CISO Talk by James Azar
CyberHub Podcast
Oracle Customer Confirms Data Stolen in Breach, Supply Chain Breach Fine, Hyper V Server Ransomware
0:00
-18:16

Oracle Customer Confirms Data Stolen in Breach, Supply Chain Breach Fine, Hyper V Server Ransomware

Major Enterprise Breaches, Financial Fallout, and Evolving Ransomware Tactics

In this edition of the CyberHub Podcast, broadcasting from CyberTech in Israel, the host examines headline-grabbing security breaches, new ransomware strains, significant legal settlements, and the latest business moves in cybersecurity.

From Oracle’s disputed data breach allegations to the abrupt financial losses of a major poultry producer, and the rising threat of innovative ransomware campaigns, each development underscores a core message: cybersecurity is now inextricably tied to reputational, operational, and financial success.

Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.

Share

Oracle Denies Cloud SSO Breach

An unknown threat actor named “Rose87168” claims to have hacked Oracle Cloud servers, allegedly stealing credentials for nearly six million users. Text files with LDAP data, domain lists, and even screenshots supposedly showing the intruder’s ability to create files on Oracle’s infrastructure were published. While Oracle categorically denies a breach, independent validation by impacted entities suggests the data may be authentic. Questions remain about whether Oracle is still investigating, and further details are expected as the situation evolves.

StreamElements Third-Party Data Exposure

StreamElements, a platform widely used by online creators for overlays, chatbots, and analytics, disclosed a data breach stemming from a third-party provider they had parted ways with last year. Leaked samples indicate full names, email addresses, and phone numbers of approximately 210,000 users. StreamElements emphasized that its primary servers remain unaffected, although the leaked data highlight how outsourcing can create hidden points of vulnerability.

Defense Contractor Fined for Security Lapses

Cambridge-based Morse Corp. agreed to pay a USD 4.6 million fine under the False Claims Act for overstating its cybersecurity measures on government contracts. An external auditor discovered the firm drastically failed to meet NIST standards—contradicting the self-reported near-perfect cybersecurity score. The discrepancy underscores how inaccurate self-assessments and neglected compliance can quickly balloon into regulatory and legal trouble.

Astral Foods Loses USD 1.1M to Cyber Incident

Astral Foods, one of South Africa’s largest poultry producers, suffered a security incident that caused around USD 1.1 million in losses within just a week. The event forced the company to invoke disaster recovery protocols and disrupted processing and deliveries. Although critical data was reportedly not compromised, downtime and the resulting backlog demonstrate the profound operational and financial impact of even short-lived cyber disruptions.

Chinese Threat Actor “Famous Sparrow” Strike

A group tracked as Famous Sparrow orchestrated cyberattacks against a U.S. trade association and a Mexican research institute, deploying their custom backdoors “SparrowDoor” and “ShadowPad.” These campaigns reflect ongoing interest by suspected state-sponsored operatives in gaining footholds across strategic organizations worldwide. Researchers noted that these latest ShadowPad deployments showcase the evolution and increased sophistication of Chinese-linked APT capabilities.

Vulnerabilities in Japanese Production Line Camera

Industrial cameras made by Inaba Denki Sangyo, designed for monitoring factory operations, contain multiple serious vulnerabilities. These flaws—ranging from weak default passwords to improper client-side authentication—could let attackers manipulate video feeds or sabotage production lines. The case underscores the importance of firmware security checks, especially for devices with direct links to operational technology (OT) environments.

Red Curl’s Hyper-V Ransomware Debut

The stealthy corporate espionage collective known as Red Curl is adding new ransomware capabilities to its playbook. In at least one attack, the group deployed a custom “QWCrypt” encryptor targeting Hyper-V virtual machines on Windows servers. Red Curl typically focuses on data exfiltration and extended presence in victim networks, but this new ransomware angle reveals a readiness to escalate disruptions if needed—yet another shift toward hybrid attack models.

OpenAI Ups Bug Bounty to USD 100K

OpenAI announced that its top bug bounty payouts will now go up to USD 100,000, incentivizing security researchers to uncover critical flaws in the company’s infrastructure and AI models. This move aligns with broader initiatives to engage the cybersecurity community and strengthen OpenAI’s posture as AI technologies face rising scrutiny and exploitation attempts.

Island Nets USD 250M Funding, Near USD 5B Valuation

Enterprise browser startup Island received a new USD 250 million Series E investment, raising its valuation close to USD 5 billion. The funding round indicates continued investor enthusiasm for secure browser technologies, even as competition tightens from major incumbents like Microsoft and Google and smaller challengers in the browser security market.

Action List

  • Verify Oracle Dependencies: If you rely on Oracle Cloud, monitor official advisories and be prepared for password resets or new access controls.

  • Assess Third-Party Risks: Map out your supply chain and verify that ex-partners no longer retain your data to prevent legacy breach exposures.

  • Maintain Honest Compliance: Conduct rigorous internal and external audits to avoid costly fines and reputational damage.

  • Disaster Recovery Drills: Test your DR capabilities frequently to minimize operational downtime and financial losses in the event of an incident.

  • Hunt for APT Activity: Track advanced threat actor TTPs (Tools, Techniques, Procedures) like SparrowDoor or ShadowPad for early detection.

  • Segment OT Networks: Deploy strict access controls and regular firmware audits for industrial devices to ward off sabotage attempts.

  • Bolster Virtualization Security: Strengthen Hyper-V environments against novel ransomware variants by enforcing least privilege and updated defenses.

  • Engage Bug Bounties: Encourage security research on your platforms; consider increasing bounty rewards to attract top talent.

  • Stay Aware of Browser Innovations: Keep an eye on the enterprise browser market for security features that might help in your environment.

✅ Story Links:

https://www.bleepingcomputer.com/news/security/oracle-customers-confirm-data-stolen-in-alleged-cloud-breach-is-valid/

https://www.bleepingcomputer.com/news/security/streamelements-discloses-third-party-data-breach-after-hacker-leaks-data/

https://therecord.media/defense-contractor-to-pay-millions-over-cyber-practices

https://www.darkreading.com/cyberattacks-data-breaches/south-african-poultry-company-1m-loss-cyber-intrusion

https://thehackernews.com/2025/03/new-sparrowdoor-backdoor-variants-found.html

https://www.securityweek.com/vulnerabilities-allow-remote-hacking-of-inaba-plant-monitoring-cameras/

https://www.bleepingcomputer.com/news/security/redcurl-cyberspies-create-ransomware-to-encrypt-hyper-v-servers/

https://www.securityweek.com/openai-offering-100k-bounties-for-critical-vulnerabilities/

https://www.securityweek.com/island-banks-250m-series-e-for-enterprise-browser/

Level Zero Conference Discount Code: L020RESPOND at www.levelzeroconference.com

🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1

🚨 Important Links to Follow:

👉Website:

👉Listen here: https://linktr.ee/cyberhubpodcast

Stay Connected With Us.

👉Facebook: https://www.facebook.com/CyberHubpodcast/

👉LinkedIn: https://www.linkedin.com/company/cyberhubpodcast/

👉Twitter (X): https://twitter.com/cyberhubpodcast

👉Instagram: https://www.instagram.com/cyberhubpodcast

🤝 For Business Inquiries: info@cyberhubpodcast.com

=============================

🚀 About The CyberHub Podcast.

The Hub of the Infosec Community.

Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.

Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.

Discussion about this episode