LOGO

Clop Hackers Exploit Oracle Zero-Day: Executive Data Breach

October 6, 2025
Clop Hackers Exploit Oracle Zero-Day: Executive Data Breach

Oracle Addresses Zero-Day Vulnerability in E-Business Suite

A critical zero-day vulnerability has been identified and addressed by Oracle within its Oracle E-Business Suite. This flaw is currently being actively exploited by a hacking group for the purpose of data theft, specifically targeting personal information belonging to corporate executives.

Immediate Patching Recommended

Rob Duhart, Oracle’s chief security officer, announced the release of a security patch over the weekend. He strongly advises all customers to implement this update without delay. Prompt installation is crucial to mitigate the risk of exploitation.

Technical Details of the Vulnerability

The vulnerability, officially designated as CVE-2025-61882, allows for remote exploitation without requiring valid login credentials. This means attackers can potentially gain access to systems over a network without a username or password.

Oracle has provided indicators of compromise (IOCs) to assist customers in detecting potential breaches and identifying any malicious activity on their systems. These IOCs suggest ongoing exploitation of the vulnerability.

Widespread Impact

The Oracle E-Business Suite is utilized by thousands of organizations globally. These organizations rely on the suite for critical business functions, including customer data management and human resources record keeping.

Zero-Day Nature of the Flaw

This vulnerability is classified as a zero-day because Oracle received no prior warning or opportunity to develop a patch before it was exploited maliciously. This lack of prior knowledge significantly increases the risk.

Shift in Understanding of the Attack

Initial reports indicated the extortion campaign was contained after patches released in July. However, Duhart’s recent update reveals a change in understanding. The newly discovered zero-day vulnerability demonstrates continued exploitation of previously unknown flaws within the Oracle E-Business software.

Initial Reports of Extortion

Reports of extortion attempts targeting corporate executives first surfaced last week, raising concerns about the scope and severity of the attacks.

Clop Group Identified as the Perpetrator

Google security researchers identified the hacking group Clop as the entity behind the extortion attempts. Clop has a history of involvement in numerous ransomware attacks and extortion schemes.

According to Google, Clop began sending emails to Oracle executives around September 29th, demanding payment to prevent the public release of their personal information.

Mass Exploitation Campaign

Charles Carmakal, CTO of Mandiant (Google’s incident response unit), stated on LinkedIn that the vulnerabilities in Oracle’s E-Business software are being leveraged in a “mass exploitation” campaign focused on data theft and extortion.

Exploitation Timeline

A significant portion of the exploitation activity occurred in August, even after the July security patches were deployed. This indicates the attackers were exploiting vulnerabilities beyond those addressed in the earlier updates.

Carmakal noted that Clop has been sending extortion emails to victims since last Monday, though not all affected individuals have been contacted yet.

#Clop#Oracle#zero-day#data breach#ransomware#cybersecurity