home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,125 of 2,445   
   Mike Powell to All   
   Oracle admits second majo   
   03 Apr 25 10:14:00   
   
   TZUTC: -0500   
   MSGID: 852.consprcy@1:2320/105 2c53e001   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   Oracle admits second major security breach, user login data stolen   
      
   Date:   
   Thu, 03 Apr 2025 10:52:00 +0000   
      
   Description:   
   Oracle says breach only affects old data, but some reports disagree.   
      
   FULL STORY   
      
   Oracle has apparently suffered its second cyberattack in a month, but the   
   company is downplaying its importance.    
      
   A Bloomberg report citing two people familiar with the matter has claimed   
   Oracle told some of its customers a threat actor compromised its IT   
   infrastructure and stole client login credentials.    
      
   At the same time, Reuters is reporting that an unidentified threat actor    
   tried to sell the stolen data on the dark web, claiming to have stolen it    
   from Oracles Austin, Texas premises.    
      
   Old data    
      
    Bloomberg also reported that Oracle told some of its clients that the FBI    
   was notified, and that CrowdStrike was brought in to investigate.    
   Furthermore, the clients were notified that this is not the same incident    
   that s truck healthcare customers in March 2025 . Finally, the attacker also   
   tried to extort Oracle for the stolen data.    
      
   Oracle has hinted that the data isnt that relevant, however, claiming that    
   the compromised system was not used for eight years. Therefore, the    
   conclusion is that the data found there is outdated and poses little risk.    
      
   However, there were Oracle customer login credentials from as recently as   
   2024.    
      
   We would say that leaked login data is always a problem, regardless of if its   
   ten years, or ten days old. Besides, many organizations never change their   
   login credentials, or reuse the same passwords across a myriad of other   
   services, in which case such a database could prove a gold mine for   
   brute-force or credential stuffing attacks.    
      
   At press time, Oracle has not yet addressed the media reports, but we have   
   contacted the company for comment.   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/oracle-admits-second-major-security-bre   
   ach-user-login-data-stolen   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca