1,488+ (UPenn) and a large unspecified number (U of Phoenix)
Two major educational institutions, the University of Pennsylvania and the University of Phoenix, have fallen victim to cyberattacks exploiting zero-day vulnerabilities in Oracle E-Business Suite. The breaches have resulted in the compromise of sensitive personal information. While the full scope at the University of Phoenix is still being determined, UPenn has confirmed at least 1,488 individuals were impacted. Security experts widely suspect the Cl0p ransomware and extortion group is the perpetrator. This incident aligns with Cl0p's established modus operandi of leveraging zero-day flaws in popular enterprise file transfer and business applications to conduct mass data exfiltration campaigns, followed by extortion demands. The attacks highlight the significant risk posed by vulnerabilities in critical enterprise software within the education sector.
While specific technical details and CVEs for the Oracle EBS zero-days have not yet been publicly released, the attack pattern is consistent with past Cl0p campaigns.
T1190 - Exploit Public-Facing Application.T1567.002 - Exfiltration to Cloud Storage, as Cl0p often uses custom web shells and scripts to transfer data to attacker-controlled cloud infrastructure.T1486 - Data Encrypted for Impact, where the 'impact' is the threat of data leakage rather than encryption.For the affected universities, the impact is multi-faceted:
For the 1,488+ individuals whose data was stolen, the primary risk is identity theft and fraud. The stolen information can be used to open fraudulent accounts, file false tax returns, or conduct targeted phishing attacks.
Organizations using Oracle E-Business Suite should:
D3-NTA: Network Traffic Analysis is crucial for spotting exfiltration.Note: Since the vulnerabilities are zero-days, standard patching was not an option prior to the attacks. The following recommendations focus on compensating controls and response readiness.
D3-OTF: Outbound Traffic Filtering.University of Phoenix confirms Clop breach, impacting nearly 3.5 million individuals, a significant increase from initial estimates.
University of Phoenix breach confirmed to affect nearly 3.5 million individuals; SSNs and bank details exposed via CVE-2025-61882 in Oracle EBS.
Applying emergency patches from Oracle as soon as they are available is the primary method to close the exploited vulnerabilities.
Mapped D3FEND Techniques:
Restricting access to Oracle EBS servers from the internet and implementing strict egress filtering can prevent initial access and data exfiltration.
Mapped D3FEND Techniques:
Using a WAF for virtual patching and an outbound proxy to control egress traffic can significantly mitigate the risk of exploitation and data theft.
Mapped D3FEND Techniques:
The core of Cl0p's business model is mass data exfiltration. Therefore, implementing strict outbound traffic filtering (egress filtering) is a powerful countermeasure. Configure firewalls to deny all outbound traffic from your Oracle E-Business Suite servers by default, and then explicitly allow only the specific ports, protocols, and destination IPs required for legitimate business functions (e.g., connections to internal database servers or specific payment gateways). This 'default deny' posture can block an attacker's attempt to exfiltrate data to their own cloud storage. Furthermore, monitor allowed connections for anomalous volumes. A sudden transfer of gigabytes of data from an EBS server, even to an allowed destination, should trigger an immediate alert for investigation. This technique can turn a catastrophic data breach into a contained, failed exfiltration attempt.
While these attacks exploited zero-days, Oracle will inevitably release emergency patches. Organizations using Oracle E-Business Suite must have a plan to test and deploy these out-of-band patches with extreme urgency. This requires having a complete and accurate asset inventory of all EBS instances, knowing who the system owners are, and having a pre-approved emergency change management process. Cl0p and other actors systematically re-scan for unpatched systems after a fix is released. Delaying the patch application, even by a few days, dramatically increases the risk of becoming a victim in the second wave of attacks. Treat any security update for a public-facing, business-critical application like EBS as a top priority.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats