Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching

Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching

Posted on October 8, 2025October 8, 2025 By CWS

Extra info has come to gentle on the lately patched Oracle E-Enterprise Suite (EBS) zero-day, with proof indicating that menace actors knew in regards to the vulnerability for a minimum of two months earlier than it was patched. 

Google Risk Intelligence Group (GTIG) and Mandiant first warned about assaults aimed toward Oracle E-Enterprise Suite on October 2, after executives at many organizations obtained extortion emails from the Cl0p cybercrime group.

It has since been confirmed that Cl0p was behind the assaults, and that the cybercriminals possible managed to steal giant quantities of knowledge from the EBS situations of focused organizations since August. 

Oracle initially mentioned the assaults appeared to contain exploitation of unspecified vulnerabilities patched in July, however the software program big confirmed on October 4 {that a} zero-day flaw has additionally been exploited. 

The zero-day, tracked as CVE-2025-61882 with a CVSS rating of 9.8, impacts the BI Writer Integration element of Oracle Concurrent Processing. It may be exploited by an unauthenticated attacker for distant code execution.

CrowdStrike has been monitoring the assaults involving CVE-2025-61882 and has tied them with reasonable confidence to a Russia-linked menace actor it tracks as Swish Spider, which is understood for conducting assaults with the Cl0p ransomware. Nevertheless, the cybersecurity agency says it’s potential that a number of teams have exploited the zero-day.

Whereas CrowdStrike’s investigation is ongoing, the data it has collected up to now signifies that the zero-day was first exploited on August 9. 

The hacker teams ShinyHunters and Scattered Spider (now calling themselves Scattered LAPSUS$ Hunters because of a collaboration) have revealed a proof-of-concept (PoC) exploit for CVE-2025-61882. Commercial. Scroll to proceed studying.

Whereas it initially appeared that Scattered LAPSUS$ Hunters might have been collaborating with the Cl0p hackers, a message in one of many recordsdata revealed alongside the exploits suggests a feud between the menace teams. 

Indicators of compromise (IoCs) revealed by Oracle recommended that the leaked PoC was actual, which has been confirmed by an evaluation of the PoC carried out by safety agency WatchTowr. 

“The [exploit] chain demonstrates a excessive stage of ability and energy, with a minimum of 5 distinct bugs orchestrated collectively to attain pre-authenticated Distant Code Execution,” WatchTowr mentioned.

With the PoC now public, the cybersecurity business expects different menace actors so as to add CVE-2025-61882 to their arsenal they usually should have loads of targets to select from.

Censys reported seeing over 2,000 internet-exposed situations of Oracle E-Enterprise Suite. The Shadowserver Basis has recognized over 570 probably susceptible situations. Each Censys and Shadowserver noticed the best variety of EBS situations in america, adopted at a distance by China. 

Associated: Fortra GoAnywhere MFT Zero-Day Exploited in Ransomware Assaults

Associated: Crucial Vulnerability Places 60,000 Redis Servers at Danger of Exploitation

Security Week News Tags:EBS, Exploitation, Months, Oracle, Patching, Started, ZeroDay

Post navigation

Previous Post: OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks
Next Post: Attacks on Palo Alto PAN-OS Global Protect Login Portals Surge from 2,200 IPs

Related Posts

Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials Security Week News
AI Sidebar Spoofing Puts ChatGPT Atlas, Perplexity Comet and Other Browsers at Risk AI Sidebar Spoofing Puts ChatGPT Atlas, Perplexity Comet and Other Browsers at Risk Security Week News
Apple Unveils iPhone Memory Protections to Combat Sophisticated Attacks Apple Unveils iPhone Memory Protections to Combat Sophisticated Attacks Security Week News
700Credit Data Breach Impacts 5.8 Million Individuals 700Credit Data Breach Impacts 5.8 Million Individuals Security Week News
Exploit for VMware Zero-Day Flaws Likely Built a Year Before Public Disclosure Exploit for VMware Zero-Day Flaws Likely Built a Year Before Public Disclosure Security Week News
ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Rockwell, Schneider ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Rockwell, Schneider Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News