approximately 30,000 employees
Korean Air has confirmed a data breach impacting the personal information of around 30,000 employees, including names and bank account numbers. The incident, announced on December 29, 2025, was not a direct attack on the airline but a supply chain attack targeting its former in-flight catering subsidiary, KC&D Service. The notorious Clop ransomware group (also tracked as TA505/FIN11) is the primary suspect, having claimed responsibility on its dark web leak site. The attack vector is believed to be the exploitation of a critical zero-day vulnerability in Oracle E-Business Suite (CVE-2025-61882), a 9.8 CVSS flaw enabling unauthenticated remote code execution. This breach highlights a persistent and targeted campaign by Clop against the global aviation sector.
The attack on KC&D Service and the subsequent data exposure at Korean Air exemplifies the growing threat of supply chain attacks. Threat actors are increasingly targeting smaller, less secure partners to gain access to larger, high-value organizations. The Clop ransomware gang has been at the forefront of this trend, specializing in exploiting zero-day vulnerabilities in widely used enterprise software to execute large-scale data theft and extortion campaigns.
This incident is part of a broader 2025 campaign by Clop focused on the aviation industry. A similar attack on Asiana Airlines a week prior suggests a concerted effort to compromise the sector's interconnected ecosystem. By breaching KC&D Service, the attackers gained access to sensitive Korean Air employee data that was managed by the subsidiary.
The initial access vector for this attack was the exploitation of CVE-2025-61882, a critical vulnerability in the BI Publisher Integration component of Oracle E-Business Suite. This flaw allows for unauthenticated remote code execution (RCE), giving attackers a direct foothold into the target's network.
Clop's typical attack chain following exploitation often involves:
T1190 - Exploit Public-Facing Application.T1041 - Exfiltration Over C2 Channel.T1486 - Data Encrypted for Impact).Security teams should hunt for indicators related to the exploitation of Oracle E-Business Suite and Clop TTPs:
| Type | Value | Description |
|---|---|---|
| api_endpoint | /OA_HTML/BneViewer |
A common URL path associated with vulnerabilities in Oracle's BI Publisher. Monitor for anomalous requests. |
| process_name | java.exe |
On Oracle servers, watch for java.exe processes spawning suspicious child processes like cmd.exe or powershell.exe. |
| network_traffic_pattern | Unusual outbound traffic from Oracle servers | Monitor for large data transfers from E-Business Suite servers to unknown external IP addresses. |
| log_source | Web server access logs | Scrutinize logs for Oracle E-Business Suite servers for unusual GET or POST requests, especially those targeting BI Publisher endpoints. |
New report on Korean Air breach details supply chain attack on KC&D, omitting specific Clop attribution and Oracle zero-day exploit.
Clop confirmed data leak, Oracle zero-day exploited for months since August 2025, impacting numerous organizations globally.
Promptly apply security patches for CVE-2025-61882 to all Oracle E-Business Suite instances to remove the initial access vector.
Isolate critical applications like Oracle E-Business Suite from other parts of the network to contain breaches and prevent lateral movement.
While this attack was a zero-day exploit, Clop often uses phishing. Training users to recognize and report phishing attempts is a crucial defense layer.
Maintain regular, tested, and immutable backups to ensure data can be restored in the event of a successful ransomware attack.
The most effective defense against the initial intrusion vector used in the Korean Air supply chain attack is to apply the security patch for CVE-2025-61882. All organizations using Oracle E-Business Suite must prioritize this update. Given the critical 9.8 CVSS score and its use as a zero-day by Clop, this patch should be treated as an emergency change. Asset management systems should be used to identify all instances of the vulnerable software, including those managed by third parties. The update process should include verification to confirm the patch has been successfully applied and the vulnerability is remediated. This action closes the door that the Clop group used to gain initial access.
To limit the blast radius of a potential compromise, organizations should implement robust network isolation for critical applications like Oracle E-Business Suite. These servers should be placed in a secure, segmented network zone with strict ingress and egress filtering. Access to the application should be limited to specific, authorized user groups and application servers. This prevents attackers who compromise one part of the network from easily moving laterally to the E-Business Suite environment. Furthermore, isolating the application servers from direct internet access and placing them behind a reverse proxy or WAF adds another layer of protection. This countermeasure is crucial for containing threats originating from less secure parts of the network or, as in this case, a compromised supply chain partner.
Continuous network traffic analysis is essential for detecting post-exploitation activity associated with the Clop ransomware group. After exploiting CVE-2025-61882, attackers will attempt to exfiltrate data. Security teams should use NDR (Network Detection and Response) tools to monitor for anomalous traffic patterns originating from Oracle E-Business Suite servers. Specifically, look for large data transfers to unknown or suspicious IP addresses, connections over non-standard ports, or traffic destined for cloud storage providers not used by the organization. Establishing a baseline of normal network behavior for these servers is key to identifying deviations that could signal a data theft in progress. This allows for a rapid response to interrupt the exfiltration and begin incident response procedures.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats