The agency is asking organizations to come forward if they detect suspicious activity or other evidence of a compromise.
CISA said embedded situations could involve credential material that has been hardcoded into scripts, applications, infrastructure templates or automation tools. The agency said embedded credential material can be hard to detect and can enable long-term access by an unauthorized actor.
“The compromise of credential material, including usernames, emails, passwords, authentication tokens and encryption keys, can pose significant risk to enterprise environments,” according to the guidance.
“We’re disappointed with the lack of transparency from Oracle,” Errol Weiss, chief security officer at Health-Information Sharing and Analysis Center (Health-ISAC), told Cybersecurity Dive via email. “We’ve invited them to share through our member-only community, but that offer has not been acted upon yet.”
Read the full article in Cybersecurity Dive to learn what steps CISA recommends. Click Here