GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 21-Mar-2025 22:00:36 JST Kevin Beaumont Kevin Beaumont

    Somebody is claiming to have exfiltrated 6 million lines of data with Oracle Cloud’s SSO and LDAP data that includes JKS files, encrypted SSO passwords, key files and enterprise manager JPS keys from servers on login.*.oraclecloud.com

    The poster has no prior reputation, it is unclear if they're LARPing. Some of the sample data does align with prior infostealer logs, I'm told. https://breachforums.st/Thread-SELLING-Oracle-cloud-traditional-hacked-login-X-oraclecloud-com

    #threatintel

    In conversation about 2 months ago from cyberplace.social permalink

    Attachments


    1. https://cyberplace.social/system/media_attachments/files/114/200/517/844/862/858/original/1563ce5dafbde69c.png
    2. No result found on File_thumbnail lookup.
      BreachForums
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 21-Mar-2025 22:03:03 JST Kevin Beaumont Kevin Beaumont
      in reply to

      If anybody is interested, the servers they claim they targeted all run Oracle WebLogic and are managed by Oracle as a SaaS service.

      In conversation about 2 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Saturday, 22-Mar-2025 03:32:41 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Has anybody else got Oracle to comment on this? No reply to my queries.

      In conversation about 2 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Saturday, 22-Mar-2025 05:51:11 JST Kevin Beaumont Kevin Beaumont
      in reply to
      • BleepingComputer

      Oracle are denying a breach to @BleepingComputer, but the threat actor has provided an archived URL which suggests they somehow uploaded a file to the Oracle Access Manager (SaaS solution) frontend.

      https://web.archive.org/web/20250301161517/http:/login.us2.oraclecloud.com/oamfed/x.txt?x

      In conversation about 2 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/202/394/913/416/345/original/b1a12b9c76ad2a57.jpeg
      2. Domain not in remote thumbnail source whitelist: web-static.archive.org
        Wayback Machine
    • Embed this notice
      Silva (pesilva@fosstodon.org)'s status on Saturday, 22-Mar-2025 08:37:27 JST Silva Silva
      in reply to

      @GossiTheDog
      As far as I know, no official comment from Oracle, but big customers are already being contacted and credentials/mfa are being reset as we speak.

      In conversation about 2 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Tuesday, 25-Mar-2025 03:03:26 JST Kevin Beaumont Kevin Beaumont
      in reply to

      The Oracle thing keeps getting more strange. The threat actor has supplied an hour long YouTube video, which appears to be taken from an endpoint inside Oracle... in 2019. They've also supplied a dump of data from 2025, to Hudson Rock. https://www.youtube.com/watch?v=375_G9wAffo

      In conversation about 2 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/218/711/742/869/667/original/8382310060762807.png

      2. https://cyberplace.social/system/media_attachments/files/114/218/715/149/037/272/original/e9928ab55ae16003.png

      3. https://cyberplace.social/system/media_attachments/files/114/218/717/325/542/819/original/cb8c83c51c73398b.png

      4. https://cyberplace.social/system/media_attachments/files/114/218/721/581/577/187/original/7f22d3be1eae3bae.png
      5. Oracle Unconfirmed Data Breach - Rose87168 claims this video was downloaded from Oracle's servers
        from Hudson Rock
        Source - https://x.com/rose87168/status/1904197798943195277Uploaded by Hudson Rock - https://www.hudsonrock.com
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Tuesday, 25-Mar-2025 03:11:20 JST Kevin Beaumont Kevin Beaumont
      in reply to

      If anybody from Oracle follows me, I definitely think the OCI team needs to spin up security incident response on that YouTube video to try to find out what was happening. It looks like it may be a Citrix session recording of a staff member's access in OCI.

      In conversation about 2 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/218/745/158/497/859/original/b5b36c0daca27d37.png
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Tuesday, 25-Mar-2025 04:43:29 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Hudson Rock are reporting the Oracle Cloud breach claim threat actor has provided 10k records, and they appear genuine according to one of their customers.

      https://www.linkedin.com/posts/alon-gal-utb_big-i-just-received-10000-records-from-activity-7310017463516127232-XWbI

      It’s unclear to me exactly what is happening with this one as the threat actor doesn’t appear to understand basic English grammar.. but there are signs something has happened at Oracle.

      Big problem for Oracle as I’m not sure how plausible denials will be when threat actor, who sounds 12, is dumping data online.

      In conversation about 2 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/219/115/581/579/873/original/d470ab9984e4af67.jpeg
      2. Domain not in remote thumbnail source whitelist: media.licdn.com
        Big - I just received 10,000 records from the Oracle breach, given to me… | Alon Gal
        Big - I just received 10,000 records from the Oracle breach, given to me by 'rose87168,' and I’m actively working to validate the claims (initial feedback from…
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Tuesday, 25-Mar-2025 20:01:45 JST Kevin Beaumont Kevin Beaumont
      in reply to

      CloudSEK are doubling down on their Oracle Cloud breach reporting, despite a denial from Oracle: https://cloudsek.com/blog/part-2-validating-the-breach-oracle-cloud-denied-cloudseks-follow-up-analysis

      I am still looking into this and will probably do a blog post this week. The threat actor is still dropping files everywhere and they do tend to point to a security incident at Oracle Cloud.

      In conversation about 2 months ago permalink

      Attachments


    • Embed this notice
      0ddj0bb Is At Cyphercon (0ddj0bb@infosec.exchange)'s status on Tuesday, 25-Mar-2025 21:56:59 JST 0ddj0bb Is At Cyphercon 0ddj0bb Is At Cyphercon
      in reply to
      • BleepingComputer
      • Chad Brigance

      @definity @GossiTheDog @BleepingComputer ive been wondering that too. Or even the word breach. They arent even saying theres an incident to talk about.

      Definitions are useful and important, but a vendor does the public great disservice by hanging them by the neck with word play

      In conversation about 2 months ago permalink
    • Embed this notice
      Chad Brigance (definity@infosec.exchange)'s status on Tuesday, 25-Mar-2025 21:57:00 JST Chad Brigance Chad Brigance
      in reply to
      • BleepingComputer

      @GossiTheDog @BleepingComputer

      One thing you point out here has me thinking...
      Does Oracle Cloud = Oracle Access Manager?

      Looking at Oracle's own page on that, one could see it as a middleware component

      https://www.oracle.com/middleware/technologies/access-management.html

      Feels like Oracle is being very specific in their denial, but should we be asking a more specific question?

      In conversation about 2 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 27-Mar-2025 06:26:42 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Bleeping Computer say multiple Oracle customers confirm their customer data has been stolen from Oracle Cloud. Oracle continue to deny there is a problem.

      https://www.bleepingcomputer.com/news/security/oracle-customers-confirm-data-stolen-in-alleged-cloud-breach-is-valid/

      In conversation about 2 months ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: www.bleepstatic.com
        Oracle customers confirm data stolen in alleged cloud breach is valid
        from @BleepinComputer
        Despite Oracle denying a breach of its Oracle Cloud federated SSO login servers and the theft of account data for 6 million people, BleepingComputer has confirmed with multiple companies that associated data samples shared by the threat actor are valid.
      Haelwenn /элвэн/ :triskell: likes this.
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 27-Mar-2025 06:42:28 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Also, that YouTube video I linked above has two hours of audio of Oracle employees talking. I haven’t transcribed it yet.

      Separately, the threat actor has shared what they claim to be current config files from Oracle Cloud servers with a different reporter.

      I’m deliberately staying out of this one for now as I’m trying to finish Assassin’s Creed Shadows first.. but I think Oracle may have a pending PR disaster when the TikTok deal is due to complete.

      In conversation about 2 months ago permalink
      GreenSkyOverMe (Monika), TÔ DE MUDANÇA, Adrianna Tan and Paul Cantrell repeated this.
    • Embed this notice
      Keith Lawson (keith_lawson@infosec.exchange)'s status on Thursday, 27-Mar-2025 22:47:14 JST Keith Lawson Keith Lawson
      in reply to

      @GossiTheDog p.s. doesn't appear to have any sensitive customer information in this sample:

      ChatGPT:
      After reviewing it, there do not appear to be any sensitive details such as:

      Email addresses

      Usernames

      Passwords

      API keys

      Personally identifiable information (PII)

      The transcript is primarily a technical discussion about system upgrades, pre-checks, configuration files, CLI usage, and server operations. It references general hostnames and commands but does not disclose any security credentials or private user data.

      In conversation about 2 months ago permalink
    • Embed this notice
      barunick (barunick@infosec.exchange)'s status on Thursday, 27-Mar-2025 22:47:14 JST barunick barunick
      in reply to
      • Keith Lawson

      @keith_lawson @GossiTheDog supposedly from 2019

      In conversation about 2 months ago permalink
    • Embed this notice
      Keith Lawson (keith_lawson@infosec.exchange)'s status on Thursday, 27-Mar-2025 22:47:15 JST Keith Lawson Keith Lawson
      in reply to

      @GossiTheDog I started the transcript. Here's what it's produced so far. I don't have a GPU in the system I'm running this on so not sure how long it's going to take to finish. I'll upload all file formats when it completes.

      https://github.com/j-klawson/oracle_breach_2025/blob/main/output_start.txt

      In conversation about 2 months ago permalink

      Attachments


    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Saturday, 29-Mar-2025 00:27:28 JST Kevin Beaumont Kevin Beaumont
      in reply to

      There’s now been a data breach at Oracle Health, which is separate to the ongoing security issue at Oracle Cloud.

      Oracle have not commented publicly on the breach, instead telling people to only talk to their CISO by phone, not in writing. They’ve sent out letters without Oracle letterheads, using external lawyers instead.

      The behaviour going on at Oracle with cybersecurity is extremely alarming.

      https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/

      In conversation about 2 months ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: www.bleepstatic.com
        Oracle Health breach compromises patient data at US hospitals
        from @BleepinComputer
        A breach at Oracle Health impacts multiple US healthcare organizations and hospitals after a threat actor stole patient data from legacy servers.
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Saturday, 29-Mar-2025 00:32:00 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Going back to the Oracle Cloud security incident, the 2019 video posted by the threat actor: https://youtu.be/375_G9wAffo

      Now has an audio transcription https://github.com/j-klawson/oracle_breach_2025/blob/main/youtube_video_transcript.txt

      In conversation about 2 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/240/775/632/585/626/original/608845a01b8aee49.png
      2. Oracle Unconfirmed Data Breach - Rose87168 claims this video was downloaded from Oracle's servers
        from Hudson Rock
        Source - https://x.com/rose87168/status/1904197798943195277Uploaded by Hudson Rock - https://www.hudsonrock.com
      3. Domain not in remote thumbnail source whitelist: opengraph.githubassets.com
        oracle_breach_2025/youtube_video_transcript.txt at main · j-klawson/oracle_breach_2025
        Files and scripts related to the potential Oracle Cloud Infrastructure (OCI) data breach reported by CloudSek - j-klawson/oracle_breach_2025
      Rich Felker repeated this.
    • Embed this notice
      ProtocolParameter (protocolparameter@cyberplace.social)'s status on Monday, 31-Mar-2025 18:04:43 JST ProtocolParameter ProtocolParameter
      in reply to

      @GossiTheDog What would the suggested mitigations be for customer impacted? Verify and respond accordingly?

      In conversation about 2 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Monday, 31-Mar-2025 20:54:11 JST Kevin Beaumont Kevin Beaumont
      in reply to

      I can confirm there has definitely been a serious security incident at Oracle's managed cloud service, and they're attempting to wordsmith their way out of it. https://doublepulsar.com/oracle-attempt-to-hide-serious-cybersecurity-incident-from-customers-in-oracle-saas-service-9231c8daff4a

      In conversation about 2 months ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: miro.medium.com
        Oracle attempt to hide serious cybersecurity incident from customers in Oracle SaaS service
        from https://medium.com/@networksecurity
        Being a provider of cloud SaaS (Software-as-a-service) solutions requires certain cybersecurity responsibilities — including being…
    • Embed this notice
      Dr. Christopher Kunz (christopherkunz@chaos.social)'s status on Monday, 31-Mar-2025 21:04:04 JST Dr. Christopher Kunz Dr. Christopher Kunz
      in reply to

      @GossiTheDog Interesting. There's however an extra space in the Youtube link in this sentence: "The meeting is viewable here and the transcript is "

      In conversation about 2 months ago permalink
    • Embed this notice
      Dr. Christopher Kunz (christopherkunz@chaos.social)'s status on Monday, 31-Mar-2025 21:06:31 JST Dr. Christopher Kunz Dr. Christopher Kunz

      @GossiTheDog Ah right, then there's an extra space in that link on medium. The video id reads "375_G9wAff+o" there. Thanks!

      In conversation about 2 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Monday, 31-Mar-2025 21:07:13 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Oracle have attempted to hide the OAM access, by requesting archive.org exclude the URL.

      In conversation about 2 months ago permalink

      Attachments

      1. No result found on File_thumbnail lookup.
        Internet Archive: Digital Library of Free & Borrowable Books, Movies, Music & Wayback Machine

      2. https://cyberplace.social/system/media_attachments/files/114/256/957/079/286/366/original/6ece262580897805.png
    • Embed this notice
      Dr. Christopher Kunz (christopherkunz@chaos.social)'s status on Monday, 31-Mar-2025 21:58:57 JST Dr. Christopher Kunz Dr. Christopher Kunz

      @GossiTheDog Something smells weird. Can I email you about that OCI thing?

      In conversation about 2 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Monday, 31-Mar-2025 22:14:17 JST Kevin Beaumont Kevin Beaumont
      in reply to

      The wordplay here is Oracle Cloud.

      Oracle rebadged old Oracle Cloud services to be Oracle Classic. Oracle Classic has the security incident.

      They’re denying it on “Oracle Cloud” by using this scope - but it’s their cloud service.

      In conversation about 2 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Tuesday, 01-Apr-2025 00:56:47 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Apparently nobody from Oracle thought to exclude this URL as it still works https://web.archive.org/web/20250301161225/https://login.us2.oraclecloud.com/oamfed/x.txt?mail

      In conversation about 2 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/257/858/858/629/412/original/3b909d603026981f.png
      2. No result found on File_thumbnail lookup.
        https://web.archive.org/web/20250301161225/https:/login.us2.oraclecloud.com/oamfed/x.txt?mail
    • Embed this notice
      colingilroymcguire (colingilroymcguire@cyberplace.social)'s status on Tuesday, 01-Apr-2025 00:57:18 JST colingilroymcguire colingilroymcguire
      in reply to

      @GossiTheDog any notion as to whether their NetSuite softwarte is within scope for this?

      In conversation about 2 months ago permalink
    • Embed this notice
      devnoname120 (devnoname120@fosstodon.org)'s status on Tuesday, 01-Apr-2025 03:38:07 JST devnoname120 devnoname120
      in reply to

      @GossiTheDog It's also there lol

      https://archive.is/lFPdO

      In conversation about 2 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Tuesday, 01-Apr-2025 06:30:55 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Multiple Oracle cloud customers have reached out to me to say Oracle have now confirmed a breach of their services.

      They are only doing so verbally, they will not write anything down, so they’re setting up meetings with large customers who query.

      In conversation about 2 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Tuesday, 01-Apr-2025 19:27:09 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Oracle Health customers dealing with the breach there of patient PII, if you’ve had a verbal briefing could you please Signal me? GossiTheDog.1337

      I’m interested to see if they’ve told you it was in legacy Oracle Classic aka OCI Gen1 environments, like they have with Oracle Cloud customers - I’m trying to line up if the breaches are actually related.

      It appears Oracle migrated people off OCI G1 a few years ago, but left the systems on and unpatched with customer data.

      In conversation about 2 months ago permalink
    • Embed this notice
      r00tjunkie (r00tjunkie@cyberplace.social)'s status on Tuesday, 01-Apr-2025 21:49:53 JST r00tjunkie r00tjunkie
      in reply to

      @GossiTheDog Nice try, you aren't tricking me into joining a chat with attack plans

      In conversation about 2 months ago permalink
    • Embed this notice
      ajantis (ajantis@cyberplace.social)'s status on Tuesday, 01-Apr-2025 23:30:28 JST ajantis ajantis
      in reply to

      @GossiTheDog Unpopular opinion: Proof looks like web cache poisoning and not RCE. Looks like made to believe to be an actual txt file

      Notice the "?" param where is used as part of cachebuster PoC for web cache poisoning

      As if not, then all Archive entries should resolve to the same txt contents, however bunch 404 like the x.txt itself and there is "?a" which disproves the proof based from Archive timestamp

      x.txt - 404
      x.txt?mail - with email text
      x.txt?a - 404
      x.txt?x - with email text

      In conversation about 2 months ago permalink
    • Embed this notice
      ajantis (ajantis@cyberplace.social)'s status on Wednesday, 02-Apr-2025 00:23:50 JST ajantis ajantis

      @GossiTheDog yeah is for another article about this I have read that seems to poise that RCE was established saying TA used an old CVE but am suspicious of it bec. of the txt file proof. That being said the existing "?a" parameter in Archive.org that was archived around 2 minutes after the "?mail" and before the "?x", so it is in between of the 2 proofs and based from its timestamp disproves that the actual x.txt itself doesn't exist and the parameters are more likely related to web caching.

      In conversation about 2 months ago permalink

      Attachments

      1. No result found on File_thumbnail lookup.
        Internet Archive: Digital Library of Free & Borrowable Books, Movies, Music & Wayback Machine
    • Embed this notice
      Zahhaz (hazanpermez@cyberplace.social)'s status on Wednesday, 02-Apr-2025 05:46:34 JST Zahhaz Zahhaz
      in reply to

      @GossiTheDog Interesting. rose has stated on the BF thread that the data belongs to OCI.

      In conversation about 2 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 02-Apr-2025 16:23:12 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Heise has a look at the Oracle security incident. Oracle didn’t return request for comment when asked about Oracle Classic - I understand from multiple large outlets they’ve also declined to comment.

      https://www.heise.de/en/news/Data-leak-at-Oracle-Up-to-2000-German-victims-What-is-known-and-what-is-not-10336366.html

      In conversation about 2 months ago permalink
    • Embed this notice
      Dr. Christopher Kunz (christopherkunz@chaos.social)'s status on Wednesday, 02-Apr-2025 16:35:50 JST Dr. Christopher Kunz Dr. Christopher Kunz
      in reply to

      @GossiTheDog Total radio silence so far, no statement - not even acknowledgement of my request for comment.

      In conversation about 2 months ago permalink
    • Embed this notice
      Dan Goodin (dangoodin@infosec.exchange)'s status on Wednesday, 02-Apr-2025 16:39:58 JST Dan Goodin Dan Goodin
      in reply to

      @GossiTheDog

      When I asked Oracle for comment, a PR person responded and offered a comment on the condition I not attribute it in any way to Oracle. When I said no, the PR person said Oracle was declining to comment.

      #radicalopacity

      In conversation about 2 months ago permalink
    • Embed this notice
      Dan Goodin (dangoodin@infosec.exchange)'s status on Wednesday, 02-Apr-2025 16:45:24 JST Dan Goodin Dan Goodin

      @GossiTheDog

      I dunno. I think they were going to provide some sort of explanation or account of what happened (likely whitewashy or handwavy).

      In conversation about 2 months ago permalink
    • Embed this notice
      Dave 🐶 (cyberoutsider@infosec.exchange)'s status on Wednesday, 02-Apr-2025 18:10:49 JST Dave 🐶 Dave 🐶
      in reply to

      @GossiTheDog I'm actually genuinely intrigued to see whether this strategy will pay off.

      In theory you only have to wait long enough for everyone to get bored and for some other significant thing to happen, then you're in the clear...

      In conversation about 2 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 02-Apr-2025 20:54:38 JST Kevin Beaumont Kevin Beaumont
      in reply to

      A class action lawsuit has been filed in the US around Oracle failing to publicly disclose a breach of Oracle Health. https://storage.courtlistener.com/recap/gov.uscourts.txwd.1172831612/gov.uscourts.txwd.1172831612.1.0.pdf

      In conversation about 2 months ago permalink

      Attachments


    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 02-Apr-2025 21:00:35 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Meanwhile, on the Oracle cloud front, Oracle’s silence is deafening.

      In conversation about 2 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/268/255/102/142/354/original/21819ef23b2b1800.jpeg

      2. https://cyberplace.social/system/media_attachments/files/114/268/255/364/172/111/original/966f7d243c226f18.jpeg

      3. https://cyberplace.social/system/media_attachments/files/114/268/255/650/012/976/original/a109334601c72870.jpeg
    • Embed this notice
      Andrew Elwell (elwell@mast.hpc.social)'s status on Wednesday, 02-Apr-2025 21:04:04 JST Andrew Elwell Andrew Elwell
      in reply to

      @GossiTheDog have they filed an 8K yet? Don't remember seeing one on the bot feed.

      In conversation about 2 months ago permalink
    • Embed this notice
      Paco Hope #resist (paco@infosec.exchange)'s status on Wednesday, 02-Apr-2025 21:27:37 JST Paco Hope #resist Paco Hope #resist
      in reply to

      @GossiTheDog
      *Narrator*: He did not stay out of this. 😜

      In conversation about 2 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 03-Apr-2025 17:22:37 JST Kevin Beaumont Kevin Beaumont
      in reply to
      • BleepingComputer

      We have an update. Reuters and Bloomberg confirm my blog, that’s there’s a security incident going on at Oracle cloud. Oracle declined to comment, after lying to @BleepingComputer and other outlets on the record.

      CrowdStrike is the IR company.

      “Oracle staff acknowledged to some clients this week that an attacker had gotten into a legacy environment, Bloomberg News report said.”

      https://www.reuters.com/technology/cybersecurity/oracle-tells-clients-second-recent-hack-log-in-data-stolen-bloomberg-news-2025-04-02/

      In conversation about 2 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 03-Apr-2025 17:25:50 JST Kevin Beaumont Kevin Beaumont
      in reply to

      “The company informed customers that the system has not been in use for eight years and that the stolen client credentials therefore pose little risk, the report added. The stolen data included Oracle customer log-in credentials from as recently as 2024, the report said.”

      This would be Oracle Classic, aka Gen1. I’ve been told the systems were left online after migration.. unpatched.

      Oracle are trying to play legacy angle - but what else was stolen? What else did the attacker do? Why cover up?

      In conversation about 2 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 03-Apr-2025 17:54:25 JST Kevin Beaumont Kevin Beaumont
      in reply to

      The Bloomberg article is paywall so here’s screenshots.

      In conversation about 2 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/273/186/220/506/506/original/f8f2490848206049.jpeg

      2. https://cyberplace.social/system/media_attachments/files/114/273/186/529/949/197/original/42a2ca8df53b03fb.jpeg
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 03-Apr-2025 21:06:01 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Yeah, by legacy system Oracle mean ‘a system we manage housing active customer data’. They’ve also been telling people it isn’t Oracle Cloud.. but it is, and they know it is, they’re just doing customer talking points to wordsmith around it.

      https://infosec.exchange/@Fringedcrow/114273919390396133

      In conversation about 2 months ago permalink

      Attachments

      1. No result found on File_thumbnail lookup.
        Fringed Crow :battery_ok: (@Fringedcrow@infosec.exchange)
        from Fringed Crow :battery_ok:
        @GossiTheDog@cyberplace.social Legacy system my ass. Wonder if that's why some of my companies data was in there due to a vendor and that data is less than 2 years old.
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 03-Apr-2025 21:10:24 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Oracle were still trying to get SaaS solutions *they* manage off Oracle Classic aka Gen1 as of 2023. They made a mess of it.

      In conversation about 2 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/273/954/152/805/333/original/9462e09daeffbb8b.jpeg
      GreenSkyOverMe (Monika) repeated this.
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 03-Apr-2025 21:55:29 JST Kevin Beaumont Kevin Beaumont
      in reply to

      To answer my own question up thread - from talking to people, the Oracle Health breach appears to be unrelated to the Oracle SaaS incident this thread describes.

      In both cases they’re being extorted, and in both cases they’re working with the FBI and external incident response.

      In conversation about 2 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 03-Apr-2025 22:05:24 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Also in both cases Oracle hasn’t filed an 8-K or told regulators or provided an IR report to customers or a written technical statement of what happened or put anything on their website or commented to press.

      In conversation about 2 months ago permalink
    • Embed this notice
      Scott Wilson (scottwilson@infosec.exchange)'s status on Thursday, 03-Apr-2025 22:49:23 JST Scott Wilson Scott Wilson
      in reply to

      @GossiTheDog Bro you act like following the law in the U.S. is a thing or something bro

      In conversation about 2 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 04-Apr-2025 01:11:13 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Bleeping Computer report that although Oracle are telling clients the login data is "old", they've received login details from the threat actor current to this year (2025). Oracle haven't returned requests for comment. https://www.bleepingcomputer.com/news/security/oracle-privately-confirms-cloud-breach-to-customers/

      In conversation about 2 months ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: www.bleepstatic.com
        Oracle privately confirms Cloud breach to customers
        from @BleepinComputer
        Oracle has finally acknowledged to some customers that attackers have stolen old client credentials after breaching a "legacy environment" last used in 2017.
    • Embed this notice
      Dave 🐶 (cyberoutsider@infosec.exchange)'s status on Friday, 04-Apr-2025 01:19:19 JST Dave 🐶 Dave 🐶
      in reply to

      @GossiTheDog Yes, the "old" line doesn't match up with what we know as customers.

      That said, we've not had that line directly from our Account Manager, so I'm waiting for an updated statement from them.

      In conversation about 2 months ago permalink
    • Embed this notice
      saua (saua@troet.cafe)'s status on Friday, 04-Apr-2025 04:28:27 JST saua saua
      in reply to

      @GossiTheDog I wonder if there's a way to do mail signature-style footers on toots. At this point "Oracle haven't returned requests for comment" could just be autos appended to each message on the topic.

      In conversation about 2 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Saturday, 05-Apr-2025 02:32:09 JST Kevin Beaumont Kevin Beaumont
      in reply to

      The Oracle cloud threat actor has told the BBC they plan to release European region Oracle Cloud Classic data this weekend. #threatintel

      In conversation about 2 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/280/884/294/080/555/original/f660ed500901383d.jpeg
    • Embed this notice
      RaulV (raulv@cyberplace.social)'s status on Saturday, 05-Apr-2025 03:55:43 JST RaulV RaulV
      in reply to

      @GossiTheDog haha...ain't no one buying oracle's B.S.

      In conversation about 2 months ago permalink
    • Embed this notice
      dave (hologram@cyberplace.social)'s status on Saturday, 05-Apr-2025 04:12:34 JST dave dave
      in reply to

      @GossiTheDog Oracle has a lawsuit regarding their own illegal theft and sale of data, but they're getting into the health business, where they will be entitled to your data.

      In conversation about 2 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Tuesday, 08-Apr-2025 13:51:15 JST Kevin Beaumont Kevin Beaumont
      in reply to

      The Register has a look at the Oracle situation. No new info, as Oracle won’t comment on anything and the info they’ve told customers is extremely light.

      https://www.theregister.com/2025/04/08/oracle_cloud_compromised/

      In conversation about a month ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: regmedia.co.uk
        Oracle tells customers its public cloud was compromised
        : Reliability, honesty, accuracy. And then there's this lot
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Tuesday, 08-Apr-2025 20:48:40 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Oracle have finally issued to a written notification to customers about their cybersecurity incident.

      They are again wordsmithing. OCI is a different org unit in Oracle to Oracle Classic - they’re denying a different scope.

      How long was the attacker in the SaaS solution (that Oracle manage)? What did they do with the access? How long were they in for? Why were ‘legacy’ systems containing customer info left unmanaged and insecure? Etc.

      Really poor response from a SaaS provider.

      In conversation about a month ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/302/183/123/843/977/original/7c31aa4331333200.jpeg
    • Embed this notice
      CyberSECIntelligence2 (cybersecintelligence2@cyberplace.social)'s status on Tuesday, 08-Apr-2025 23:24:02 JST CyberSECIntelligence2 CyberSECIntelligence2
      in reply to

      @GossiTheDog do you have the link, I can't find it! or it is just an email for customers?

      In conversation about a month ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 09-Apr-2025 01:15:16 JST Kevin Beaumont Kevin Beaumont
      in reply to

      If anybody is struggling to find the Oracle security incident notification email, search your email server for subject “Oracle customer notification” - if anybody in your org got the email, your Oracle SaaS service is impacted (not that you’d know it from the email). It’s widespread.

      In conversation about a month ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 09-Apr-2025 06:12:56 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Watch Oracle PR their way out of their responsibilities.. they’ve managed to publish a security incident notification and have the press run it as a denial. https://insight.scmagazineuk.com/oracle-further-dismisses-breach-rumours-in-customer-communication

      In conversation about a month ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: c-assets.papillon.io
        Oracle Further Dismisses Breach Rumours in Customer Communication
    • Embed this notice
      Johannes (jmbfountain@mastodon.social)'s status on Thursday, 10-Apr-2025 00:16:50 JST Johannes Johannes

      @GossiTheDog relevant meme from the office meme wall

      In conversation about a month ago permalink

      Attachments


      1. https://files.mastodon.social/media_attachments/files/114/308/656/486/193/743/original/acf07bd4c40fae41.jpg
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 10-Apr-2025 18:47:13 JST Kevin Beaumont Kevin Beaumont

      A Senator has written to President Trump raising concern about Oracle’s involvement in purchasing TikTok. https://www.warner.senate.gov/public/_cache/files/c/3/c351121c-0d93-408c-a644-cd9dfc403857/71F66735F28545047D35135624DD3ED5DB5A52483C15495CCC5988211B908C24.trump-tiktok-letter-250407-174338.pdf

      In conversation about a month ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/313/030/203/184/750/original/414278406bb18a2d.jpeg

    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 17-Apr-2025 17:44:46 JST Kevin Beaumont Kevin Beaumont
      in reply to

      CISA Releases Guidance on Credential Risks Associated with Potential Legacy Oracle Cloud Compromise https://www.cisa.gov/news-events/alerts/2025/04/16/cisa-releases-guidance-credential-risks-associated-potential-legacy-oracle-cloud-compromise

      In conversation about a month ago permalink

      Attachments

      1. No result found on File_thumbnail lookup.
        CISA Releases Guidance on Credential Risks Associated with Potential Legacy Oracle Cloud Compromise | CISA
        CISA recommends the following actions to reduce the risks associated with potential credential compromise.

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.