Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Oracle Says Known Vulnerabilities Possibly Exploited in Recent Extortion Attacks

Posted on October 3, 2025October 3, 2025 By CWS

Oracle has confirmed that a few of its prospects have acquired extortion emails and the software program big’s investigation signifies that the attackers might have exploited identified vulnerabilities.

Google Menace Intelligence Group (GTIG) and Mandiant revealed this week that executives at many organizations utilizing Oracle’s E-Enterprise Suite (EBS) enterprise useful resource planning product have acquired emails claiming the theft of delicate info.

GTIG and Mandiant researchers have but to substantiate the hackers’ claims, however identified that the extortion emails declare to return from members of the infamous Cl0p cybercrime group, and the messages have been despatched from compromised accounts beforehand linked to a different cybercrime gang tracked as FIN11.

Contacted by SecurityWeek, Oracle representatives pointed to a weblog put up revealed on Thursday by Rob Duhart, the software program big’s chief safety officer.

Duhart stated the corporate is conscious that some E-Enterprise Suite prospects have acquired extortion emails. 

“Our ongoing investigation has discovered the potential use of beforehand recognized vulnerabilities which might be addressed within the July 2025 Vital Patch Replace,” Duhart defined, with out naming the doubtless exploited flaws.

Oracle mounted roughly 200 vulnerabilities with its July 2025 CPU. 9 patches had been launched for E-Enterprise Suite, together with three for flaws that may be exploited remotely with out authentication. These three vulnerabilities, all rated ‘medium severity’, are tracked as CVE-2025-30746, CVE-2025-30745 and CVE-2025-50107. Oracle’s advisory signifies that person interplay is required for his or her exploitation. 

Three vulnerabilities mounted in July in E-Enterprise Suite have been assigned a ‘excessive severity’ ranking: CVE-2025-30743, CVE-2025-30744, and CVE-2025-50105. Whereas they don’t permit distant exploitation with out authentication, their exploitation doesn’t require person interplay. Commercial. Scroll to proceed studying.

If the involvement of Cl0p and/or FIN11 is confirmed, it mustn’t come as a shock. Each teams, that are linked, are identified to launch campaigns that contain the exploitation of vulnerabilities in software program that’s utilized by many organizations to deal with delicate information. 

Cl0p was behind campaigns focusing on Cleo, MOVEit, and Fortra file switch merchandise. The FIN11 group was behind a marketing campaign that focused an Accellion file switch service. All of those campaigns concerned the exploitation of zero-day flaws. 

Earlier this yr, Oracle confirmed that hackers managed to steal information from a legacy cloud atmosphere.

Associated: CISA Points Steering After Oracle Cloud Hack

Associated: Current Fortra GoAnywhere MFT Vulnerability Exploited as Zero-Day 

Associated: 1.2 Million Impacted by WestJet Information Breach

Security Week News Tags:Attacks, Exploited, Extortion, Oracle, Possibly, Vulnerabilities

Post navigation

Previous Post: SideWinder Hacker Group Hosting Fake Outlook/Zimbra Portals to Steal Login Credentials
Next Post: New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRAT

Related Posts

Ahold Delhaize Data Breach Impacts 2.2 Million People Security Week News
Chinese Spies Lurked in Networks for 393 Days, Hunted for Zero-Day Intel Security Week News
Inside the $111 Billion Cloud Security Market: Acquisition, Expansion, and Where to Aim Next Security Week News
Surveillance Firm Bypasses SS7 Protections to Retrieve User Location Security Week News
Black Hat USA 2025 – Summary of Vendor Announcements (Part 4) Security Week News
Microsoft Patches ‘ToolShell’ Zero-Days Exploited to Hack SharePoint Servers Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News