Anatomy of a Breach

Anatomy of a Breach: Oracle Cloud and NYU — Cloud Breach Claims and 3 Million Applicant Records Exposed

> series: anatomy_of_a_breach —— part: 195 —— targets: oracle_cloud + nyu —— oracle: legacy_tenant_data —— nyu: 3,000,000_applicants_since_1989<span class="cursor-blink">_</span>_

Hedgehog Security 31 March 2025 12 min read

Oracle Cloud: legacy infrastructure claims. NYU: 3 million applicants since 1989. Legacy risk everywhere.

In March 2025, a threat actor posted claims of having breached Oracle Cloud's legacy infrastructure, allegedly accessing authentication data related to over 140,000 tenants. Oracle initially denied any breach of its current cloud services, but subsequent evidence — including data samples and customer notifications — suggested that legacy Oracle Cloud Classic systems may have been compromised. The incident highlighted the risk of legacy infrastructure within modern cloud providers — older systems maintained alongside current platforms that may not receive the same level of security attention.

Separately, on 22 March 2025, a hacker redirected New York University's website and published the personal information of over 3 million applicants dating back to 1989 — including names, test scores (SAT/ACT), GPAs, intended majors, demographic information, family backgrounds, and financial aid details. The 36-year span of the data demonstrated the extreme risk of long-term data accumulation without adequate retention policies. Both incidents reinforced that legacy systems and historical data hoards create attack surfaces that organisations consistently under-assess.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Old cloud infrastructure. 36 years of applicant data. Legacy systems create legacy risk.

Cloud Legacy Infrastructure
Oracle's legacy Cloud Classic systems — maintained alongside current Oracle Cloud Infrastructure — may have been compromised while the current platform remained secure. Legacy components within cloud providers create risk that customers may not assess. Our <a href="/penetration-testing/cloud-configuration-review">cloud configuration reviews</a> assess which cloud services and infrastructure versions an organisation depends on.
36 Years of Accumulated Data
NYU held applicant data from 1989 — 36 years of accumulated records with no apparent data minimisation. Under GDPR, data must be retained only as long as necessary. <a href="/cyber-essentials">Cyber Essentials</a> addresses data retention. For UK <a href="/blog/sector-under-the-microscope-education">education institutions</a>, the NYU case is a direct warning about data accumulation.
Education Sector — Again
Following <a href="/blog/anatomy-of-a-breach-powerschool">PowerSchool</a> (January 2025, 62M students) and now NYU (March 2025, 3M applicants), the education sector was hit twice in three months — confirming its status as a consistently under-protected high-value target. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors education platforms.
Denial Followed by Confirmation
Oracle's initial denial, followed by evidence suggesting a compromise, echoed the <a href="/blog/anatomy-of-a-breach-att-73m">AT&T pattern</a> (2024): denial delays trust and compounds reputational damage. <a href="https://www.cyber-defence.io/services/incident-response">UK Cyber Defence</a> provides incident response that includes honest, timely disclosure guidance.

Audit your legacy systems. Minimise your data. Before someone else does it for you.

The Oracle and NYU incidents reinforced that legacy infrastructure and historical data accumulation create persistent risk. Cyber Essentials addresses secure configuration and data management. Our cloud reviews assess legacy cloud dependencies. Infrastructure testing identifies legacy system exposure. SOC in a Box monitors for compromise indicators across all systems — legacy and current. And UK Cyber Defence provides incident response when legacy systems are exploited.


Oracle's legacy cloud. NYU's 36-year data hoard. What legacy risk is hiding in your estate?

<a href="/penetration-testing/cloud-configuration-review">Cloud reviews</a> assess legacy dependencies. <a href="/penetration-testing/infrastructure">Infrastructure testing</a> finds legacy exposure. <a href="/cyber-essentials">Cyber Essentials</a> mandates secure configuration.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles