Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Oracle hit by second hack, customer credentials stolen
2 min Security

Oracle hit by second hack, customer credentials stolen

Berry ZwetsApril 3, 2025 8:48 amApril 3, 2025
Oracle hit by second hack, customer credentials stolen

Oracle has informed customers about a new hack. Login credentials have been stolen. The FBI and CrowdStrike are investigating the incident in which the attacker attempted extortion.

According to Bloomberg sources, Oracle employees informed certain customers this week that a hacker had accessed a computer system. The attacker managed to obtain usernames, access keys and encrypted passwords.

Extortion

The sources state that the attacker demanded money. This intrusion is unrelated to a previous hack that was reported last month. Information about the stolen login details began to come out last month. An unidentified person attempted to sell online data claimed to have been stolen from Oracle’s cloud servers. After these claims , Oracle initially denied that its cloud service had been hacked.

Legacy environment

This week, Oracle employees admitted to some customers that an attacker gained access to what they call a “legacy environment”. According to Oracle, this system has not been used for eight years, meaning the stolen login credentials would pose little risk.

A third source, also familiar with the intrusion, reports that the stolen data included login credentials for Oracle customers from 2024. This information raises questions about the seriousness of the incident and the potential consequences for customers.

Researchers at cybersecurity company Trustwave have validated the data offered for sale online as coming directly from Oracle. Karl Sigler, senior security research manager at Trustwave SpiderLabs Threat Intelligence, described the stolen data as a “rich dataset” that hackers could use for phishing attacks and possibly for account takeovers.

Tip: Oracle hack: Customers confirm leaked data is real

Tags:

cybersecurity / Extortion / hack / login details / Oracle

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Pornhub hack: 200 million user data stolen by ShinyHunters

CISA: Oracle vulnerability is being actively exploited

Emergency patch for vulnerability in Oracle E-Business Suite

More than 100 companies likely affected by Oracle hack

Editor picks

Linux 6.19 hits speed bump before final release

The Linux 6.19 kernel development cycle has hit a speed bump. Linus T...

Culture, not code, is the biggest challenge for Kubernetes

Every year, the CNCF takes stock of cloud native computing, the techn...

Who will develop the OS for AI? VAST Data is going for it

Deeper integration means more easy buttons

What are the cyber threats to the Winter Olympics?

Major sporting events are popular targets for cyber attackers. There ...

Techzine.tv

Why vulnerability counting fails: a new approach to risk ops

Why vulnerability counting fails: a new approach to risk ops

Qualcomm tells us how ARM chips will disrupt the enterprise PC market

Qualcomm tells us how ARM chips will disrupt the enterprise PC market

Why your SOC needs a ROC, according to Qualys

Why your SOC needs a ROC, according to Qualys

In-depth conversation about Agentforce IT service and how it wants to change the ITSM market

In-depth conversation about Agentforce IT service and how it wants to change the ITSM market

Read more on Security

Skeleton Key campaign exploits trusted RMM tools

Skeleton Key campaign exploits trusted RMM tools

Attackers are increasingly bypassing traditional malware defenses by exploiting legitimate remote monitoring ...

Berry Zwets 13 hours ago
Keyfactor and IBM accelerate quantum-secure transition

Keyfactor and IBM accelerate quantum-secure transition

Keyfactor and IBM Consulting are launching a joint solution that helps companies map their cryptographic syst...

Berry Zwets 14 hours ago
What are the cyber threats to the Winter Olympics?
Top story

What are the cyber threats to the Winter Olympics?

Major sporting events are popular targets for cyber attackers. There are therefore plenty of risks for the Wi...

Erik van Klinken 2 days ago
What Aikido teaches us about software and security
Top story

What Aikido teaches us about software and security

What does the rise of a European security unicorn mean for your department?

William Visterin 3 days ago

Expert Talks

Secure networking: the foundation for the AI era

Secure networking: the foundation for the AI era

As organizations get ready to roll out AI to change their business pr...

Why AI adoption requires a dedicated approach to cyber governance

Why AI adoption requires a dedicated approach to cyber governance

AI tools are spreading through the enterprise ecosystem at an astonis...

Professional print materials for European tech events, why booth design still makes the difference

When you participate in a major tech event, you naturally want to sta...

AI audit trails: the next step toward responsible AI for businesses

Brian Pugh, CTO at Lucid Software, believes that AI will be even more...

Tech calendar

Rocket Fuel Factory

January 27, 2026 Den Haag

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Dutch PHP Conference

March 10, 2026 Amsterdam

De IT Afdeling van de toekomst

March 31, 2026 Naaldwijk

GITEX ASIA 2026

April 8, 2026 Singapore

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement