Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Daily Security Review. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daily Security Review or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Cl0p Ransomware Targets Oracle E-Business Suite in Global Data Extortion Spree

17:57
 
Share
 

Manage episode 514766205 series 3645080
Content provided by Daily Security Review. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daily Security Review or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

A new wave of Cl0p ransomware attacks has struck organizations worldwide by exploiting vulnerabilities in Oracle’s E-Business Suite (EBS) — a mission-critical enterprise management platform used by corporations and universities across the globe. The ongoing campaign, attributed to FIN11, highlights the group’s shift toward exploiting high-value business systems for maximum leverage in data extortion schemes. Victims range from Envoy Air, a subsidiary of American Airlines, to prestigious academic institutions like Harvard University and the University of the Witwatersrand in South Africa.

The threat actors reportedly stole and leaked over 26GB of corporate data, claiming it originated from American Airlines systems, though Envoy Air maintains that no customer or sensitive data was exposed. Other victims have also had files posted to the Cl0p leak site, indicating that they refused to pay ransom demands. The group’s attack lifecycle follows a familiar yet devastating pattern — exploit, exfiltrate, extort, and expose — and emphasizes how quickly operational disruptions can turn into reputational crises when data is publicly released.

At the heart of this campaign are vulnerabilities within Oracle EBS, including a zero-day flaw (CVE-2025-61882) and potentially CVE-2025-61884, which Oracle has patched but not fully clarified as exploited. The zero-day allowed attackers to infiltrate unpatched systems, exfiltrate sensitive data, and apply intense ransom pressure through public shaming on dark web leak platforms. Oracle’s subsequent updates confirm that the flaw was actively exploited in the wild, underscoring the urgent need for enterprises to prioritize EBS patch management and vulnerability scanning.

The campaign’s attribution to FIN11 and the Cl0p ransomware group highlights the blurred lines within modern cybercrime ecosystems, where overlapping threat clusters share infrastructure and tooling. Mandiant’s intelligence suggests multiple subgroups may operate under the FIN11 umbrella, complicating attribution and response efforts.

This incident serves as a stark reminder that core enterprise platforms are now prime targets for ransomware operators. As the Cl0p group continues to evolve from traditional encryption-based attacks to pure data-theft and extortion, organizations must assume that compromise equates to exposure — and that operational security now extends to the ERP layer.

#Cl0p #FIN11 #Oracle #EBusinessSuite #CVE202561882 #CVE202561884 #Ransomware #DataBreach #EnvoyAir #AmericanAirlines #HarvardUniversity #UniversityoftheWitwatersrand #OracleVulnerabilities #CyberCrime #Extortionware #DataExfiltration #LeakSite #ZeroDayExploit #Mandiant #CyberAttack #InformationSecurity #PatchManagement #ThreatIntelligence #CyberExtortion #EnterpriseSecurity #OracleEBS #RansomOps #SecurityBreach #DarkWebLeaks #CyberRisk #Infosec

  continue reading

410 episodes

Artwork
iconShare
 
Manage episode 514766205 series 3645080
Content provided by Daily Security Review. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daily Security Review or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

A new wave of Cl0p ransomware attacks has struck organizations worldwide by exploiting vulnerabilities in Oracle’s E-Business Suite (EBS) — a mission-critical enterprise management platform used by corporations and universities across the globe. The ongoing campaign, attributed to FIN11, highlights the group’s shift toward exploiting high-value business systems for maximum leverage in data extortion schemes. Victims range from Envoy Air, a subsidiary of American Airlines, to prestigious academic institutions like Harvard University and the University of the Witwatersrand in South Africa.

The threat actors reportedly stole and leaked over 26GB of corporate data, claiming it originated from American Airlines systems, though Envoy Air maintains that no customer or sensitive data was exposed. Other victims have also had files posted to the Cl0p leak site, indicating that they refused to pay ransom demands. The group’s attack lifecycle follows a familiar yet devastating pattern — exploit, exfiltrate, extort, and expose — and emphasizes how quickly operational disruptions can turn into reputational crises when data is publicly released.

At the heart of this campaign are vulnerabilities within Oracle EBS, including a zero-day flaw (CVE-2025-61882) and potentially CVE-2025-61884, which Oracle has patched but not fully clarified as exploited. The zero-day allowed attackers to infiltrate unpatched systems, exfiltrate sensitive data, and apply intense ransom pressure through public shaming on dark web leak platforms. Oracle’s subsequent updates confirm that the flaw was actively exploited in the wild, underscoring the urgent need for enterprises to prioritize EBS patch management and vulnerability scanning.

The campaign’s attribution to FIN11 and the Cl0p ransomware group highlights the blurred lines within modern cybercrime ecosystems, where overlapping threat clusters share infrastructure and tooling. Mandiant’s intelligence suggests multiple subgroups may operate under the FIN11 umbrella, complicating attribution and response efforts.

This incident serves as a stark reminder that core enterprise platforms are now prime targets for ransomware operators. As the Cl0p group continues to evolve from traditional encryption-based attacks to pure data-theft and extortion, organizations must assume that compromise equates to exposure — and that operational security now extends to the ERP layer.

#Cl0p #FIN11 #Oracle #EBusinessSuite #CVE202561882 #CVE202561884 #Ransomware #DataBreach #EnvoyAir #AmericanAirlines #HarvardUniversity #UniversityoftheWitwatersrand #OracleVulnerabilities #CyberCrime #Extortionware #DataExfiltration #LeakSite #ZeroDayExploit #Mandiant #CyberAttack #InformationSecurity #PatchManagement #ThreatIntelligence #CyberExtortion #EnterpriseSecurity #OracleEBS #RansomOps #SecurityBreach #DarkWebLeaks #CyberRisk #Infosec

  continue reading

410 episodes

Semua episode

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play