Oracle Gen 1 Servers Breached - Millions of Records Compromised by Cyberattack

Oracle has confirmed a major data breach targeting its older Gen 1 servers, exposing sensitive authentication data, usernames, and hashed passwords. The attacker gained access using an old Java exploit and demanded a $20 million ransom.
Breach Confirmed by Oracle
Oracle acknowledged that its Gen 1 cloud infrastructure was compromised, with data reportedly stolen from around 6 million records.
Threat Actor "rose87168" Claims Responsibility
A hacker named “rose87168” disclosed the breach on BreachForums and is demanding a $20 million ransom, while also offering the data in exchange for zero-day exploits.
What Was Stolen?
- Usernames and email addresses
- Hashed passwords
- Sensitive SSO and LDAP credentials
- Java Key Store (JKS) files
- Enterprise Manager JPS keys
How Did the Attack Happen?
The attacker used a 2020 Java vulnerability to implant a web shell and malware targeting Oracle’s Identity Manager (IDM) systems.
Access was likely gained in January 2025, but Oracle only detected the breach in late February.
Old Systems, New Threats
Oracle confirmed the stolen data is around 16 months old and only affected Gen 1 servers, not the newer Gen 2 infrastructure.
Oracle’s Response
- Notifying affected clients
- Strengthening security around legacy servers
- Ensuring Gen 2 systems are safe
- Denying any breach of core Oracle Cloud infrastructure
A Growing Pattern of Attacks
This breach comes just weeks after another incident involving Oracle Health’s legacy Cerner systems — raising concerns about Oracle’s security posture for older platforms.
This attack is a strong reminder that legacy systems remain a weak point in many organizations' cybersecurity. Even global tech giants like Oracle aren’t immune to exploits rooted in outdated software. It’s crucial for all businesses to regularly patch, upgrade, and migrate from older platforms to avoid similar breaches.
Stay alert. Stay updated. Stay protected — with Net Protector Cyber Security.
- Other (42)
- Ransomware (141)
- Events and News (27)
- Features (45)
- Security (462)
- Tips (79)
- Google (23)
- Achievements (11)
- Products (34)
- Activation (7)
- Dealers (1)
- Bank Phishing (44)
- Malware Alerts (206)
- Cyber Attack (254)
- Data Backup (11)
- Data Breach (94)
- Phishing (154)
- Securty Tips (1)
- Browser Hijack (18)
- Adware (15)
- Email And Password (67)
- Android Security (67)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (8)
- vulnerability (56)
- Hacker (31)
- Spyware (9)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (4)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (7)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (9)
- IoT Security (1)
- Deals and Offers (2)
- Cloud Security (11)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (2)
- DMart (1)
- Payment Risk (4)
- Occasion (3)
- firewall (2)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (9)
- Impersonation phishing (1)
- DDoS (5)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)