Dozens of Oracle customers impacted by Clop data theft for extortion campaign
Clop, the notorious ransomware group, began targeting Oracle E-Business Suite customers three months ago and started exploiting a zero-day affecting the enterprise platform to steal massive amounts of data from victims as early as Aug. 9, Google Threat Intelligence Group and Mandiant said in a report Thursday.Β
βWeβre still assessing the scope of this incident, but we believe it affected dozens of organizations. Some historic Clop data extortion campaigns have had hundreds of victims,β John Hultquist, chief analyst at GTIG, said in a statement. βUnfortunately large scale zero-day campaigns like this are becoming a regular feature of cybercrime.β
The new timeline provided by Googleβs incident response firm and security researchers confirms malicious activity against Oracle E-Business Suite customers began almost three months before Clop sent extortion emails to executives of alleged victim organizations demanding payment on Sept. 29.Β
Oracle disclosed the critical zero-day vulnerability β CVE-2025-61882 β Saturday, two days after it said its customers had received extortion emails following exploitation of vulnerabilities it previously identified and addressed in a July security update.Β
The widespread attack spree actually involved at least five distinct defects, including the zero-day, that were chained together to achieve pre-authenticated remote code execution, watchTowr researchers said earlier this week.
Researchers at watchTowr reproduced the full exploit chain after obtaining a proof of concept and published a flow chart depicting how attackers chained multiple vulnerabilities together.Β
βItβs currently unclear which specific vulnerabilities or exploit chains correspond to CVE-2025-61882, however, GTIG assesses that Oracle EBS servers updated through the patch released on Oct. 4 are likely no longer vulnerable to known exploitation chains,β Google said in the report.
Researchers identified suspicious traffic that may point to early attempts at exploitation prior to Oracleβs July security update, but Google has not confirmed the precise nature of that activity.Β
Many customers remain exposed and potentially vulnerable to attacks. Shadowserver scans found 576 potentially vulnerable instances of Oracle E-Business Suite on Oct. 6, with the majority of those IPs based in the United States.
Clopβs ransom demands have reached up to $50 million, according to Halcyon. βWe have seen seven- and eight-figure demands thus far,β Cynthia Kaiser, senior vice president of Halcyonβs ransomware research center, told CyberScoop.
Investigations into Clopβs activity underscore the stealthy nature of the threat groupβs operations, including the use of multi-stage fileless malware designed to evade file-based detection. Other critical details remain unknown and cybercriminals from other groups have complicated analysis through unsubstantiated claims.Β
Mandiant said it observed artifacts on Oct. 3 that overlap with an exploit leaked in a Telegram group dubbed βScattered LAPSUS$ Hunters.β Yet, Google hasnβt gathered enough evidence to definitively link the malicious July 2025 activity with this exploit.Β
βAt this time, GTIG does not assess that actors associated with UNC6240 (also known as βShiny Huntersβ) were involved in this exploitation activity,β Google said in the report.Β
While multiple pieces of evidence indicate Clop is behind the attacks, Google said itβs possible other threat groups are involved.
Clop has successfully intruded multiple technology vendorsβ systems, particularly file-transfer services, allowing it to steal data on many downstream customers. The threat group achieved mass exploitation as it infiltrated MOVEit environments in 2023, ultimately exposing data from more than 2,300 organizations, making it the largest and most significant cyberattack that year.
The post Dozens of Oracle customers impacted by Clop data theft for extortion campaign appeared first on CyberScoop.