This report details the active exploitation of a critical, unauthenticated remote code execution (RCE) vulnerability, CVE-2025-61882, in Oracle E-Business Suite (EBS). The vulnerability, which scores 9.8 on the CVSS scale, is being leveraged by the Cl0p ransomware group (also tracked as Graceful Spider) in a widespread data theft campaign. Exploitation began as early as August 2025, well before the flaw was publicly disclosed. The attackers exfiltrated large volumes of data from dozens of organizations before initiating extortion attempts in late September 2025. CISA has added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, underscoring the urgency for organizations to apply the emergency patch released by Oracle on October 4, 2025.
The threat actor Cl0p has a history of exploiting vulnerabilities in secure file transfer and enterprise software. In this campaign, they targeted a flaw in the BI Publisher Integration module of the Oracle Concurrent Processing component within Oracle E-Business Suite versions 12.2.3 through 12.2.14. The zero-day allows an unauthenticated attacker with network access to achieve RCE via a specially crafted HTTP request, requiring no user credentials or interaction. According to Mandiant, Cl0p combined this zero-day with other previously patched vulnerabilities to maximize their access and steal data. After a period of silent data exfiltration, the group began contacting victims with ransom demands, threatening to leak the stolen information if payment is not made.
The attack chain leverages the CVE-2025-61882 vulnerability to gain an initial foothold. The flaw is reportedly a Server-Side Request Forgery (SSRF) issue that can be escalated to full RCE. This allows attackers to force the vulnerable EBS server to make unauthorized requests to internal or external resources, bypassing firewall rules and gaining access to sensitive internal systems.
T1190 - Exploit Public-Facing Application: The primary vector, exploiting the zero-day in the internet-facing Oracle EBS.T1595.002 - Vulnerability Scanning: Attackers likely scanned the internet for vulnerable Oracle EBS instances before launching the campaign.T1212 - Exploitation for Credential Access: The SSRF flaw may be used to access internal metadata services or other resources to steal credentials.T1041 - Exfiltration Over C2 Channel: After gaining control, Cl0p exfiltrated large volumes of data over encrypted channels.T1486 - Data Encrypted for Impact: While the primary goal reported is data theft for extortion, Cl0p's standard modus operandi includes encryption as a final step.The business impact is severe. Oracle EBS is a critical system for many large enterprises, managing financials, supply chain, and human resources. The theft of data from these systems can lead to significant financial loss, regulatory fines (under GDPR, etc.), reputational damage, and business disruption. The exfiltrated data likely contains highly sensitive corporate information, employee PII, and customer data. Organizations that have not patched are at immediate risk of a full compromise, data leakage, and a potential ransomware event.
Security teams should hunt for the following indicators:
| Type | Value | Description |
|---|---|---|
| url_pattern | */OA_HTML/BIPublisherIntegration* |
Suspicious requests to the vulnerable BI Publisher Integration endpoint. |
| url_pattern | */xmlpserver/* |
Unusual activity related to the BI Publisher component. |
| process_name | java.exe |
Monitor for child processes spawned by the Oracle EBS Java process that are unusual (e.g., cmd.exe, powershell.exe). |
| network_traffic_pattern | High-volume outbound traffic from EBS servers | Look for large data transfers from EBS servers to unknown or suspicious IP addresses, especially cloud hosting providers. |
| log_source | Oracle EBS Access Logs |
Review for anomalous GET/POST requests, especially those with unusual parameters or from untrusted IP ranges. |
BIPublisherIntegration module or other suspicious patterns originating from unknown IP addresses. Use D3FEND's Network Traffic Analysis (D3-NTA) to baseline normal traffic and detect anomalies.Process Analysis (D3-PA) to identify malicious behavior.Software Update (D3-SU).Inbound Traffic Filtering (D3-ITF).Network Isolation (D3-NI).FBI issues emergency warning and Harvard University confirmed as victim in Cl0p's Oracle EBS campaign; new malware details and IOCs revealed.
The FBI has issued an emergency warning regarding the Cl0p campaign exploiting CVE-2025-61882 in Oracle EBS, with Harvard University confirmed as a victim. New intelligence from Google and Mandiant reveals the use of a sophisticated, fileless malware suite including GOLDVEIN (validator), SAGEGIFT (keylogger), SAGELEAF (recon), and SAGEWAVE (backdoor/exfil). A related vulnerability, CVE-2025-61884, was also patched. Expanded technical indicators and TTPs provide deeper insight into the attack chain and post-exploitation activities, emphasizing the severe and widespread impact across critical sectors.
CL0P names Washington Post among 100+ victims of Oracle EBS zero-day, demanding up to $50M in ransoms and publicly shaming non-payers.
The CL0P ransomware group has significantly escalated its Oracle EBS zero-day campaign, now claiming over 100 organizations compromised, including high-profile victim The Washington Post. The group is demanding ransoms reaching up to $50 million and has adopted a public shaming tactic, listing non-compliant victims on its dark web leak site to pressure payments. This development underscores the widespread impact and severe financial implications of the ongoing exploitation of the Oracle E-Business Suite vulnerability, highlighting critical supply chain risks from widely used enterprise software.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats