Archive for Oracle

Harvard Has Apparently Been Pwned Via The Oracle Vulnerability

Posted in Commentary with tags , on October 14, 2025 by itnerd

Remember this Oracle vulnerability that is far from trivial? It now has its first confirmed victim outside of Oracle. And unfortunately for Oracle, it’s Harvard. Yes. That Harvard.

The cybercrime group Cl0p is now seemingly reaping the harvest after it successfully exploited a critical zero-day bug in Oracle’s E-Business Suite (EBS). Hundreds of companies and organizations – all Oracle clients – were allegedly compromised.

One of them is apparently Harvard University, which uses EBS for various administrative functions. Now, Cl0P, essentially a digital organized crime ring, has claimed it had stolen data from the prestigious school.

And:

According to Cybernews researchers, Cl0p has shared 1.4TB of data on its leak site. This data originates from Harvard’s servers hosted by Oracle.

The published data includes logs and reports from Harvard’s internal payment system as well as source code for various internal tools. Cybernews research team has analyzed the data and says it includes references that strongly suggest that it was indeed taken from OBS systems.

Anders Askasen, VP of Product Marketing, Radiant Logic had this to say:

     “The Harvard breach tied to the Oracle EBS exploitation highlights a recurring truth: complexity is the adversary of security. When identity and data silos persist, visibility evaporates, and the ability to trace who has access to what becomes guesswork. Systems like Oracle EBS sit at the heart of enterprise operations — rich in sensitive HR and financial data, yet notoriously hard to govern across hybrid infrastructures. Resilience begins with a unified identity data foundation and continuous observability that enable organizations to detect exposures in real time, contain and act with precision, and restore confidence through verifiable facts rather than assumptions”


Will Baxter, Field CISO, Team Cymru follows with this comment:

“This threat highlights the importance of egress filtering and monitoring where files are downloaded from. This operation appears to have exploited the vulnerability weeks ahead of patch release, indicating early access or a brokered exploit. Detecting these campaigns early depends on correlating outbound anomalies, C2 beaconing, and shared infrastructure across sectors. The only scalable defense is collective intelligence — connecting enterprise telemetry with trusted partners before the stolen data surfaces publicly.”

Gunter Ollmann, CTO, Cobalt adds this comment:

“This campaign underscores the growing sophistication of financially motivated groups exploiting enterprise software supply chains. The attackers didn’t rely on a single exploit—they combined zero-day vulnerabilities with custom malware to maximize access before detection. It’s another reminder that penetration testing can’t stop at application edges; enterprises must stress-test complex ERP systems as part of their attack surface. Increasingly, the focus must shift toward offensive security services that continuously test not just applications, but also the effectiveness of defense-in-depth systems and SOC teams. Regular, adversarial testing provides the real-world validation organizations need to ensure their layered defenses perform as intended when it matters most.”

Sucks to be Harvard. And it sucks even more to be Oracle who’s senior management have to be reconsidering their life choices at this point. Because they know that there will be more fallout, and the lawsuits that follow that fallout.

Oracle Pretty Much Confirms That They Got Pwned By Cl0p

Posted in Commentary with tags , on October 7, 2025 by itnerd

Oracle has warned of a critical zero-day vulnerability, with a CVSS base score of 9.8, in its E-Business Suite (CVE-2025-61882) that is remotely exploitable without authentication. If successfully exploited, this vulnerability may result in remote code execution. Chances are that this is how the Cl0p ransomware gang was able to launch their latest campaign.

Ensar Seker, CISO at SOCRadar, commented:

“The exploitation of CVE-2025-61882 by the Clop ransomware group reinforces a hard truth security leaders continue to wrestle with: legacy enterprise software with sprawling configurations like Oracle E-Business Suite (EBS) remains a ripe target for modern ransomware operators. This vulnerability, rated 9.8 CVSS, allows unauthenticated remote code execution and is being actively exploited in the wild, making it one of the most dangerous types of flaws we see in enterprise environments. What makes this case particularly alarming is that the attack chain appears to span multiple vulnerabilities across different patch cycles, including one disclosed only days ago. Clop is clearly operating with a highly proactive exploitation model, monitoring Oracle patches and working quickly to reverse-engineer the flaws for immediate weaponization.

“The fact that proof-of-concept (PoC) code was circulating on Telegram and used in real-world data exfiltration attacks just weeks after patch release underscores how rapidly threat actors are moving to capitalize on enterprise inertia. This incident also highlights a serious procedural gap in many organizations: the critical patches for Oracle EBS can only be applied if the previous quarterly update (in this case, October 2023) is already in place. That creates an unintended but dangerous bottleneck where even security-conscious teams can find themselves exposed simply because they’re one patch cycle behind.

“Clop’s focus on Oracle EBS is no accident. These systems often house sensitive financial, HR, and operational data, and because they’re deeply integrated into business workflows, they’re notoriously difficult to update without risking downtime. That’s exactly the kind of environment threat actors love: high-value, low-change.

“Security teams should act immediately to verify patch levels and apply the latest fixes, but this needs to go beyond a break-fix mindset. Organizations must rethink their patch readiness processes for ERP-class systems, including pre-staging test environments, reducing configuration drift, and tightening external access to legacy interfaces like BI Publisher and Concurrent Processing.

“In parallel, defenders should hunt for indicators of compromise shared by Oracle and Mandiant and conduct forensic reviews of EBS systems for unusual BI Publisher activity, unauthorized concurrent jobs, or unexplained external network connections.

This is another case where visibility and segmentation matter. Oracle EBS should never be directly internet-exposed, and authentication should be enforced at all layers, even where Oracle’s native security falls short.

“Ultimately, the Clop campaign against Oracle EBS is a wake-up call that ransomware actors are not just opportunistic. They are increasingly strategic, surgical, and tuned into vendor ecosystems. Defenders must be equally proactive in hardening the software foundations that underpin their critical operations.”

SOCRadar posted a really good analysis of this here and it is totally worth your time to read. In the meantime, this is not a good look for Oracle. I wonder what they have to say about it?

UPDATE:  Adrian Culley, Senior Sales Engineer at SafeBreach adds this insight:

“The Cl0p extortion gang is combined under ‘The Com,’ which is a loose collective of hackers that includes individuals from Lapsus$ and Scattered Spider. The Com—short for ‘The Community’—is a fluid, international collective of mostly young, English-speaking individuals. Crucially, they’re not motivated by politics or ideology—their drivers appear to be purely money and ego. They thrive on notoriety, loudly bragging about their exploits on platforms like Telegram, which pushes members toward more brazen, high-profile attacks. While they are clearly very skilled, their precociousness leaves them highly vulnerable to nation state infiltration and manipulation.

The group’s roots begin with LAPSUS$ in 2021 and 2022, when they demonstrated just how devastating social engineering could be against giants like Microsoft, Nvidia, and Okta. But their work was somewhat erratic, and they often focused on chaos and notoriety.

Scattered Spider took that playbook and professionalized it, moving from chaotic data theft to financially devastating ransomware campaigns. They have been able to master the initial access problem with their native English skills and mastery of social engineering.

The Com, which has evolved out of these two groups, relies heavily on voice phishing as their most effective TTP to get past multi-factor authentication. The group uses highly ephemeral IOCs. The phishing domains they use are often active for less than seven days. This means that organizations relying on a purely reactive security posture—for example, blocklisting known IPs or domains—are often behind the curve.

The latest threat that has come to light with the Oracle e-business suite is a critical, 9.8-rated CVE. Organizations should patch immediately and then begin to shift from testing code to testing policy and procedure. BAS and AEV tools can help organizations focus on validating the Human Firewall.

BAS can simulate the reconnaissance phase, testing whether employees overshare PII online that an attacker could use to build a convincing persona. It can also continuously push bomb an organization’s MFA solution to measure the Mean Time to Detect and block the attack before a frustrated user approves the request.

An AEV platform can help confirm that an organization’s help desk is uncompromisable. Are they enforcing policies like a vocal password or two-employee approval for privileged account resets, even when the supposed caller provides all the PII they should know? Finally, AEV must continuously test an organization’s IAM posture, ensuring they can detect and immediately flag actions like a compromised admin creating malicious cloud instances or forging SAML tokens for persistence.”

Oracle Apparently Has Been Pwned And Extortion Emails Have Gone Out To Execs Of Companies Using E-Business Suite

Posted in Commentary with tags , on October 3, 2025 by itnerd

There’s a newly reported extortion campaign, where hackers claim to have stolen sensitive data through Oracle’s E-Business Suite and are now targeting executives directly:

According to Google Threat Intelligence Group (GTIG) and Mandiant, the malicious activity allegedly targeting Oracle EBS appears to have started on or around September 29. The attackers have sent extortion emails to executives at “numerous” companies, claiming to be affiliated with the notorious Cl0p cybercrime group.

GTIG and Mandiant researchers have described the attacks as a high-volume email campaign leveraging hundreds of compromised accounts, including ones previously linked to a profit-driven threat group named FIN11. This long-running cybercrime gang is known to engage in ransomware deployment and extortion.

The researchers also found some evidence indicating a connection to Cl0p. Specifically, the contact information provided by the attackers in the emails sent to targeted organizations matches contact addresses listed on the Cl0p leak website.

Mandiant and GTIG said they are in the early stages of their investigations and could not confirm whether the hackers’ claims are substantiated. 

Dr. Chris Pierson, a former DHS cybersecurity official and CEO/founder of BlackCloak, a digital executive protection firm had this to say:

     “Extortion attempts like this highlight the reality that executives are increasingly being singled out as the soft underbelly of the corporation for cybercriminals. Cybercriminals recognize that targeting the C-suite creates urgency, exposes them to high risk, and instills fear that can lead to other issues. The challenge for organizations is twofold: hardening the systems that store the most sensitive corporate data, and ensuring executives are prepared with the right playbook when extortion attempts land in their inbox. Third-party vendor risks will continue to be a favorite target of cybercriminals, and we’ve seen a marked increase in these systems being targeted because they yield information on not one company, but hundreds or thousands of companies.  The companies that come out ahead are those that treat digital executive protection as part of their overall cybersecurity posture rather than an afterthought.”

Oracle said via a blog post that they believe the threat actors exploited vulnerabilities patched in the July 2025 security updates. But they have said no more than that. Which likely means that this is going to be very, very bad. Oracle looks like it has some explaining to do.

CISA Warns of Credential Risks From Oracle Cloud Leak

Posted in Commentary with tags , on April 17, 2025 by itnerd

You might recall the recent Oracle cloud breach. If not, this and this will act as a refresher.

Related to that, the CISA has warned of potential unauthorized access to legacy Oracle cloud environments related to exposed credentials reused across separate, unaffiliated systems, or embedded (i.e., hardcoded into scripts, applications, infrastructure templates, or automation tools).

Details can be found here: https://www.cisa.gov/news-events/alerts/2025/04/16/cisa-releases-guidance-credential-risks-associated-potential-legacy-oracle-cloud-compromise  

Jim Routh, Chief Trust Officer at Saviynt, provided the following comments:

“Software engineers often embed authentication credentials or scripts for convenience when applications are being tested before production. However, engineers often neglect to remove the embedded credentials once the code is put into production. This creates a vulnerability that threat actors actively exploit, giving them access to the application where they may escalate privileges, obtaining access to more sensitive information. There are now tools available that identify credentials in software code, but these tools are not widely used. The root cause of this problem for enterprises is to improve processes for credential management using more advanced privileged access management capabilities and seeking alternatives to credentials through passwordless authentication options.”

You can expect more warnings like this in the near future as this Oracle breach really has the potential to be THE breach of the year.

SOCRadar’s CISO Comments On The Oracle Cloud Data Breach

Posted in Commentary with tags on March 29, 2025 by itnerd

A threat actor using the alias “rose87168” claimed responsibility for breaching Oracle Cloud systems, allegedly stealing 6 million user records containing encrypted passwords, authentication keys, and directory credentials. Oracle has denied any breach occurred, stating no customer data was compromised.

To investigate these claims, SOCRadar contacted the threat actor, who provided the below 10,000-record sample. This dataset appears consistent with real Oracle Cloud user information, including structured fields like user IDs, encrypted credentials, and company-specific domains. While SOCRadar cannot confirm the full 6 million record claim, the sample’s format and content seem legitimate and not easily fabricated.

According to Ensar Seker, CISO at SOCRadar:

“Several other security researchers and vendors have also analyzed the sample. At least three Oracle Cloud customers reportedly confirmed their information was present in the leaked data, further supporting its authenticity. These confirmations, along with observed Indicators of Attack (IOAs) such as irregular logins and suspicious file activity, suggest that the breach may indeed be real.

The hacker continues to provide screenshots and additional data fragments to prove the claim. The screen shot illustrates structured user data likely sourced from an identity management system. The actor also claims to have exploited a known vulnerability (potentially CVE-2021-35587), though this has not been confirmed.


Despite the mounting evidence, Oracle maintains its stance that no breach occurred. The company has provided no technical explanation or alternative theory for the leaked data’s origin. This leaves many Oracle Cloud customers in a difficult position—unable to fully assess their exposure without further guidance.

In cybersecurity, even unconfirmed incidents should be treated with seriousness when multiple independent sources identify potential compromise. We recommend organizations remain vigilant, monitor their environments closely, and follow trusted updates from Oracle and the security community.

We urge all Oracle Cloud users to take precautionary steps, including:

  • Reviewing security logs from mid-February onward for unusual login attempts or access patterns.
  • Auditing user accounts, especially those with administrative privileges.
  • Rotating sensitive credentials such as SSO and LDAP passwords or keys.
  • Ensuring multi-factor authentication (MFA) is enabled across all accounts.”

Much as I said in this post, this might be the breach that we’re all talking about in 2025. So far, my hunch on this is proving correct.

A Deal Involving Oracle And Microsoft To Buy TikTok Is Allegedly On The Table

Posted in Commentary with tags , , on January 26, 2025 by itnerd

TikTok’s corporate masters Byte Dance have been consistently saying that TikTok isn’t for sale. But according to this story, a deal may be in the works:

The Trump administration is working on a plan to save TikTok that involves tapping software company Oracle and a group of outside investors to effectively take control of the app’s global operations, according to two people with direct knowledge of the talks.

Under the deal now being negotiated by the White House, TikTok’s China-based owner ByteDance would retain a minority stake in the company, but the app’s algorithm, data collection and software updates will be overseen by Oracle, which already provides the foundation of TikTok’s web infrastructure. 

That would effectively mean American investors would own a majority stake in TikTok, but the terms of the deal could change and are still being hammered out.

“The goal is for Oracle to effectively monitor and provide oversight with what is going on with TikTok,” said the person directly involved in the talks, who was not authorized to speak publicly about the deliberations. “ByteDance wouldn’t completely go away, but it would minimize Chinese ownership.”

NPR has agreed not to name the sources, who are not authorized to speak publicly about the confidential talks.

Other potential investors who are engaged in the talks include Microsoft.

If any of this sounds familiar, it should. The last time Donald Trump was president, he tried to engineer a deal involving Oracle and WalMart among others. But the deal fell apart. Microsoft was also said to be interested in buying TikTok. But that deal went nowhere at least twice. So, will it happen this time? I have no clue. But we have less than 75 days to see what happens as that’s how long the TikTok executive lasts.


Oracle Gets Served With A Class Action Lawsuit Of Epic Proportions

Posted in Commentary with tags on August 23, 2022 by itnerd

Lawyers for software giant Oracle are going to be busy as they’re now going to be dealing with a class-action lawsuit.

The class-action has three class representatives, including Dr. Johnny Ryan, Senior Fellow of the Irish Council for Civil Liberties (ICCL), and was filed against Oracle in the U.S. District Court for the Northern District of California. It alleges Oracle has violated the Federal Electronic Communications Privacy Act, the Constitution of the State of California, the California Invasion of Privacy Act, competition law, and the common law. How did they do that? The lawsuit claims that Oracle created a network containing personal data of hundreds of millions of people and sold said data to third parties. Which is why the class includes every Internet user on the planet. Which makes this lawsuit in a word, epic.

Here’s the kicker. The plaintiff’s claim is backed up by a video on the ICCL website of Oracle CEO Larry Ellison describing how the company’s real-time machine learning system collects this information and states that 5 billion profiles are stored in the “Oracle Data Cloud.” Which I am guessing that the ICCL thinks is the digital smoking gun that they need to win this lawsuit.

As far as I can tell, Oracle hasn’t commented on this. But Chris Olson, CEO, The Media Trust has:

     “In 2016, the rules for data targeting were still up in the air – since then, emerging data privacy legislation has drawn a hard line around microtargeting, collecting and selling user’s data without express permission. However the ICLL’s lawsuit pans out, the fact that it’s happening is a major development for businesses around the world, especially since it is happening in the U.S, and alleges a violation of California law.

While not all businesses directly harvest data from their users in a way that violates data privacy legislation in Europe or America, most partner with digital vendors who do, whether through their websites or mobile platforms. Now more than ever, businesses must commit to digital trust and safety protections – otherwise, it is only a matter of time before they will suffer from breaches, lawsuits and expensive fines.”

It’s going to be interesting to see how Oracle responds to this. Because if they lose, it’s going to be expensive.

Oracle Kills Sun Microsystems At Last

Posted in Commentary with tags on September 5, 2017 by itnerd

The news is out is that Oracle laid off the core talent of the Solaris and SPARC teams on Friday. The timing sucks as they did this just before Labour Day which has really craptastic optics. Unofficial tallies on the TheLayoff.com and elsewhere put total of jobs cut at around 2,500, affecting the company’s Santa Clara and San Diego, Calif. offices, as well as people in Austin, Texas, Broomfield, Colo., Burlington, Mass., and India.

Oracle itself hasn’t commented on this, which is typical for them, but it does basically bring to an end one of the more famous names in the IT industry. Oracle became the owner of Solaris as it was one of the properties that were part of its 2010 acquisition of the company. Other well-known assets were Java, MySQL and OpenOffice, with Oracle making no secret about the fact that it was buying Sun only because of Java and its business prospects. With Oracle shifting its focus to cloud services and software platforms, this day was coming. I’m kind of surprised that it took this long to happen.

RIP Sun Microsystems.

 

Oracle Bundles New Crapware With Java

Posted in Commentary with tags , , on June 30, 2015 by itnerd

I haven’t run Java on my Macs in some time as it like my other least favorite piece of software Adobe Flash is a popular attack vector for hackers of all stripes. But now Oracle is looking to make some extra cash by changing the crapware that it bundles with Java. If you’re not familiar with the term, crapware is useless software that comes either with a new computer or with other software that you need to use. Oracle has latched on to the latter by inking a deal with Yahoo to bundle Yahoo Search with Java starting with the next Java update:

Begining with the next Java update, Yahoo! will replace the current invitation to make Ask your default search engine. Instead, you’ll be asked if you want to make Yahoo! the homepage and default search engine for Chrome and Internet Explorer, and have the firm’s site load every time a new tab is opened in Chrome. (Yahoo! is already the default search engine for Firefox.)

As with the Ask offer, the checkbox to allow these settings changes arrives pre-ticked, so if a careless user simply clicks on “Next,” the changes will be made automatically. Changing the browser settings back is likely to be a pain, based on past experience.

“We have definitely made sure that our onboarding process is one that is highly transparent and gives users choice,” a Yahoo! spokesman told the Wall Street Journal.

No you haven’t made the onboarding process transparent. It’s an opt out process which means that people will inadvertently install Yahoo when they were not meaning to. But of course, that’s the idea as Yahoo is going to get a big boost to its share of the search engine market by going this route. And I will get a few phone calls from clients of mine asking me how to reverse this.

A pox on both their houses.

Lawsuit Claims That Oracle Said That $50K Is ‘Good Money For an Indian’

Posted in Commentary with tags , on January 14, 2014 by itnerd

This caught my attention during my morning coffee. According to IT World, Ian Spandow wanted to transfer a high-performing salesman from Oracle’s India office to California. Here’s what happened next:

In September 2012, Spandow asked for permission to transfer an Oracle employee working in India to California. Spandow wanted to give the employee, who had a good track record, “a compensation level that was equivalent to Caucasian employees hired by Oracle for the same position.” But Spandow’s manager denied the request and told Spandow to offer the worker a “substantially lower” amount of money, according to the suit.

“I can’t in good conscience, even mention $50K/$50 to him,” Spandow said of the employee in an email to his supervisor, Ryan Bambling, that was cited in the lawsuit. “It would be nothing short of discriminating against him based on his ethnicity/country of origin. How or what do I have to do/write to get a reasonable (60+) offer to him?’

This prompted a “stern response” and warning to Spandow, the suit claims.

Spandow subsequently raised his concerns with his sales director, Keith Trudeau, who said the lower salary offer would be “good money for an Indian,” according to the suit.

An Oracle human resources manager, Melissa Bogers, later insisted to Spandow that the lower offer was fair, the suit adds.

Spandow was “summarily terminated” without warning on Dec. 5, 2012, just weeks after the dispute over the salary offer, according to the suit.

Was the offer racist? It sure sounds like it to me. Was there payback for objecting to that offer? It sure sounds like it to me. But I am sure Oracle has a perfectly rational explanation for this. But if they do, they’re not talking as they declined to comment. Thus we’ll have to wait for this to hit a courtroom. But if it is true, it will really slant my opinion of Oracle.

Oh, for the record, I’m not naive enough to believe that this doesn’t happen elsewhere. It’s just that we likely don’t hear about it because it’s not part of a lawsuit.