The financially motivated cybercrime group Cl0p is actively exploiting a critical zero-day vulnerability in Oracle E-Business Suite (EBS) to facilitate a massive data theft and extortion campaign. Researchers have identified the flaw as CVE-2025-61882, an unauthenticated Remote Code Execution (RCE) vulnerability that allows attackers to take control of vulnerable EBS instances without needing any credentials. True to its modus operandi, Cl0p has automated the exploitation of this flaw to compromise a large number of organizations globally, exfiltrate sensitive data, and then issue ransom demands via email. Oracle has released an emergency patch and strongly advises all customers using affected EBS versions to apply it immediately.
This campaign is a continuation of Cl0p's highly effective strategy of targeting zero-day vulnerabilities in widely used enterprise software. Similar to their previous campaigns involving MOVEit Transfer and GoAnywhere MFT, the group focuses on flaws that allow for mass, automated exploitation. The attack on Oracle EBS is particularly severe because the platform is a suite of enterprise resource planning (ERP) applications that manage critical business functions, including finance, HR, and supply chain management. A compromise of EBS can expose an organization's most sensitive data.
The campaign has been active since at least August 2025. Cl0p's operators are systematically scanning the internet for vulnerable EBS instances, exploiting CVE-2025-61882 to gain remote code execution, and then exfiltrating data. Following the data theft, they contact the victims directly via email, demanding a ransom payment to prevent the public leakage of the stolen information.
Vulnerability: CVE-2025-61882 is a critical RCE vulnerability in Oracle E-Business Suite. Its most dangerous characteristic is that it is unauthenticated, meaning an attacker needs no prior access or credentials to exploit it. They simply need to send a specially crafted request to a vulnerable, internet-facing EBS instance.
Initial Access (T1190 - Exploit Public-Facing Application): Cl0p automates the scanning of IP ranges for vulnerable Oracle EBS endpoints and executes the exploit to gain an initial foothold.
Execution: Once the RCE is achieved, the attackers can execute arbitrary commands on the underlying server, giving them full control.
Data Exfiltration (T1041 - Exfiltration Over C2 Channel): After gaining access, Cl0p's primary objective is data theft. They likely deploy automated scripts to identify and exfiltrate sensitive databases and files related to financial records, employee data, and customer information.
Impact (T1485 - Data Destruction & Extortion): While Cl0p is known for ransomware, this campaign focuses on pure extortion based on data theft. The threat is the public release of data, not its encryption. This tactic is effective even if victims have good backups.
Any organization running an internet-facing instance of these versions is at high risk of compromise.
A breach of Oracle E-Business Suite can be catastrophic for a business:
Security teams should monitor for the following:
| Type | Value | Description |
|---|---|---|
| url_pattern | Suspicious requests to Oracle EBS web endpoints | Monitor for unusual URL patterns or payloads in requests to EBS servers, which could indicate exploit attempts for CVE-2025-61882. |
| network_traffic_pattern | Large, anomalous outbound data transfers from EBS servers. | A key indicator of data exfiltration. Monitor for connections to unknown IPs or cloud storage services. |
| process_name | cmd.exe or powershell.exe |
Suspicious shell processes spawned by the Oracle application server process. |
CVE-2025-61882.D3-NTA: Network Traffic Analysis to identify the large outbound data flows characteristic of Cl0p's data theft. Use D3-ITF: Inbound Traffic Filtering with a Web Application Firewall (WAF) to block exploit attempts against EBS.CVE-2025-61882 immediately.D3-SU: Software Update. For organizations that cannot patch immediately, D3-NI: Network Isolation by removing EBS from public internet access is the most effective compensating control.CISA, NCSC issue urgent warnings for Clop's Oracle EBS zero-day (CVE-2025-61882), adding it to KEV catalog with a 9.8 CVSS score.
International cybersecurity agencies, including CISA and NCSC, have issued urgent warnings regarding the Clop ransomware group's active exploitation of CVE-2025-61882 in Oracle E-Business Suite. The vulnerability, now confirmed with a CVSS score of 9.8, has been added to CISA's Known Exploited Vulnerabilities (KEV) catalog, mandating federal agencies to patch by October 28, 2025. Reports indicate public exploit code became available on October 6, significantly increasing the threat. Mandiant has officially attributed the campaign to Clop, which is now sending extortion emails directly to victim executives, employing a double-extortion tactic after data exfiltration.
Confirmed Cl0p ransom demands indicate widespread compromise; exploitation may have begun in July, necessitating immediate forensic investigation.
New reports confirm Cl0p has sent ransom demands to Oracle E-Business Suite customers, indicating widespread compromise prior to the patch release. Evidence suggests exploitation may have been active since July 2025, earlier than initially reported. Organizations are now strongly urged to conduct immediate forensic investigations of their EBS systems, assuming prior compromise due to the retroactive nature of the patch. Updated detection guidance includes looking for anomalous child processes from Oracle services.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats