enabling them to install webshells and targeted malware, specifically designed for Oracle's IDM database.
"The breach was first detected in late February, and Oracle acted quickly to contain the threat and reinforce security protocols around the compromised servers," the CybelAngel source reported. Following the attacker's initial ransom demand, Oracle was able to eliminate the threat within days, indicating a swift internal response to the crisis.
"The breach was first detected in late February, and Oracle acted quickly to contain the threat and reinforce security protocols around the compromised servers,"

The compromised data reportedly had a timeline of exposure stretching back about 16 months, raising concerns about the effectiveness of Oracle's data protection strategies. While the details suggest no complete Personally Identifiable Information (PII) was exposed, the risk to users’ security remains concerning as harmful actors continue to thrive in the cybercriminal realms.
One notable figure in this incident is the threat actor identified as “rose87168.” Known for their relatively recent presence in the underground community, this cybercriminal launched their account shortly before the breach announcement.
"rose87168 appears to be a new player in the threat landscape, focused on financial gains through data theft," said the CybelAngel analysis team. Their low activity levels suggest they may still be establishing a foothold in this complex world of cybersecurity threats.
"rose87168 appears to be a new player in the threat landscape, focused on financial gains through data theft,"
As the cybersecurity community continues to dissect this incident, questions remain regarding both Oracle's response and the implications for data protection. Users are left to navigate the aftermath of this breach, emphasizing the need for vigilance in an era increasingly dominated by cyber threats.
The Oracle data breach underscores an urgent need for organizations to bolster their cybersecurity measures, enhance data monitoring protocols, and prepare for potential breaches. As cyber threats evolve, both businesses and individuals must remain proactive in protecting sensitive information from exploitation in a rapidly changing digital landscape.

