Best of 2025: Oracle Hack: From ‘Deny-Deny-Deny’ to ‘Oops-Oops-Oops’
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”这样的开头。好的,我先仔细看看这篇文章。 文章主要讲的是Oracle公司的云服务被入侵了。之前他们一直否认有 breach,但最近终于承认了。入侵者盗取了客户的登录凭证,包括用户名、密码等。Oracle声称这些数据是旧的,不敏感,但其实还有2025年的最新记录被泄露了。 然后文章提到Oracle用了“legacy environment”这个词来淡化问题,试图通过词藻游戏避免承担责任。他们还拒绝公开评论,甚至不愿意提供一个不具名的声明。这让人觉得他们在隐藏什么。 另外,有安全公司CybelAngel指出Oracle在2020年的Java漏洞没有及时修补,导致攻击者能够入侵他们的身份管理系统。这显示了Oracle在安全上的疏忽。 最后,文章讨论了这次事件对Oracle声誉的影响。很多客户对他们的信任度下降,甚至有人质疑为什么还要选择Oracle作为云服务提供商。 总结一下,这篇文章揭示了Oracle在处理安全事件上的不透明和应对不当,以及这对他们信任度和声誉的负面影响。 </think> 文章揭示了 Oracle 云服务遭遇的安全漏洞事件。尽管 Oracle 最初否认 breach 存在,但随后承认攻击者通过利用旧服务器漏洞窃取了客户登录凭证。公司试图通过词藻游戏淡化事件影响,并拒绝公开置评。此事件引发了对其安全管理和透明度的质疑,并可能损害其声誉和客户信任。 2025-12-26 14:0:41 Author: securityboulevard.com(查看原文) 阅读量:3 收藏

Larry’s PR angels desperately dance on the head of a  pin.Oracle executive chairman Larry Ellison

Oracle is now admitting that, yes, an Oracle cloud service was breached. This is, of course, despite last week’s vehement denials.

In today’s SB  Blogwatch, we see man tic. Your humble blogwatcher curated these bloggy bits for your entertainment. Not to mention:  Happy Birthday.

Editor Note: Oracle has now officially acknowledged the breach involved stolen credentials from two obsolete servers but maintains that no data was stolen.

Classic ‘Wordplay’

What’s the craic? Jake Bleiberg and Julie Zhu report: Oracle Tells Clients of Second Recent Hack, Log-In Data Stolen

Log-in credentials from as recently as 2024
Oracle Corp. has told customers that a hacker broke into a computer system and stole old client log-in credentials, according to two people familiar with the matter. … The attacker gained access to usernames, passkeys and encrypted passwords, according to the people, who spoke on condition that they not be identified.

Information about the stolen credentials started coming out last [week], when … Oracle denied that its cloud storage product had been hacked: … “There has been no breach of Oracle Cloud. The published credentials are not for the Oracle Cloud. No Oracle Cloud customers experienced a breach or lost any data.” [But] this week, Oracle staff acknowledged to some clients that an attacker had gotten into what the company called a “legacy environment,” according to the people. [One] person familiar with the breach said the stolen data included Oracle customer log-in credentials from as recently as 2024.

This feels odd. More detail please? Sergiu Gatlan digs in: Oracle privately confirms Cloud breach to customers

Oracle has consistently denied reports of a breach
Oracle has finally acknowledged to some customers that attackers have stolen old client credentials after breaching a “legacy environment.” … However, while Oracle told clients this is old legacy data that is not sensitive, the threat actor behind the attack has … posted newer records from 2025.

Cybersecurity firm CybelAngel first revealed that Oracle told clients that an attacker who gained access to … Oracle Cloud Classic servers as early as January 2025. … The attacker allegedly exfiltrated data from the Oracle Identity Manager (IDM) database, including user emails, hashed passwords, and usernames.

Oracle has consistently denied reports of a breach in Oracle Cloud in statements shared with the press since the incident surfaced. … An Oracle spokesperson was not immediately available for comment.

Not available? Or not willing? Dan Goodin goes with the latter:

When I asked Oracle for comment, a spokesperson asked if they could provide a statement that couldn’t be attributed to Oracle in any way. After I declined, the spokesperson said Oracle would have no comment.

No doubt Dan’s now on a permanent PR blocklist. CybelAngel’s Todd Carroll isn’t in favor either: Our Investigation of the Oracle Cloud Data Leak

Payment of 20 million USD
Oracle has allegedly determined an attacker was in the shared identity service as early as January 2025. This exposure was facilitated via a 2020 Java exploit and the hacker was able to install a webshell along with malware [that] specifically targeted the Oracle IDM database.

Oracle allegedly became aware of a potential breach in late February and investigated this issue internally. … The requested ransom is a payment of 20 million USD.

Ouch. Kevin Beaumont has harsh words for ORCL: Oracle attempt to hide serious cybersecurity incident

Step up, Oracle
It has now become 100% clear … there has been cybersecurity incident at Oracle, involving systems which processed customer data. … Multiple Oracle cloud customers have reached out to me to say Oracle have now confirmed a breach of their services. [Oracle is] only doing so verbally, they will not write anything down.

Oracle are attempting to wordsmith statements around Oracle Cloud and use very specific words to avoid responsibility. This is not okay. … Oracle rebadged old Oracle Cloud services to be Oracle Classic. Oracle Classic has the security incident. Oracle are denying it’s on “Oracle Cloud” by using this … wordplay.

This is a matter of trust and responsibility. Step up, Oracle — or customers should start stepping off.

What have Larry’s lot got to hide? nerdjon tries to figure it out:

Whether we like it or not, security incidents have become such commonplace in the last several years that if they just admitted to it, this entire story would have likely been shrugged off and mostly forgotten about. … Instead it is turning into an entire thing that just seems to be getting deeper and deeper.

Seriously, if I can’t trust that I am going to actually be told and not lied to when there is a security incident, … why would I chose to work with a company? What is Oracle’s end goal here? … Trying to think about how this is anything except them just straight up lying.

Are you pondering what I’m pondering? Doctor Syntax seems to be:

Googling “Streisand Effect” might be an education. … Do they learn nothing in PR school?

PR shens aside, let’s get back to the real issue. It’s “criminal negligence,” according to kurkosdr

Oracle didn’t update Oracle Access Manager in their Oracle Cloud Classic product, leaving a known vulnerability from 2021 unpatched, which was then exploited by a third party. Imagine taking 4 years to update your own software running on your own service.

What’ll this do to Oracle’s reputation? If Brendan McKinley’s opinion is anything to go by, it couldn’t get much worse:

Remember the old tech industry proverb: Oracle doesn’t have customers, they have hostages. … Why any corporation would voluntarily rely on them for cloud services is beyond me.

Meanwhile, u/Feisty_Donkey_5249 muses on marketing:

“Unbreakable,” to quote their advertising.

And Finally:

This is … something

Previously in And Finally


You have been reading SB Blogwatch by Richi Jennings. Richi curates the best bloggy bits, finest forums, and weirdest websites—so you don’t have to. Hate mail may be directed to  @RiCHi, @richij, @[email protected], @richi.bsky.social or [email protected]. Ask your doctor before reading. Your mileage may vary. Past performance is no guarantee of future results. Do not stare into laser with remaining eye. E&OE. 30.

Image sauce: U.S. State Department

Recent Articles By Author


文章来源: https://securityboulevard.com/2025/12/oracle-hack-from-deny-deny-deny-to-oops-oops-oops-2/
如有侵权请联系:admin#unsafe.sh