Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Oracle hit by second hack, customer credentials stolen
2 min Security

Oracle hit by second hack, customer credentials stolen

Berry ZwetsApril 3, 2025 8:48 amApril 3, 2025
Oracle hit by second hack, customer credentials stolen

Oracle has informed customers about a new hack. Login credentials have been stolen. The FBI and CrowdStrike are investigating the incident in which the attacker attempted extortion.

According to Bloomberg sources, Oracle employees informed certain customers this week that a hacker had accessed a computer system. The attacker managed to obtain usernames, access keys and encrypted passwords.

Extortion

The sources state that the attacker demanded money. This intrusion is unrelated to a previous hack that was reported last month. Information about the stolen login details began to come out last month. An unidentified person attempted to sell online data claimed to have been stolen from Oracle’s cloud servers. After these claims , Oracle initially denied that its cloud service had been hacked.

Legacy environment

This week, Oracle employees admitted to some customers that an attacker gained access to what they call a “legacy environment”. According to Oracle, this system has not been used for eight years, meaning the stolen login credentials would pose little risk.

A third source, also familiar with the intrusion, reports that the stolen data included login credentials for Oracle customers from 2024. This information raises questions about the seriousness of the incident and the potential consequences for customers.

Researchers at cybersecurity company Trustwave have validated the data offered for sale online as coming directly from Oracle. Karl Sigler, senior security research manager at Trustwave SpiderLabs Threat Intelligence, described the stolen data as a “rich dataset” that hackers could use for phishing attacks and possibly for account takeovers.

Tip: Oracle hack: Customers confirm leaked data is real

Tags:

cybersecurity / Extortion / hack / login details / Oracle

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Pornhub hack: 200 million user data stolen by ShinyHunters

CISA: Oracle vulnerability is being actively exploited

Emergency patch for vulnerability in Oracle E-Business Suite

More than 100 companies likely affected by Oracle hack

Editor picks

DeepSeek breakthrough gives LLMs the highways it has long needed

mHC breaks through old AI bottlenecks

‘Ni8mare’ vulnerability affects n8n platform with a score of 10.0

Security researchers at Cyera have discovered a critical vulnerabilit...

Is Grok enterprise ready? xAI thinks so

X factor missing

Arm and Nvidia are on the prowl for physical AI’s ‘ChatGPT moment’

Is robotics about to experience an AI breakthrough?

Techzine.tv

Salesforce reveals its own Agentic IT Service Platform

Salesforce reveals its own Agentic IT Service Platform

Why SAP says best-of-breed software era is over

Why SAP says best-of-breed software era is over

Sophos CEO sees "cybersecurity poverty line": what to do about it?

Sophos CEO sees "cybersecurity poverty line": what to do about it?

SAP's AI migration tools from ECC to S/4HANA: faster and cheaper ERP transitions

SAP's AI migration tools from ECC to S/4HANA: faster and cheaper ERP transitions

Read more on Security

Why did so many security vendors abandon MITRE’s stresstest?
Top story

Why did so many security vendors abandon MITRE’s stresstest?

This year, MITRE made headlines primarily because its leading vulnerability database was in danger of being d...

Erik van Klinken December 12, 2025
Microsoft requires MFA for Microsoft 365 admin center

Microsoft requires MFA for Microsoft 365 admin center

Starting February 9, 2026, Microsoft will enforce multi-factor authentication (MFA) for all users who want to...

Berry Zwets 12 hours ago
EU to decide on Google’s acquisition of Wiz on February 10

EU to decide on Google’s acquisition of Wiz on February 10

EU competition authorities will decide by February 10 whether to approve Alphabet's acquisition of cybersecur...

Berry Zwets 15 hours ago
Sophos CEO sees “cybersecurity poverty line”: what to do about it?
Top story

Sophos CEO sees “cybersecurity poverty line”: what to do about it?

We sit down with Sophos CEO Joe Levy during Pax8 Beyond to discuss, among other things, the progress of the S...

Sander Almekinders December 11, 2025

Expert Talks

Cybersecurity in 2026 demands managing human behavior and agentic AI

Cybersecurity in 2026 demands managing human behavior and agentic AI

Most organizations today have more security technology at their dispo...

Digital sovereignty: from buzzword to business imperative

Digital sovereignty: from buzzword to business imperative

Digital sovereignty has outgrown its niche as an IT concern and is no...

Why specialized LLMs are the future of generative AI

ChatGPT and the other GenAI chatbots that have taken the tech world b...

The year of the AI agents: why 2026 is about value, not technology

Microsoft has declared 2026 to be the year of the agent. This is not ...

Tech calendar

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Dutch PHP Conference

March 10, 2026 Amsterdam

De IT Afdeling van de toekomst

March 31, 2026 Naaldwijk

GITEX ASIA 2026

April 8, 2026 Singapore

SAS Innovate 2026

April 27, 2026 Grapevine

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement