Posted in

Oracle Breach: Clop Exploits EBS Zero-Day CVE-2025-61882

The Clop ransomware gang, also known as Graceful Spider, has claimed responsibility for a major cyberattack on Oracle Corporation, listing the tech giant on its dark web leak site. This breach is part of a large-scale extortion campaign exploiting a critical zero-day vulnerability in Oracle E-Business Suite (EBS), tracked as CVE-2025-61882.

This incident underscores the growing threat of supply chain attacks, reminiscent of the MOVEit breach, and raises serious concerns for enterprises relying on Oracle’s ERP solutions.


What Happened?

Clop affiliates allegedly exfiltrated sensitive data from Oracle and numerous high-profile customers. Screenshots from Clop’s leak site show Oracle listed alongside major organizations such as Mazda, Humana, and The Washington Post, signaling a widespread impact across industries.

Victims report receiving extortion emails from addresses like support@pubstorm[.]com, threatening to release confidential financial and personal records unless ransom demands are met.


The Zero-Day Exploit Explained

The attack leverages a critical unauthenticated remote code execution (RCE) vulnerability in Oracle E-Business Suite. According to security researchers, Clop began exploiting this flaw as early as August 2025, months before Oracle issued a patch in October 2025.

How the Exploit Works

  • Step 1: Authentication Bypass
    Attackers target the OA_HTML/SyncServlet endpoint to bypass authentication.
  • Step 2: Malicious Payload Injection
    Using OA_HTML/RF.jsp, they inject a malicious XSLT template, enabling arbitrary command execution.

This pre-auth nature means attackers could compromise servers without valid credentials, granting full control over sensitive ERP data.


Technical Specifications

DetailSpecification
CVE IDCVE-2025-61882
Affected VersionsOracle EBS 12.2.3 – 12.2.14
Vulnerability TypeUnauthenticated Remote Code Execution
CVSS Score9.8 (Critical)
Exploit VectorSyncServlet Auth Bypass + XSLT Injection
Patch StatusPatched (October 2025 Security Alert)

Impact on Enterprises

The breach has far-reaching implications for businesses using Oracle EBS for financial management, supply chain operations, and HR systems. Attackers potentially accessed:

  • Financial records
  • Customer data
  • Employee information
  • Sensitive ERP configurations

Such exposure can lead to regulatory penalties, brand reputation damage, and operational disruptions.


Clop’s Extortion Strategy

Clop’s modus operandi involves data theft followed by ransom demands. Victims are pressured to pay to prevent public disclosure of stolen data. The group’s leak site currently lists dozens of global enterprises, signaling a coordinated campaign targeting Oracle’s ecosystem.


Mitigation and Response

Oracle released a critical patch in October 2025. Organizations should:

  • Apply the latest security updates immediately
  • Conduct vulnerability scans for exposed endpoints
  • Implement Web Application Firewalls (WAF)
  • Enable multi-layered monitoring for suspicious activity

Why This Matters

This attack highlights the increasing sophistication of ransomware gangs and the importance of timely patch management. With ERP systems being the backbone of enterprise operations, vulnerabilities like CVE-2025-61882 can have catastrophic consequences.

Leave a Reply

Your email address will not be published. Required fields are marked *