CloudSEK's Insights on Oracle Cloud Data Breach Claims
Cybersecurity4 min read

CloudSEK's Insights on Oracle Cloud Data Breach Claims

13 Dec 202513 Dec 2025 cloudsek.com

CloudSEK's analysis challenges Oracle's denial of a data breach affecting millions. Their findings highlight the need for proactive cybersecurity measures.

Key Takeaways

  • 1."Our deep-dive investigation reveals a compromised production SSO endpoint, affecting over 140,000 tenants and exposing sensitive SSO and LDAP data," said a spokesperson from CloudSEK.
  • 2.This included a file created on "login.us2.oraclecloud.com" that contained the attacker's email, further substantiating the seriousness of the allegations.
  • 3."What we've done for the last 10 years is not just about creating awareness; it’s about enabling a stronger defensive landscape against such attacks," the spokesperson concluded.

On March 21, 2025, a user named rose87168 took to BreachForums to announce the sale of sensitive data allegedly exfiltrated from Oracle Cloud. This included SSO & LDAP credentials, OAuth2 keys, and customer tenant information, affecting over 140,000 individuals and businesses.

In response to this alarming revelation, CloudSEK's XVigil platform promptly identified a significant threat. "Our deep-dive investigation reveals a compromised production SSO endpoint, affecting over 140,000 tenants and exposing sensitive SSO and LDAP data," said a spokesperson from CloudSEK.

"Our deep-dive investigation reveals a compromised production SSO endpoint, affecting over 140,000 tenants and exposing sensitive SSO and LDAP data,"

Person using laptop with holographic cybersecurity shield and digital interface elements
Person using laptop with holographic cybersecurity shield and digital interface elements

Despite the seriousness of the situation, Oracle issued a swift denial, asserting, "There has been no breach of Oracle Cloud," on the same day the threat was made public. However, CloudSEK, dedicated to transparency and action, has made it their mission to verify claims and equip organizations with the necessary tools to assess security risks.

"There has been no breach of Oracle Cloud,"

"At CloudSEK, we prioritize transparency and preparedness," said the company. The follow-up report published by CloudSEK offers insight into this troubling incident, detailing verified evidence of the breach and actionable steps for enterprises to strengthen their defenses.

Multiple computer monitors displaying cybersecurity dashboards, world maps, and data analytics in a dark control room
Multiple computer monitors displaying cybersecurity dashboards, world maps, and data analytics in a dark control room

"At CloudSEK, we prioritize transparency and preparedness,"

The investigation revealed that the threat actor not only provided a sample list of customer details from Oracle but also uploaded evidence supporting their claims. This included a file created on "login.us2.oraclecloud.com" that contained the attacker's email, further substantiating the seriousness of the allegations.

Race Results

Efforts by CloudSEK didn’t stop at exposure verification. They issued a TLP Green report to alert the community about potential supply chain attacks stemming from this data breach and sent a more urgent TLP RED report to Oracle the same day. "We believe there was a lack of judgment at the end of Oracle, and we intend to publish more details that would help the community and Oracle to investigate the incident better," said a CloudSEK representative.

"We believe there was a lack of judgment at the end of Oracle, and we intend to publish more details that would help the community and Oracle to investigate the incident better,"

Impact and Legacy

Impact and Legacy

Impact and Legacy

The proactive approach by CloudSEK underscores the importance of timely responses in cybersecurity. Their report offers organizations a free tool to check if their information has been exposed, reflecting a commitment to assisting those impacted by this potential breach.

Career Journey

"This kind of malicious activity can lead to widespread implications across the supply chain, and early identification is crucial in mitigating damage," noted an analyst associated with Cybersecurity research.

"This kind of malicious activity can lead to widespread implications across the supply chain, and early identification is crucial in mitigating damage,"

Looking forward, the revelations from this incident highlight the necessary vigilance required in the digital space, particularly for cloud service providers. Organizations utilizing cloud infrastructures must ensure their security protocols are robust and adaptive to emerging threats.

As CloudSEK continues its analysis, they remain at the forefront, emphasizing that evidence-based validation is essential—not only to avert panic but to promote preparedness within the cybersecurity community. "What we've done for the last 10 years is not just about creating awareness; it’s about enabling a stronger defensive landscape against such attacks," the spokesperson concluded.

"What we've done for the last 10 years is not just about creating awareness; it’s about enabling a stronger defensive landscape against such attacks,"

With the cybersecurity landscape continuously evolving, the Oracle Cloud situation serves as a stark reminder of the ongoing battle against cyber threats. Entities large and small must remain vigilant and proactive in safeguarding their data, especially as the repercussions of breaches can lead to significant operational disruptions and financial losses.

More Stories