Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching

Posted on October 8, 2025October 8, 2025 By CWS

Extra info has come to gentle on the lately patched Oracle E-Enterprise Suite (EBS) zero-day, with proof indicating that menace actors knew in regards to the vulnerability for a minimum of two months earlier than it was patched. 

Google Risk Intelligence Group (GTIG) and Mandiant first warned about assaults aimed toward Oracle E-Enterprise Suite on October 2, after executives at many organizations obtained extortion emails from the Cl0p cybercrime group.

It has since been confirmed that Cl0p was behind the assaults, and that the cybercriminals possible managed to steal giant quantities of knowledge from the EBS situations of focused organizations since August. 

Oracle initially mentioned the assaults appeared to contain exploitation of unspecified vulnerabilities patched in July, however the software program big confirmed on October 4 {that a} zero-day flaw has additionally been exploited. 

The zero-day, tracked as CVE-2025-61882 with a CVSS rating of 9.8, impacts the BI Writer Integration element of Oracle Concurrent Processing. It may be exploited by an unauthenticated attacker for distant code execution.

CrowdStrike has been monitoring the assaults involving CVE-2025-61882 and has tied them with reasonable confidence to a Russia-linked menace actor it tracks as Swish Spider, which is understood for conducting assaults with the Cl0p ransomware. Nevertheless, the cybersecurity agency says it’s potential that a number of teams have exploited the zero-day.

Whereas CrowdStrike’s investigation is ongoing, the data it has collected up to now signifies that the zero-day was first exploited on August 9. 

The hacker teams ShinyHunters and Scattered Spider (now calling themselves Scattered LAPSUS$ Hunters because of a collaboration) have revealed a proof-of-concept (PoC) exploit for CVE-2025-61882. Commercial. Scroll to proceed studying.

Whereas it initially appeared that Scattered LAPSUS$ Hunters might have been collaborating with the Cl0p hackers, a message in one of many recordsdata revealed alongside the exploits suggests a feud between the menace teams. 

Indicators of compromise (IoCs) revealed by Oracle recommended that the leaked PoC was actual, which has been confirmed by an evaluation of the PoC carried out by safety agency WatchTowr. 

“The [exploit] chain demonstrates a excessive stage of ability and energy, with a minimum of 5 distinct bugs orchestrated collectively to attain pre-authenticated Distant Code Execution,” WatchTowr mentioned.

With the PoC now public, the cybersecurity business expects different menace actors so as to add CVE-2025-61882 to their arsenal they usually should have loads of targets to select from.

Censys reported seeing over 2,000 internet-exposed situations of Oracle E-Enterprise Suite. The Shadowserver Basis has recognized over 570 probably susceptible situations. Each Censys and Shadowserver noticed the best variety of EBS situations in america, adopted at a distance by China. 

Associated: Fortra GoAnywhere MFT Zero-Day Exploited in Ransomware Assaults

Associated: Crucial Vulnerability Places 60,000 Redis Servers at Danger of Exploitation

Security Week News Tags:EBS, Exploitation, Months, Oracle, Patching, Started, ZeroDay

Post navigation

Previous Post: OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks
Next Post: CISA Warns of Zimbra Collaboration Suite (ZCS) XSS Zero-Day Vulnerability Actively Exploited in Attacks

Related Posts

Nevada State Offices Closed Following Disruptive Cyberattack Security Week News
Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption Security Week News
New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches Security Week News
Vulnerabilities in CISA KEV Are Not Equally Critical: Report Security Week News
1,000 Instantel Industrial Monitoring Devices Possibly Exposed to Hacking Security Week News
Chinese Silk Typhoon Hackers Exploited Commvault Zero-Day Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Ransomware Group Claims Attack on Beer Giant Asahi
  • Hackers Weaponizing WordPress Websites by Injecting Malicious PHP Codes Silently
  • CISA Warns of Zimbra Collaboration Suite (ZCS) XSS Zero-Day Vulnerability Actively Exploited in Attacks
  • Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching
  • OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Ransomware Group Claims Attack on Beer Giant Asahi
  • Hackers Weaponizing WordPress Websites by Injecting Malicious PHP Codes Silently
  • CISA Warns of Zimbra Collaboration Suite (ZCS) XSS Zero-Day Vulnerability Actively Exploited in Attacks
  • Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching
  • OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News