The financially motivated cybercrime group Cl0p is actively exploiting a critical zero-day vulnerability in Oracle E-Business Suite (EBS) to facilitate a massive data theft and extortion campaign. Researchers have identified the flaw as CVE-2025-61882, an unauthenticated Remote Code Execution (RCE) vulnerability that allows attackers to take control of vulnerable EBS instances without needing any credentials. True to its modus operandi, Cl0p has automated the exploitation of this flaw to compromise a large number of organizations globally, exfiltrate sensitive data, and then issue ransom demands via email. Oracle has released an emergency patch and strongly advises all customers using affected EBS versions to apply it immediately.
This campaign is a continuation of Cl0p's highly effective strategy of targeting zero-day vulnerabilities in widely used enterprise software. Similar to their previous campaigns involving MOVEit Transfer and GoAnywhere MFT, the group focuses on flaws that allow for mass, automated exploitation. The attack on Oracle EBS is particularly severe because the platform is a suite of enterprise resource planning (ERP) applications that manage critical business functions, including finance, HR, and supply chain management. A compromise of EBS can expose an organization's most sensitive data.
The campaign has been active since at least August 2025. Cl0p's operators are systematically scanning the internet for vulnerable EBS instances, exploiting CVE-2025-61882 to gain remote code execution, and then exfiltrating data. Following the data theft, they contact the victims directly via email, demanding a ransom payment to prevent the public leakage of the stolen information.
Vulnerability: CVE-2025-61882 is a critical RCE vulnerability in Oracle E-Business Suite. Its most dangerous characteristic is that it is unauthenticated, meaning an attacker needs no prior access or credentials to exploit it. They simply need to send a specially crafted request to a vulnerable, internet-facing EBS instance.
Initial Access (T1190 - Exploit Public-Facing Application): Cl0p automates the scanning of IP ranges for vulnerable Oracle EBS endpoints and executes the exploit to gain an initial foothold.
Execution: Once the RCE is achieved, the attackers can execute arbitrary commands on the underlying server, giving them full control.
Data Exfiltration (T1041 - Exfiltration Over C2 Channel): After gaining access, Cl0p's primary objective is data theft. They likely deploy automated scripts to identify and exfiltrate sensitive databases and files related to financial records, employee data, and customer information.
Impact (T1485 - Data Destruction & Extortion): While Cl0p is known for ransomware, this campaign focuses on pure extortion based on data theft. The threat is the public release of data, not its encryption. This tactic is effective even if victims have good backups.
Any organization running an internet-facing instance of these versions is at high risk of compromise.
A breach of Oracle E-Business Suite can be catastrophic for a business:
Security teams should monitor for the following:
cmd.exe or powershell.exeCVE-2025-61882.D3-NTA: Network Traffic Analysis to identify the large outbound data flows characteristic of Cl0p's data theft. Use D3-ITF: Inbound Traffic Filtering with a Web Application Firewall (WAF) to block exploit attempts against EBS.CVE-2025-61882 immediately.D3-SU: Software Update. For organizations that cannot patch immediately, D3-NI: Network Isolation by removing EBS from public internet access is the most effective compensating control.CISA, NCSC issue urgent warnings for Clop's Oracle EBS zero-day (CVE-2025-61882), adding it to KEV catalog with a 9.8 CVSS score.
Confirmed Cl0p ransom demands indicate widespread compromise; exploitation may have begun in July, necessitating immediate forensic investigation.
Immediately apply the emergency patch from Oracle to remediate CVE-2025-61882.
Mapped D3FEND Techniques:
Do not expose Oracle E-Business Suite directly to the internet. Restrict access to trusted networks or via a secure VPN.
Mapped D3FEND Techniques:
Use a Web Application Firewall (WAF) to inspect and filter traffic to the EBS application, potentially blocking exploit attempts.
Mapped D3FEND Techniques:
The most urgent and effective action against the Cl0p campaign is to apply the emergency patch for CVE-2025-61882 provided by Oracle. Given that this is an unauthenticated RCE being actively exploited by a major threat actor, this update should be treated as a critical emergency. Organizations must immediately identify all Oracle E-Business Suite instances within their environment, particularly those that are internet-facing, and deploy the patch outside of the standard update cycle. Failure to patch leaves the door wide open for automated compromise, data theft, and extortion. Verifying the patch has been successfully applied across all relevant assets is a mandatory follow-up step.
As a critical compensating control and long-term security best practice, organizations must remove Oracle E-Business Suite instances from the public internet. These systems manage core business functions and should never be directly exposed. Access for remote employees or partners should be provisioned exclusively through a secure, multi-factor authentication (MFA)-enabled VPN. This network isolation measure fundamentally removes the attack surface for CVE-2025-61882, as Cl0p's automated scanners would no longer be able to reach the vulnerable application. For organizations unable to patch immediately, this is the most effective way to mitigate the threat.
Cl0p begins its campaign exploiting CVE-2025-61882.
Security researchers report on the active exploitation campaign by Cl0p.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats