Researchers have uncovered a major breach targeting Oracle Cloud, with 6 million records exfiltrated via a suspected undisclosed vulnerability. Over 140,000 tenants are impacted, as the attacker demands ransom and markets sensitive data online.
More info here: https://www.cloudsek.com/blog/the-biggest-supply-chain-hack-of-2025-6m-records-for-sale-exfiltrated-from-oracle-cloud-affecting-over-140k-tenants
Ensar Seker, CISO at SOCRadar, provided the following comments:
“This incident is not just a breach, it’s a watershed moment for cloud security and third-party risk awareness.
The Oracle Cloud breach, allegedly carried out by a hacker known as “rose87168,” is a high-impact supply chain compromise with a potentially global ripple effect. With 6 million records stolen, affecting over 140,000 tenants, and sensitive data like encrypted passwords, configuration files, and access credentials now exposed, this isn’t just a strike against Oracle, it’s a wake-up call for every business relying on third-party cloud platforms.
From the initial findings, the hacker exploited what appears to be a zero-day vulnerability in Oracle WebLogic, which is often used to power login systems for Oracle Cloud. Once inside, they were able to exfiltrate sensitive data at scale, and now they’re demanding payments for deletion, essentially holding businesses hostage with their own data. That’s ransomware behavior without the encryption step, targeting confidentiality and reputation instead of just availability.
So, what makes this breach especially dangerous? First, it targets the supply chain layer, an area where many companies mistakenly assume security is outsourced to the cloud provider. The reality is, shared responsibility doesn’t mean equal responsibility, and this case proves that even the largest, most reputable cloud vendors are not immune to zero-days or sophisticated adversaries. Second, the hacker’s move to crowdsource the decryption of stolen password hashes by offering rewards is a chilling tactic. It opens the door to mass credential stuffing, lateral movement attacks, and future ransomware campaigns, potentially affecting not just Oracle’s clients, but also their partners, vendors, and customers.
This incident could become 2025’s SolarWinds moment, especially if we confirm that multiple enterprises were breached via their Oracle Cloud instances. We’re looking at a case that undermines trust in critical cloud infrastructure, and once again underscores how a single vulnerability in a widely used platform can cascade across thousands of organizations. This also raises a pressing question: How soon did Oracle know? How was this vulnerability triaged, and were any proactive mitigations communicated before this data was already on the dark web?
One of the important questions is what affected companies can do?
- Incident Response at the Tenant Level: Every affected company must immediately rotate all credentials, access keys, and tokens related to Oracle services. Assume compromise and move quickly.
- Monitor for Reuse and Exposure: Expect these stolen credentials to surface in stealer logs, dark web marketplaces, and brute-force tools. Deploy threat intelligence platforms to track brand mentions and leaked credentials.
- Demand Vendor Transparency: Customers should pressure Oracle to release a full technical breakdown, including a timeline, affected services, and patching instructions. Transparency now will be critical for restoring trust.
- Rethink Cloud Security Assumptions: CISOs must treat third-party platforms with the same scrutiny as internal systems. That means continuous monitoring, vulnerability scanning, and more aggressive red teaming of cloud-based assets.”
This is possibly going to be huge. Thus you should keep an eye on this as my “Spidey Sense” says that this is going to be something that we are going hear more about.
KnowBe4 Earns 5-Star Rating in the 2025 CRN Partner Program Guide
Posted in Commentary with tags KnowBe4 on March 24, 2025 by itnerdKnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, has been honored by CRN®, a brand of The Channel Company, with a 5-Star Award in the 2025 CRN Partner Program Guide. This annual guide is an essential resource for solution providers seeking vendor partner programs that match their business goals and deliver high partner value.
The extensive support and resources technology vendors offer through their partner programs are a critical consideration for solution providers assessing which IT vendors, service providers, and distributors to team with in building world-class technology solutions. Program elements such as financial incentives, sales and marketing assistance, training and certification, technical support and more can set vendors apart and play a key role in boosting their partners’ long-term growth and profitability.
The 5-Star Award is an elite recognition given to companies that have built their partner programs on the key elements needed to nurture lasting, profitable, and successful channel partnerships.
For the 2025 Partner Program Guide, the CRN research team evaluated vendors based on program requirements and offerings such as partner training and education, pre- and post-sales support, marketing programs and resources, technical support, and communication.
The 2025 Partner Program Guide will be featured in the April 2025 issue of CRN and published online at www.CRN.com/PPG beginning March 24, 2025.
Leave a comment »