Cl0p Exploits Oracle EBS Zero-Day in Widespread Extortion Campaign, FBI Issues Emergency Warning

Cl0p-Affiliated Group Exploits Oracle E-Business Suite Zero-Day (CVE-2025-61882) for Months, Triggering FBI Alert

CRITICAL
October 10, 2025
October 13, 2025
6m read
VulnerabilityCyberattackThreat Actor

Impact Scope

Affected Companies

Harvard University

Industries Affected

HealthcareEducationFinanceCritical Infrastructure

Related Entities(initial)

Threat Actors

Organizations

Oracle Google Threat Intelligence Group (GTIG)Mandiant FBI American Hospital Association (AHA)

Products & Tech

Other

GOLDVEINSAGEGIFTSAGELEAFSAGEWAVEHarvard University

CVE Identifiers

CVE-2025-61882
CRITICAL
CVSS:9.8
CVE-2025-61884
HIGH
CVSS:7.5

Full Report(when first published)

Executive Summary

A critical, unauthenticated remote code execution (RCE) vulnerability, tracked as CVE-2025-61882, in Oracle E-Business Suite (EBS) has been actively exploited by a sophisticated, financially motivated threat actor since at least August 2025. The attackers, claiming affiliation with the Cl0p ransomware gang, leveraged this zero-day flaw to exfiltrate large amounts of sensitive data from numerous organizations globally before launching a widespread extortion campaign in late September. The vulnerability carries a CVSS score of 9.8 (Critical) and allows for a full system compromise without authentication. In response to the active exploitation and severe risk, the FBI issued an emergency warning urging all affected organizations to apply Oracle's patches immediately. The incident underscores the significant danger posed by zero-day vulnerabilities in widely used enterprise software, particularly when exploited by organized cybercrime groups.


Threat Overview

The attack targets a vulnerability in the BI Publisher Integration component of Oracle's Concurrent Processing product, affecting EBS versions 12.2.3 through 12.2.14. Threat intelligence from Google and Mandiant indicates that exploitation began as early as August 9, 2025, with suspicious reconnaissance traffic detected in July. This gave the attackers a nearly two-month window to operate covertly.

The campaign became overt around September 29, 2025, when the threat actors initiated a high-volume email extortion campaign. These emails, sent to high-level executives, claimed that their organization's Oracle EBS environment had been breached and sensitive data stolen. The attackers demanded a ransom to prevent the public release of the stolen information. The group deployed a suite of custom, fileless malware—including GOLDVEIN, SAGEGIFT, SAGELEAF, and SAGEWAVE—designed to execute in memory and evade traditional file-based antivirus detection.

Technical Analysis

The attack chain likely begins with the exploitation of CVE-2025-61882. This vulnerability allows an unauthenticated attacker with network access via HTTP to achieve remote code execution. The attackers likely used this initial access to deploy their sophisticated, multi-stage malware.

Malware Suite

  • GOLDVEIN.JAVA: A Java-based validator tool used to test for the presence of the vulnerability on target systems.
  • SAGEGIFT: A sophisticated C++ keylogger and credential harvester.
  • SAGELEAF: A reconnaissance tool used to map the internal network and identify high-value targets.
  • SAGEWAVE: The primary backdoor and data exfiltration tool, which communicates with C2 servers over encrypted channels.

MITRE ATT&CK TTPs

Impact Assessment

The impact of this campaign is severe and widespread. Harvard University has publicly confirmed it was a victim, and dozens of other organizations across healthcare, finance, and supply chain sectors are believed to be affected. The exfiltrated data, which includes sensitive customer and corporate information, exposes victims to significant financial loss, regulatory fines (e.g., under GDPR or HIPAA), and reputational damage. The American Hospital Association (AHA) specifically warned of the grave risk to the healthcare sector, a major user of Oracle EBS and a primary target of cybercrime. The attackers' long dwell time allowed for deep infiltration and comprehensive data theft, making recovery and damage assessment incredibly complex.

IOCs

Type Value Description
CVE CVE-2025-61882 Critical RCE in Oracle EBS BI Publisher Integration.
CVE CVE-2025-61884 Related vulnerability patched by Oracle.
Malware Family GOLDVEIN Initial access and validation tool.
Malware Family SAGEGIFT Keylogger and credential harvester.
Malware Family SAGELEAF Reconnaissance tool.
Malware Family SAGEWAVE Backdoor and data exfiltration tool.

Cyber Observables for Detection

Type Value Description Context Confidence
url_pattern */OA_HTML/BneViewer* Potential exploitation path related to the BI Publisher component. Web server logs, WAF logs medium
url_pattern */OA_HTML/ibeCA* Another potential area for suspicious requests in EBS. Web server logs, WAF logs medium
process_name FNDLIBR The Concurrent Manager process in Oracle EBS. Monitor for anomalous child processes. EDR, Sysmon logs (Event ID 1) high
command_line_pattern java -jar The GOLDVEIN validator is a Java application. Look for suspicious Java processes spawned by the Oracle application user. EDR, Sysmon logs (Event ID 1) high
network_traffic_pattern Unusual outbound connections from EBS servers Monitor for large data transfers or connections to non-standard ports or untrusted IPs from EBS application servers. Netflow, Firewall logs, IDS/IPS high

Detection & Response

Security teams should immediately hunt for signs of compromise dating back to July 2025.

  1. Log Analysis: Scrutinize HTTP access logs for Oracle EBS servers for suspicious requests, particularly those targeting the BI Publisher component. Look for unusual user agents, large numbers of 404 or 500 errors, or requests from known malicious IP addresses.
  2. Endpoint Detection: Use EDR solutions to hunt for in-memory execution of the malware families (GOLDVEIN, SAGEGIFT, etc.). Monitor for processes spawned by Oracle services that execute suspicious commands or make outbound network connections.
  3. Network Monitoring: Implement Network Traffic Analysis (D3-NTA) to detect anomalous data flows from EBS servers. Baseline normal traffic and alert on large exfiltration volumes or connections to unusual destinations.

Response actions should prioritize isolating compromised systems, applying the Oracle patches, and initiating a full-scope incident response investigation to determine the extent of data exfiltration.

Mitigation

  1. Immediate Patching: The highest priority is to apply the emergency patches released by Oracle for CVE-2025-61882 and the related CVE-2025-61884. This is a D3FEND Software Update (D3-SU) countermeasure.
  2. Network Segmentation: Restrict network access to the Oracle EBS application. As a D3FEND Network Isolation (D3-NI) measure, ensure the application is not directly exposed to the internet. If it must be, use a WAF with strict rulesets.
  3. Credential Hygiene: Force a reset of all passwords for accounts with access to the Oracle EBS environment, especially privileged accounts. Implement Multi-factor Authentication (D3-MFA) wherever possible.
  4. Enhanced Monitoring: Increase logging levels on EBS servers and surrounding network infrastructure. Implement robust monitoring and alerting for the observables listed above.

Timeline of Events

1
July 10, 2025
Suspicious HTTP traffic targeting Oracle EBS servers was first detected.
2
August 9, 2025
Attackers began actively exploiting the CVE-2025-61882 zero-day.
3
September 29, 2025
The Cl0p-affiliated group launched a high-volume email extortion campaign against victims.
4
October 4, 2025
Oracle released an emergency patch for CVE-2025-61882.
5
October 10, 2025
This article was published
6
October 11, 2025
Oracle released a patch for a related vulnerability, CVE-2025-61884.

Article Updates

October 13, 2025

New details emerge on Oracle EBS zero-day (CVE-2025-61882) exploitation, with TA505 joining Cl0p. Detailed exploit chain and NCSC warning issued.

MITRE ATT&CK Mitigations

Immediately apply the patches released by Oracle to remediate CVE-2025-61882 and CVE-2025-61884.

Mapped D3FEND Techniques:

Restrict network access to Oracle EBS servers. Do not expose them directly to the internet if possible. Use a WAF or reverse proxy to filter traffic.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Implement comprehensive logging and monitoring for EBS servers and related network traffic to detect signs of compromise.

Mapped D3FEND Techniques:

Enforce MFA for all user accounts, especially privileged ones, to prevent misuse of stolen credentials.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The most critical and immediate action is to apply the emergency patches from Oracle that address CVE-2025-61882 and CVE-2025-61884. This directly closes the initial access vector used by the attackers. Organizations must prioritize patching internet-facing Oracle E-Business Suite instances immediately. Given the 'stop-what-you're-doing' nature of the FBI warning, these patches should bypass normal testing cycles and be deployed under emergency change procedures. After patching, it is crucial to verify the patch installation was successful across all relevant application and database tiers. A vulnerability scanner should be used to confirm that the flaw is no longer detectable. This action is the primary preventative control against this specific attack campaign.

To detect potential compromise and ongoing data exfiltration, deploy Network Traffic Analysis focused on the Oracle EBS servers. Security teams should establish a baseline of normal network behavior for these servers, including typical destinations, protocols, and data volumes. Configure alerts for significant deviations from this baseline, such as connections to new or untrusted IP addresses, use of non-standard ports, or large, sustained outbound data transfers. Specifically monitor for traffic patterns matching the SAGEWAVE backdoor's C2 communication or data exfiltration. This detective control is vital for identifying compromised systems that were breached before patches could be applied, allowing incident response teams to contain the threat.

On the Oracle EBS hosts, implement detailed process monitoring to detect the execution of the fileless malware suite (SAGEGIFT, SAGELEAF, SAGEWAVE). Use an EDR solution or native tools like Sysmon to log all process creations and their parent-child relationships. Specifically, monitor the FNDLIBR process (Concurrent Manager) and other core EBS processes for spawning anomalous child processes like cmd.exe, powershell.exe, or unexpected java instances. Since the malware is fileless, detection should focus on behavioral indicators like memory injection, suspicious API calls, and network connections originating from legitimate Oracle processes. This technique is crucial for identifying post-exploitation activity on already-compromised servers.

Sources & References(when first published)

Oracle E-Business Suite Zero-Day Exploited in Widespread Extortion Campaign
Google Threat Intelligence (cloud.google.com) October 9, 2025
Crims had 3-month head start on defenders in Oracle EBS invasion
The Register (theregister.com) October 9, 2025
Protecting Patients and Hospitals from Cyberattacks
American Hospital Association (aha.org) October 10, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

zero-dayextortionRCEfileless malwaredata theftenterprise software

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading