Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks

Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks

Posted on October 6, 2025October 6, 2025 By CWS

Oct 06, 2025Ravie LakshmananVulnerability / Risk Intelligence
Oracle has launched an emergency replace to handle a vital safety flaw in its E-Enterprise Suite that it mentioned has been exploited within the current wave of Cl0p information theft assaults.
The vulnerability, tracked as CVE-2025-61882 (CVSS rating: 9.8), issues an unspecified bug that would enable an unauthenticated attacker with community entry through HTTP to compromise and take management of the Oracle Concurrent Processing element.
“This vulnerability is remotely exploitable with out authentication, i.e., it could be exploited over a community with out the necessity for a username and password,” Oracle mentioned in an advisory. “If efficiently exploited, this vulnerability could end in distant code execution.”
In a separate alert, Oracle’s Chief Safety Officer Rob Duhart mentioned the corporate has launched fixes for CVE-2025-61882 to “present updates towards extra potential exploitation that have been found throughout our investigation.”

As indicators of compromise (IoCs), the expertise shared the next IP addresses and artifacts, indicating the probably involvement of the Scattered LAPSUS$ Hunters group as properly within the exploit –

Information of the Oracle zero-day comes days after experiences emerged of a brand new marketing campaign probably undertaken by the Cl0p ransomware group focusing on Oracle E-Enterprise Suite. Google-owned Mandiant described the continuing exercise as a “high-volume e-mail marketing campaign” launched from a whole lot of compromised accounts.
In a put up shared on LinkedIn, Charles Carmakal, CTO of Mandiant at Google Cloud, mentioned “Cl0p exploited a number of vulnerabilities in Oracle EBS which enabled them to steal massive quantities of knowledge from a number of victims in August 2025,” including “a number of vulnerabilities have been exploited together with vulnerabilities that have been patched in Oracle’s July 2025 replace in addition to one which was patched this weekend (CVE-2025-61882).”
“Given the broad mass zero-day exploitation that has already occurred (and the n-day exploitation that can probably proceed by different actors), no matter when the patch is utilized, organizations ought to look at whether or not they have been already compromised,” Carmakal famous.
(This can be a growing story. Please test again for extra particulars.)

The Hacker News Tags:Attacks, Cl0p, CVE202561882, Data, Exploited, Oracle, Patch, Rushes, Theft

Post navigation

Previous Post: Hackers Exploit Zimbra Vulnerability as 0-Day with Weaponized iCalendar Files
Next Post: Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files

Related Posts

Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys The Hacker News
Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide The Hacker News
Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials The Hacker News
Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaign Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaign The Hacker News
New TETRA Radio Encryption Flaws Expose Law Enforcement Communications New TETRA Radio Encryption Flaws Expose Law Enforcement Communications The Hacker News
New ClickFix Variant Exploits Network Drives New ClickFix Variant Exploits Network Drives The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark