Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert & block trade
Convert crypto with one click and zero fees
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
‘Numerous’ organizations suffered data breaches in cyberattacks connected to Oracle

‘Numerous’ organizations suffered data breaches in cyberattacks connected to Oracle

Bitget-RWA2025/10/09 20:00
By:Bitget-RWA

According to Google security experts, cybercriminals sending blackmail emails to business leaders have managed to obtain information from "dozens of organizations," indicating that the scope of this hacking operation could be extensive.

On Thursday, the technology company revealed in a statement provided to TechCrunch that the Clop extortion group took advantage of several security flaws in Oracle’s E-Business Suite, leading to the theft of substantial data from impacted companies.

Oracle’s E-Business platform enables organizations to manage their business processes, including maintaining customer records and employee HR information. 

Google noted in a related blog entry that this wave of attacks against Oracle users has been ongoing since at least July 10, which is roughly three months before the breaches were initially discovered. 

Earlier this week, Oracle acknowledged that the group behind the extortion attacks continues to exploit its software to access confidential data about company leaders and their businesses. Just days before, Oracle’s chief security officer, Rob Duhart, had stated in a now-removed post that the extortion attempts were tied to previously known vulnerabilities that Oracle addressed in July, implying the threat had ended.

However, in a security notice released over the weekend, Oracle explained that the zero-day vulnerability—so named because it was already being abused before Oracle could issue a fix—can be “exploited over a network without requiring a username or password.” 

The Clop ransomware and extortion group, which has ties to Russia, has become notorious for orchestrating large-scale cyberattacks, frequently leveraging security weaknesses unknown to software makers at the time of exploitation, to exfiltrate vast quantities of business and client data. This includes attacks on managed file transfer solutions such as Cleo, MOVEit, and GoAnywhere, which organizations rely on to transmit sensitive information online.

Google’s blog post provides email addresses and other technical indicators that IT security teams can use to detect extortion attempts and signs that their Oracle environments may have been breached.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!