The Oracle Cloud Breach of 2025: Breaking Down the Largest Supply Chain Attack of the Year

On March 21, 2025, the cybersecurity community was alerted to a significant supply chain breach targeting Oracle Cloud’s Single Sign-On (SSO) and Lightweight Directory Access Protocol (LDAP) systems. According to CloudSEK, a prominent digital risk protection firm, a threat actor operating under the alias “rose87168” exfiltrated approximately 6 million records, including Java KeyStore (JKS) files, encrypted SSO passwords, key files, and Enterprise Manager JPS keys. The breach reportedly impacted over 140,000 tenants across multiple industries and regions, with the stolen data subsequently appearing for sale on dark web forums such as BreachForums.

CloudSEK’s XVigil platform identified the breach, highlighting its scale and potential for widespread disruption. The threat actor claimed to have exploited a vulnerability in Oracle Cloud’s login infrastructure, specifically targeting the endpoint login.(region-name).oraclecloud.com. While Oracle has denied the breach, the incident has reignited critical discussions around cloud security, supply chain vulnerabilities, and the risks posed by unpatched systems. This report provides a detailed analysis of the breach, examines the implicated vulnerability (CVE-2021-35587), evaluates Oracle’s response, and offers actionable mitigation strategies for organizations to enhance their security posture.

What We Know About the Attack

CloudSEK, a cybersecurity research firm, was the first to report the breach. Its XVigil platform detected threat intelligence chatter and samples of the compromised data circulating in dark web forums. According to their findings, the attacker likely exploited a login endpoint, specifically login.us2.oraclecloud.com, which was running an older version of Oracle Fusion Middleware 11G.

It is important to note that this software stack has not been updated since 2014. This opens the door to a wide array of known vulnerabilities. The attacker claims they used a public vulnerability but did not provide a proof-of-concept exploit. The prevailing theory is that the breach could be related to CVE-2021-35587, a critical vulnerability in Oracle Access Manager, part of Fusion Middleware. This vulnerability was added to CISA’s Known Exploited Vulnerabilities catalog in late 2022 due to its potential to allow attackers to fully compromise affected systems.

The attack appears to have been in motion since January 2025. The attacker reportedly demanded a ransom of 100,000 Monero, worth over $200 million at the time, from Oracle directly. After Oracle allegedly refused to engage, “rose87168” leaked samples of the data on dark web forums.

CloudSEK assesses the threat level as high, noting the risk of unauthorized access, data exfiltration, and supply chain infiltration due to the sensitive nature of the exposed data. JKS files and SSO passwords could facilitate lateral movement across interconnected systems, making this breach a potential catalyst for secondary attacks on Oracle’s customers.

Oracle’s Response and Ongoing Controversy

Oracle quickly pushed back against the reports. In a statement to BleepingComputer and other outlets, Oracle stated, “There has been no breach of Oracle Cloud. The published credentials are not for the Oracle Cloud. No Oracle Cloud customers experienced a breach or lost any data.”

According to Oracle, the attacker’s “proof” was a text file containing a ProtonMail address, which appeared via the Wayback Machine but did not contain any Oracle customer data. Oracle maintains that no compromise of its cloud systems occurred and has suggested that the attacker may have fabricated or misrepresented the situation.

While Oracle’s denial is clear, some cybersecurity experts remain cautious. The specificity of the stolen assets, including JPS keys and JKS files, aligns with Oracle’s technology stack. CloudSEK and others also noted that the affected login subdomain historically hosted Oracle Fusion Middleware components. Until more information is shared, uncertainty remains.

The Bigger Issue: How Vulnerable Are Today’s Supply Chains?

Regardless of whether Oracle’s core cloud systems were breached, the incident highlights the challenges enterprises face when dealing with large-scale cloud and supply chain ecosystems. Supply chain attacks are complex because they affect not just a single organization, but everyone connected to it.

In this case, over 140,000 Oracle Cloud tenants could be affected, ranging from startups to Fortune 500 companies and public sector organizations. If even a fraction of those organizations relied on the compromised authentication infrastructure, attackers could have a gateway into their systems.

A key takeaway here is that many enterprises continue to depend on legacy infrastructure, often because of integration complexity, cost, or internal business processes. However, when legacy systems like Oracle Fusion Middleware 11G remain unpatched and exposed to the internet, the risk of exploitation increases exponentially.

CVE-2021-35587

The suspected vulnerability, CVE-2021-35587, is worth special attention. With a CVSS score of 9.8, this flaw in Oracle Access Manager allows an unauthenticated attacker to take control of a vulnerable server using a simple HTTP request.

This vulnerability stems from improper input validation. An attacker can exploit it to execute arbitrary code or escalate privileges. While Oracle released a patch in January 2022, the incident suggests that an outdated version of Fusion Middleware running on Oracle’s infrastructure was not patched or decommissioned.

Whether this is the exact vulnerability exploited by “rose87168” is still under debate, but the timeline and attack vector align. The deeper issue is that this vulnerability is well-documented, and the lack of patching suggests a breakdown in lifecycle management for a critical component of Oracle’s cloud environment.

How Enterprises Should Respond Now

Regardless of Oracle’s position, enterprises should treat this incident as a serious wake-up call. Cloud service providers are not immune to security lapses, and organizations relying on cloud ecosystems need to take proactive steps to secure their operations.

Rotate All Critical Credentials

If your organization uses Oracle Cloud, rotate SSO and LDAP credentials immediately. Update all relevant secrets, keys, and certificates, especially if your infrastructure interfaces with Oracle’s authentication services. Ensure that multi-factor authentication is enforced across all user accounts.

Conduct a Full Security Audit

Review your systems for any indicators of compromise related to Oracle Cloud. Pay special attention to authentication logs, unusual login patterns, and any anomalies around data access and system configuration.

This is also an opportunity to work with your incident response team or an external security partner to conduct forensic analysis and confirm whether any of your assets were among those compromised.

Patch Management: A Necessary Discipline

One recurring issue across the cybersecurity landscape is the lack of proper patch management. This case highlights how legacy systems—like Fusion Middleware 11G—can become long-term liabilities if left unpatched.

Make patch management a priority. Ensure that all critical systems and dependencies are up to date. Where possible, automate patching for high-priority vulnerabilities and consider phasing out legacy components that no longer receive vendor support.

Improve Supply Chain Visibility

Supply chain attacks often leverage indirect access points. Take the time to evaluate your entire vendor network. Map out which third-party tools and platforms are integrated into your environment and assess their patching and security posture.

Implement a zero-trust architecture that limits lateral movement and ensures that no vendor or internal system is inherently trusted. Require stronger assurances of security compliance from third parties.

Strengthen Monitoring and Threat Intelligence

Use real-time monitoring to track authentication workflows and API access. Services like CloudSEK’s XVigil or similar platforms can alert you to stolen credentials, breached data, or suspicious activity originating from dark web sources.

Pair this with internal monitoring tools to detect anomalies early. Look for brute force attempts, token misuse, or login events from unusual geolocations.

Prepare Your Teams

Lastly, cybersecurity is as much about people as it is about systems. Ensure that your security teams are aware of this breach and are trained to respond to potential fallout. Engage in regular tabletop exercises and attack simulations to build familiarity with your incident response processes.

Keep Communications Clear

If your organization is directly or indirectly affected, transparent communication is key. Inform stakeholders and customers of your response strategy and emphasize your commitment to security. The faster and clearer your communication, the easier it will be to maintain trust.

What This Breach Means for Cloud Security Moving Forward

The Oracle incident reveals a critical challenge for enterprises: how do you balance the convenience and scalability of cloud services with the hard reality of shared responsibility?

While cloud providers like Oracle manage the infrastructure, the security of workloads, applications, and integrations often remains in the hands of customers. This event serves as a reminder that shared responsibility means vigilance on both sides.

It also highlights the growing threat of supply chain attacks. As more enterprises outsource infrastructure to cloud providers and integrate with complex vendor ecosystems, attackers will continue to look for weak links—whether in an outdated middleware component or misconfigured third-party service.

The Oracle Supply Chain Breach of 2025 may still be unfolding, but it has already triggered critical conversations about cloud security, patch management, and supply chain risk.

Whether Oracle’s core systems were breached or not, enterprises must act now. By rotating credentials, auditing systems, and improving supply chain visibility, organizations can reduce the risk of exposure and minimize the impact of similar incidents in the future.

Cybersecurity is not static. As this event demonstrates, complacency is costly. The steps you take today could determine how resilient your organization is to tomorrow’s threats.

Related articles

Contact us

Partner with Us for Cutting-Edge IT Solutions

We’re happy to answer any questions you may have and help you determine which of our services best fit your needs.

Our Value Proposition
What happens next?
1

We’ll arrange a call at your convenience.

2

We do a discovery and consulting meeting 

3

We’ll prepare a detailed proposal tailored to your requirements.

Schedule a Free Consultation