Oracle Cloud Breach Allegations: Unveiling "rose87168" and Their Cloud Exploitation Tactics
The threat actor "rose87168" has emerged as a player in the cybercriminal landscape, claiming responsibility for a major breach involving Oracle Cloud. This actor allegedly exploited vulnerabilities in Oracle's federated single sign-on (SSO) and LDAP systems...


EDITOR'S NOTE: I'm testing the next generation of the AlphaHunt- the research goes a bit deeper, a bit more directed and a bit more "peer" reviewed. The layout may still need some work... feedback welcome (just hit reply! :))
TL;DR
Key Points
-
- "rose87168" claims to have stolen 6 million records from Oracle Cloud, targeting federated SSO and LDAP systems.
- Organizations using Oracle Cloud should enhance security measures, focusing on these systems.
-
- Oracle denies the breach, asserting no customer data was compromised despite the threat actor's claims.
- Continuous monitoring and vulnerability assessments are crucial to verify security postures.
-
- The threat actor's primary motivation is financial gain through extortion, with a focus on monetizing stolen data.
- Implementing robust incident response plans can mitigate extortion risks.
Summary
The threat actor "rose87168" has emerged as a player in the cybercriminal landscape, claiming responsibility for a major breach involving Oracle Cloud. This actor allegedly exploited vulnerabilities in Oracle's federated single sign-on (SSO) and LDAP systems, exfiltrating sensitive data such as JKS files and encrypted SSO passwords. Despite these claims, Oracle has publicly denied any breach, maintaining that no customer data was compromised.
"rose87168" is primarily motivated by financial gain, engaging in extortion by threatening to sell the stolen data. The actor's activities have targeted several countries, including the United States, India, and the United Kingdom, impacting sectors such as technology, finance, and healthcare. The sophistication of their methods suggests a deep understanding of cloud security vulnerabilities.
Organizations using Oracle Cloud are advised to conduct comprehensive security assessments, focusing on federated SSO and LDAP systems. Implementing multi-factor authentication, continuous monitoring, and robust incident response plans are recommended to mitigate potential threats. Additionally, increasing threat intelligence sharing and conducting employee training on recognizing social engineering tactics can further enhance security postures.
Attribution
Historical Context
The threat actor known as "rose87168" has recently gained notoriety for their involvement in a significant cyber incident involving Oracle Cloud. This actor is associated with claims of exploiting vulnerabilities in cloud services, particularly targeting Oracle's federated single sign-on (SSO) and LDAP systems. The emergence of "rose87168" reflects a growing trend of cybercriminals focusing on cloud infrastructures for data exfiltration and extortion.
Timeline
- March 21, 2025: "rose87168" claims to have stolen 6 million records from Oracle Cloud, including sensitive data such as JKS files and encrypted SSO passwords.
- March 22, 2025: Oracle publicly denies the breach, asserting that no customer data was compromised, despite the claims made by the threat actor.
Origin
"rose87168" is identified as a new threat actor, with their activities first reported by CloudSEK on March 21, 2025. The actor's origin remains unclear, but their operational focus on cloud services suggests a sophisticated understanding of cloud security vulnerabilities.
Countries Targeted
- United States - The primary target, as many organizations using Oracle Cloud are based in the U.S.
- India - Notable due to the presence of numerous tech companies utilizing Oracle Cloud services.
- United Kingdom - Targeted due to the significant number of businesses relying on cloud infrastructure.
- Germany - Affected by the breach due to the presence of multinational corporations using Oracle Cloud.
- Australia - Targeted as part of the broader international reach of the threat actor.
Sectors Targeted
- Technology - Major tech firms using Oracle Cloud services are at high risk.
- Finance - Financial institutions that rely on cloud services for data management.
- Healthcare - Organizations managing sensitive patient data in the cloud.
- Retail - Companies using cloud services for e-commerce and customer data management.
- Education - Institutions utilizing cloud platforms for administrative and student data.
Motivation
The primary motivation behind "rose87168" appears to be financial gain through extortion. The actor has claimed to sell the stolen data, indicating a focus on monetizing their cybercriminal activities. The sophistication of their methods suggests a potential interest in causing reputational damage to targeted organizations as well.
Similar Threat Actor Groups
-
Lapsus$
- Similarity: Both Lapsus$ and rose87168 are known for high-profile data breaches and extortion tactics.
- Attribution: Originating from various countries, Lapsus$ targets large corporations, employing social engineering and insider threats.
-
Conti
- Similarity: Both groups utilize ransomware and have been involved in significant data theft and extortion campaigns.
- Attribution: Conti is a ransomware group known for targeting critical infrastructure and demanding large ransoms.
Breaches Involving This Threat Actor
The breach allegedly involves the exfiltration of sensitive data, including:
- JKS (Java Keystore) files
- Encrypted SSO passwords
- Key files
- Enterprise manager JPS keys
The potential consequences for affected organizations include unauthorized access to sensitive systems and data, increased risk of corporate espionage, and financial and reputational damage due to extortion demands from the threat actor.
Recommendations, Actions, Suggested Pivots, Forecasts and Next Steps..
(Subscribers Only)