Cl0p Gang Exploits Oracle EBS Zero-Day in Massive Data Theft Spree

Cl0p Ransomware Linked to Widespread Data Theft via Critical Oracle E-Business Suite Zero-Day (CVE-2025-61882)

CRITICAL
October 9, 2025
October 10, 2025
5m read
VulnerabilityRansomwareData Breach

Related Entities(initial)

Threat Actors

Organizations

Products & Tech

Oracle E-Business Suite

Other

Google Cloud

CVE Identifiers

CVE-2025-61882
CRITICAL
CVSS:9.8

Full Report(when first published)

Executive Summary

This report details the active exploitation of a critical, unauthenticated remote code execution (RCE) vulnerability, CVE-2025-61882, in Oracle E-Business Suite (EBS). The vulnerability, which scores 9.8 on the CVSS scale, is being leveraged by the Cl0p ransomware group (also tracked as Graceful Spider) in a widespread data theft campaign. Exploitation began as early as August 2025, well before the flaw was publicly disclosed. The attackers exfiltrated large volumes of data from dozens of organizations before initiating extortion attempts in late September 2025. CISA has added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, underscoring the urgency for organizations to apply the emergency patch released by Oracle on October 4, 2025.

Threat Overview

The threat actor Cl0p has a history of exploiting vulnerabilities in secure file transfer and enterprise software. In this campaign, they targeted a flaw in the BI Publisher Integration module of the Oracle Concurrent Processing component within Oracle E-Business Suite versions 12.2.3 through 12.2.14. The zero-day allows an unauthenticated attacker with network access to achieve RCE via a specially crafted HTTP request, requiring no user credentials or interaction. According to Mandiant, Cl0p combined this zero-day with other previously patched vulnerabilities to maximize their access and steal data. After a period of silent data exfiltration, the group began contacting victims with ransom demands, threatening to leak the stolen information if payment is not made.

Technical Analysis

The attack chain leverages the CVE-2025-61882 vulnerability to gain an initial foothold. The flaw is reportedly a Server-Side Request Forgery (SSRF) issue that can be escalated to full RCE. This allows attackers to force the vulnerable EBS server to make unauthorized requests to internal or external resources, bypassing firewall rules and gaining access to sensitive internal systems.

MITRE ATT&CK Techniques

Impact Assessment

The business impact is severe. Oracle EBS is a critical system for many large enterprises, managing financials, supply chain, and human resources. The theft of data from these systems can lead to significant financial loss, regulatory fines (under GDPR, etc.), reputational damage, and business disruption. The exfiltrated data likely contains highly sensitive corporate information, employee PII, and customer data. Organizations that have not patched are at immediate risk of a full compromise, data leakage, and a potential ransomware event.

Cyber Observables for Detection

Security teams should hunt for the following indicators:

Type Value Description
url_pattern */OA_HTML/BIPublisherIntegration* Suspicious requests to the vulnerable BI Publisher Integration endpoint.
url_pattern */xmlpserver/* Unusual activity related to the BI Publisher component.
process_name java.exe Monitor for child processes spawned by the Oracle EBS Java process that are unusual (e.g., cmd.exe, powershell.exe).
network_traffic_pattern High-volume outbound traffic from EBS servers Look for large data transfers from EBS servers to unknown or suspicious IP addresses, especially cloud hosting providers.
log_source Oracle EBS Access Logs Review for anomalous GET/POST requests, especially those with unusual parameters or from untrusted IP ranges.

Detection & Response

  1. Log Analysis: Immediately review Oracle EBS access logs, web server logs, and network traffic logs for any requests targeting the BIPublisherIntegration module or other suspicious patterns originating from unknown IP addresses. Use D3FEND's Network Traffic Analysis (D3-NTA) to baseline normal traffic and detect anomalies.
  2. Endpoint Detection: Deploy and monitor EDR solutions on Oracle EBS servers. Look for suspicious process chains, such as the EBS application server process spawning shell commands or PowerShell scripts. Use D3FEND's Process Analysis (D3-PA) to identify malicious behavior.
  3. Threat Hunting: Proactively hunt for signs of compromise. Check for newly created files in web-accessible directories, unexpected scheduled tasks, or new user accounts on the underlying server. Search for outbound connections to known malicious infrastructure or cloud storage providers not used by your organization.

Mitigation

  1. Immediate Patching: The most critical action is to apply the emergency patch for CVE-2025-61882 released by Oracle on October 4, 2025. Note that the October 2023 Critical Patch Update is a prerequisite. This falls under D3FEND's Software Update (D3-SU).
  2. Restrict Access: If patching is not immediately possible, restrict all external access to the Oracle E-Business Suite web interface. Place it behind a VPN or a reverse proxy with a strict web application firewall (WAF) rule set to filter malicious requests. This aligns with D3FEND's Inbound Traffic Filtering (D3-ITF).
  3. Network Segmentation: Isolate the EBS servers from the rest of the corporate network to prevent lateral movement. Implement strict firewall rules that only allow necessary communication to and from the servers. This is a core principle of D3FEND's Network Isolation (D3-NI).
  4. Backup and Recovery: Ensure you have recent, tested, and offline backups of your Oracle EBS data and system configurations to facilitate recovery in the event of a ransomware attack.

Timeline of Events

1
August 1, 2025
Exploitation of CVE-2025-61882 by Cl0p begins, according to researchers.
2
September 20, 2025
Cl0p begins sending extortion emails to victims after weeks of silent data exfiltration.
3
October 4, 2025
Oracle releases an emergency security patch to address CVE-2025-61882.
4
October 6, 2025
CISA adds CVE-2025-61882 to its Known Exploited Vulnerabilities (KEV) catalog.
5
October 9, 2025
This article was published
6
October 27, 2025
Deadline for U.S. federal civilian agencies to apply the patch for CVE-2025-61882.

Article Updates

October 10, 2025

FBI issues emergency warning and Harvard University confirmed as victim in Cl0p's Oracle EBS campaign; new malware details and IOCs revealed.

MITRE ATT&CK Mitigations

Apply the emergency patch from Oracle immediately to remediate the vulnerability.

Mapped D3FEND Techniques:

Use a WAF or reverse proxy to filter malicious HTTP requests targeting the vulnerable EBS component.

Mapped D3FEND Techniques:

Isolate Oracle EBS servers to prevent attackers from moving laterally after a successful exploit.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Enable and review detailed logging for EBS servers to detect signs of compromise.

D3FEND Defensive Countermeasures

The primary and most effective countermeasure is to immediately apply the emergency security patch provided by Oracle for CVE-2025-61882. Organizations must prioritize the deployment of this update on all internet-facing Oracle E-Business Suite instances. It is critical to verify that the prerequisite October 2023 Critical Patch Update is already installed before applying the new fix. A robust patch management program should be in place to ensure that such critical updates are tested and deployed within the timeframe mandated by organizational policy or regulatory requirements, such as CISA's directive. Verifying the patch installation is crucial; administrators should confirm the application and component versions post-deployment to ensure the vulnerability is fully remediated and the system is no longer susceptible to this specific attack vector.

For organizations unable to immediately patch, or as a defense-in-depth measure, implementing strict inbound traffic filtering is essential. This should be done using a Web Application Firewall (WAF) positioned in front of the Oracle EBS servers. Configure the WAF with virtual patching rules specifically designed to block requests attempting to exploit CVE-2025-61882. These rules should inspect HTTP/S traffic for patterns associated with the exploit, such as malicious strings in requests targeting the /OA_HTML/BIPublisherIntegration endpoint. Furthermore, general access to the EBS application should be restricted to only trusted IP ranges and be placed behind a mandatory VPN for all administrative access. This significantly reduces the attack surface exposed to the public internet, making it much harder for attackers to reach the vulnerable component.

Deploy network traffic analysis solutions to monitor all traffic to and from the Oracle EBS servers. Establish a baseline of normal network behavior, including typical data volumes, protocols, and destinations. Configure the system to alert on significant deviations from this baseline, which could indicate malicious activity. Specifically for this threat, monitor for large, unexpected outbound data transfers, as this is a key indicator of the Cl0p group's data exfiltration TTP. Alerts should be triggered for connections to unusual IP addresses, non-standard ports, or cloud storage provider domains not whitelisted by the organization. This analysis can help detect an active compromise even if the initial exploit was missed, providing a critical opportunity to respond before data is fully exfiltrated or ransomware is deployed.

Sources & References(when first published)

Oracle Zero-Day and More Being Exploited by Ransomware Group
BankInfoSecurity (bankinfosecurity.com) October 8, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Zero-DayRCEData TheftExtortionOracleCl0pKEV

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading