Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cybercriminals Claim Theft of Data From Oracle E-Business Suite Customers

Posted on October 2, 2025October 2, 2025 By CWS

A major variety of organizations have acquired extortion emails from hackers who declare to have stolen delicate data from their Oracle E-Enterprise Suite cases, Google’s Risk Intelligence Group and Mandiant unit warn.

Oracle E-Enterprise Suite (EBS) is a collection of built-in enterprise functions utilized by massive organizations to automate and handle enterprise processes. Oracle says 1000’s of organizations all over the world use this enterprise useful resource planning (ERP) system.

Based on Google Risk Intelligence Group (GTIG) and Mandiant, the malicious exercise allegedly concentrating on Oracle EBS seems to have began on or round September 29. The attackers have despatched extortion emails to executives at “quite a few” firms, claiming to be affiliated with the infamous Cl0p cybercrime group.

GTIG and Mandiant researchers have described the assaults as a high-volume e mail marketing campaign leveraging lots of of compromised accounts, together with ones beforehand linked to a profit-driven menace group named FIN11. This long-running cybercrime gang is understood to interact in ransomware deployment and extortion.

The researchers additionally discovered some proof indicating a connection to Cl0p. Particularly, the contact data offered by the attackers within the emails despatched to focused organizations matches contact addresses listed on the Cl0p leak web site.

Mandiant and GTIG mentioned they’re within the early phases of their investigations and couldn’t affirm whether or not the hackers’ claims are substantiated. 

“It’s essential to notice that whereas the ways align with an extortion motive and the actor is explicitly claiming this connection, GTIG doesn’t presently have enough proof to definitively assess the veracity of those claims,” mentioned Charles Carmakal, CTO of Mandiant.

Carmakal added, “Attribution within the financially motivated cybercrime area is usually advanced, and actors incessantly mimic established teams like Clop to extend leverage and strain on victims.”Commercial. Scroll to proceed studying.

If Cl0p or FIN11 hackers are confirmed to be behind the assaults, it will not come as a shock. Each teams are recognized to launch campaigns that concentrate on many organizations by susceptible software program, typically through the exploitation of zero-day flaws. 

Cl0p final yr claimed to have stolen knowledge from dozens of organizations after exploiting a zero-day vulnerability in Cleo file switch instruments. The group beforehand managed to steal the data of tens of hundreds of thousands of customers from 1000’s of organizations by the exploitation of a zero-day in MOVEit Switch file switch software program. 

As well as, Cl0p was blamed for a 2023 assault that concerned a Fortra GoAnywhere managed file switch product zero-day and which hit dozens of organizations. 

A couple of years in the past, the FIN11 group was behind an identical marketing campaign that concerned the theft of delicate knowledge from dozens of organizations that had been utilizing an Accellion file switch service. That marketing campaign additionally concerned the exploitation of a zero-day vulnerability. 

In some campaigns analyzed up to now, researchers had discovered hyperlinks between Cl0p and FIN11. 

SecurityWeek has reached out to Oracle for remark and can replace this text if the corporate responds.

Associated: Infostealers: The Silent Smash-and-Seize Driving Trendy Cybercrime

Associated: Latest Fortra GoAnywhere MFT Vulnerability Exploited as Zero-Day

Security Week News Tags:Claim, Customers, Cybercriminals, Data, EBusiness, Oracle, Suite, Theft

Post navigation

Previous Post: Zania Raises $18 Million for AI-Powered GRC Platform
Next Post: How to Close Threat Detection Gaps: Your SOC’s Action Plan

Related Posts

In Other News: PQC Adoption, New Android Spyware, FEMA Data Breach Security Week News
Undetectable Android Spyware Backfires, Leaks 62,000 User Logins Security Week News
Widespread Infostealer Campaign Targeting macOS Users Security Week News
CISO Conversations: John ‘Four’ Flynn, VP of Security at Google DeepMind Security Week News
AI Guardrails Under Fire: Cisco’s Jailbreak Demo Exposes AI Weak Points Security Week News
Senator Urges FTC Probe of Microsoft Over Security Failures Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News