Bitget App
Trade smarter
Open
HomepageSign up
Bitget>
News>
Markets>
‘Numerous’ organizations suffered data breaches in cyberattacks connected to Oracle

‘Numerous’ organizations suffered data breaches in cyberattacks connected to Oracle

Bitget-RWA2025/10/09 20:00
By: Bitget-RWA

According to Google security experts, cybercriminals sending blackmail emails to business leaders have managed to obtain information from "dozens of organizations," indicating that the scope of this hacking operation could be extensive.

On Thursday, the technology company revealed in a statement provided to TechCrunch that the Clop extortion group took advantage of several security flaws in Oracle’s E-Business Suite, leading to the theft of substantial data from impacted companies.

Oracle’s E-Business platform enables organizations to manage their business processes, including maintaining customer records and employee HR information. 

Google noted in a related blog entry that this wave of attacks against Oracle users has been ongoing since at least July 10, which is roughly three months before the breaches were initially discovered. 

Earlier this week, Oracle acknowledged that the group behind the extortion attacks continues to exploit its software to access confidential data about company leaders and their businesses. Just days before, Oracle’s chief security officer, Rob Duhart, had stated in a now-removed post that the extortion attempts were tied to previously known vulnerabilities that Oracle addressed in July, implying the threat had ended.

However, in a security notice released over the weekend, Oracle explained that the zero-day vulnerability—so named because it was already being abused before Oracle could issue a fix—can be “exploited over a network without requiring a username or password.” 

The Clop ransomware and extortion group, which has ties to Russia, has become notorious for orchestrating large-scale cyberattacks, frequently leveraging security weaknesses unknown to software makers at the time of exploitation, to exfiltrate vast quantities of business and client data. This includes attacks on managed file transfer solutions such as Cleo, MOVEit, and GoAnywhere, which organizations rely on to transmit sensitive information online.

Google’s blog post provides email addresses and other technical indicators that IT security teams can use to detect extortion attempts and signs that their Oracle environments may have been breached.

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!

You may also like

Trending news

More
1
TSMC Has Announced Exciting Updates for Investors in Nvidia and Broadcom
2
Nebius Group Holds a 28% Stake in a Leading AI Startup Preparing for an IPO

Crypto prices

More
Bitcoin
Bitcoin
BTC
$111,660.02
+0.40%
Ethereum
Ethereum
ETH
$4,086.3
+3.38%
Tether USDt
Tether USDt
USDT
$1
-0.01%
BNB
BNB
BNB
$1,184.8
+2.04%
XRP
XRP
XRP
$2.49
+2.51%
Solana
Solana
SOL
$202.33
+4.49%
USDC
USDC
USDC
$1
-0.02%
Dogecoin
Dogecoin
DOGE
$0.2015
+2.02%
TRON
TRON
TRX
$0.3180
+2.19%
Cardano
Cardano
ADA
$0.6882
+2.35%
How to sell PI
Bitget lists PI – Buy or sell PI quickly on Bitget!
Trade now
Become a trader now?A welcome pack worth 6200 USDT for new users!
Sign up now
Trade smarter