Clop Hackers Exploit Oracle Zero-Day: Executive Data Breach

Oracle Addresses Zero-Day Vulnerability in E-Business Suite
A critical zero-day vulnerability has been identified and addressed by Oracle within its Oracle E-Business Suite. This flaw is currently being actively exploited by a hacking group for the purpose of data theft, specifically targeting personal information belonging to corporate executives.
Immediate Patching Recommended
Rob Duhart, Oracle’s chief security officer, announced the release of a security patch over the weekend. He strongly advises all customers to implement this update without delay. Prompt installation is crucial to mitigate the risk of exploitation.
Technical Details of the Vulnerability
The vulnerability, officially designated as CVE-2025-61882, allows for remote exploitation without requiring valid login credentials. This means attackers can potentially gain access to systems over a network without a username or password.
Oracle has provided indicators of compromise (IOCs) to assist customers in detecting potential breaches and identifying any malicious activity on their systems. These IOCs suggest ongoing exploitation of the vulnerability.
Widespread Impact
The Oracle E-Business Suite is utilized by thousands of organizations globally. These organizations rely on the suite for critical business functions, including customer data management and human resources record keeping.
Zero-Day Nature of the Flaw
This vulnerability is classified as a zero-day because Oracle received no prior warning or opportunity to develop a patch before it was exploited maliciously. This lack of prior knowledge significantly increases the risk.
Shift in Understanding of the Attack
Initial reports indicated the extortion campaign was contained after patches released in July. However, Duhart’s recent update reveals a change in understanding. The newly discovered zero-day vulnerability demonstrates continued exploitation of previously unknown flaws within the Oracle E-Business software.
Initial Reports of Extortion
Reports of extortion attempts targeting corporate executives first surfaced last week, raising concerns about the scope and severity of the attacks.
Clop Group Identified as the Perpetrator
Google security researchers identified the hacking group Clop as the entity behind the extortion attempts. Clop has a history of involvement in numerous ransomware attacks and extortion schemes.
According to Google, Clop began sending emails to Oracle executives around September 29th, demanding payment to prevent the public release of their personal information.
Mass Exploitation Campaign
Charles Carmakal, CTO of Mandiant (Google’s incident response unit), stated on LinkedIn that the vulnerabilities in Oracle’s E-Business software are being leveraged in a “mass exploitation” campaign focused on data theft and extortion.
Exploitation Timeline
A significant portion of the exploitation activity occurred in August, even after the July security patches were deployed. This indicates the attackers were exploiting vulnerabilities beyond those addressed in the earlier updates.
Carmakal noted that Clop has been sending extortion emails to victims since last Monday, though not all affected individuals have been contacted yet.
Related Posts

FTC Upholds Ban on Stalkerware Founder Scott Zuckerman

Google Details Chrome Security for Agentic Features

Petco Data Breach: SSNs, Driver's Licenses Exposed

Petco Data Breach: Customer Data Exposed - What You Need to Know

Intellexa Spyware: Direct Access to Government Espionage Victims
