Cl0p Implicated in Oracle Zero-Day Attacks, Breaching UPenn and University of Phoenix

Universities of Pennsylvania and Phoenix Disclose Data Breaches After Oracle E-Business Suite Zero-Day Exploitation, Cl0p Ransomware Gang Suspected

HIGH
December 8, 2025
December 30, 2025
5m read
Data BreachThreat ActorVulnerability

Impact Scope

People Affected

1,488+ (UPenn) and a large unspecified number (U of Phoenix)

Industries Affected

Education

Geographic Impact

United States (national)

Related Entities(initial)

Threat Actors

Cl0p

Organizations

Check PointOracle

Products & Tech

Oracle E-Business Suite

Other

University of PennsylvaniaUniversity of Phoenix

Full Report(when first published)

Executive Summary

Two major educational institutions, the University of Pennsylvania and the University of Phoenix, have fallen victim to cyberattacks exploiting zero-day vulnerabilities in Oracle E-Business Suite. The breaches have resulted in the compromise of sensitive personal information. While the full scope at the University of Phoenix is still being determined, UPenn has confirmed at least 1,488 individuals were impacted. Security experts widely suspect the Cl0p ransomware and extortion group is the perpetrator. This incident aligns with Cl0p's established modus operandi of leveraging zero-day flaws in popular enterprise file transfer and business applications to conduct mass data exfiltration campaigns, followed by extortion demands. The attacks highlight the significant risk posed by vulnerabilities in critical enterprise software within the education sector.


Threat Overview

  • What Happened: Attackers exploited one or more zero-day vulnerabilities in Oracle E-Business Suite (EBS), a widely used suite of business applications.
  • Who's Affected: The University of Pennsylvania and the University of Phoenix are the two publicly confirmed victims. The breach at UPenn affected at least 1,488 people. The University of Phoenix breach is described as impacting a broad range of individuals, including students, alumni, donors, staff, and faculty.
  • Attack Vector: The initial access vector was the exploitation of undisclosed (zero-day) vulnerabilities in internet-facing Oracle EBS servers.
  • Suspected Attacker: The Cl0p ransomware gang is the prime suspect. This attribution is based on the group's long history of similar attacks, such as the mass exploitation of vulnerabilities in Accellion FTA, GoAnywhere MFT, and MOVEit Transfer. Cl0p specializes in identifying and weaponizing zero-day flaws in enterprise software for data theft, rather than deploying ransomware for encryption.

Technical Analysis

While specific technical details and CVEs for the Oracle EBS zero-days have not yet been publicly released, the attack pattern is consistent with past Cl0p campaigns.

  1. Initial Access: Cl0p likely identified and developed an exploit for a zero-day vulnerability in Oracle EBS. This would fall under T1190 - Exploit Public-Facing Application.
  2. Data Exfiltration: Once access was gained, the primary objective was to identify and exfiltrate large volumes of sensitive data. This data likely includes names, social security numbers, dates of birth, and other personally identifiable information (PII) stored within the EBS systems. This aligns with T1567.002 - Exfiltration to Cloud Storage, as Cl0p often uses custom web shells and scripts to transfer data to attacker-controlled cloud infrastructure.
  3. Extortion: Following exfiltration, Cl0p's typical TTP is to contact the victim organization and demand a large payment to prevent the public release of the stolen data on their dark web leak site. This is a form of T1486 - Data Encrypted for Impact, where the 'impact' is the threat of data leakage rather than encryption.

Impact Assessment

For the affected universities, the impact is multi-faceted:

  • Regulatory and Legal: Educational institutions handle significant amounts of PII, making them subject to data breach notification laws. They now face the costs of notifying thousands of individuals, providing credit monitoring services, and potential regulatory fines or class-action lawsuits.
  • Reputational Damage: Data breaches can damage the reputation of a university, potentially affecting student enrollment and alumni donations.
  • Operational Disruption: Incident response efforts, forensic investigations, and system remediation require significant time and resources, diverting staff from their primary duties.

For the 1,488+ individuals whose data was stolen, the primary risk is identity theft and fraud. The stolen information can be used to open fraudulent accounts, file false tax returns, or conduct targeted phishing attacks.

Detection & Response

Organizations using Oracle E-Business Suite should:

  • Monitor for Anomalies: Scrutinize logs from Oracle EBS servers for unusual access patterns, large outbound data transfers, or the presence of new web shell files in web-accessible directories. D3FEND's D3-NTA: Network Traffic Analysis is crucial for spotting exfiltration.
  • Threat Hunting: Proactively hunt for signs of compromise, such as unexpected processes spawned by the Oracle application server process or outbound connections to unfamiliar IP addresses or domains.
  • Isolate and Analyze: If a potential compromise is detected, isolate the affected servers from the network immediately to prevent further data loss or lateral movement. Preserve logs and system images for forensic analysis.

Mitigation

Note: Since the vulnerabilities are zero-days, standard patching was not an option prior to the attacks. The following recommendations focus on compensating controls and response readiness.

  1. Apply Emergency Patches: Oracle will likely release out-of-band security patches for these vulnerabilities. Organizations using EBS must apply these patches on an emergency basis as soon as they become available. This is the top priority.
  2. Restrict Access: Limit network access to Oracle EBS servers. Management interfaces should not be exposed to the public internet. If remote access is necessary, it should be strictly controlled through a VPN with Multi-factor Authentication (MFA).
  3. Web Application Firewall (WAF): Deploy a WAF in front of EBS servers to provide virtual patching. WAFs can be configured with rules to block common exploit techniques, even before a specific CVE signature is available.
  4. Egress Filtering: Implement strict outbound network traffic filtering (egress filtering). This can block or alert on large, unexpected data transfers from your servers to the internet, potentially thwarting a data exfiltration attempt. This aligns with D3FEND's D3-OTF: Outbound Traffic Filtering.

Timeline of Events

1
December 8, 2025
This article was published

Article Updates

December 21, 2025

Severity increased

University of Phoenix confirms Clop breach, impacting nearly 3.5 million individuals, a significant increase from initial estimates.

The University of Phoenix officially confirmed on December 21, 2025, that it was a victim of the Clop ransomware gang. The breach is far more extensive than initially reported, now impacting nearly 3.5 million students, staff, and suppliers. This significant increase in affected individuals elevates the incident to one of the largest data breaches in the U.S. education sector for 2025. Clop's double extortion tactics, involving data exfiltration and threats of public release, were confirmed. This update provides concrete numbers and official confirmation, underscoring the severe and widespread impact of the attack.

December 30, 2025

Severity increased

University of Phoenix breach confirmed to affect nearly 3.5 million individuals; SSNs and bank details exposed via CVE-2025-61882 in Oracle EBS.

The University of Phoenix has confirmed its data breach, previously reported as affecting an unspecified large number, now impacts 3,489,274 individuals. The attack, attributed to the Clop gang, exploited CVE-2025-61882 in Oracle E-Business Suite between August 13-22, 2025. Compromised data includes highly sensitive information such as Social Security numbers and bank account details. The breach went undetected for three months until November 2025, significantly increasing the severity and scope of the incident.

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Cl0pData BreachEducationExtortionOracleOracle E-Business SuiteUniversityZero-Day

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading