Clop Ransomware Hits Korean Air in Supply Chain Attack, Exploiting Oracle Zero-Day

Korean Air Discloses Employee Data Breach After Supply Chain Attack on Subsidiary; Clop Ransomware and Oracle Zero-Day (CVE-2025-61882) Implicated

HIGH
December 29, 2025
January 4, 2026
5m read
Supply Chain AttackRansomwareData Breach

Impact Scope

People Affected

approximately 30,000 employees

Affected Companies

Korean Air

Industries Affected

TransportationHospitalityCritical Infrastructure

Geographic Impact

South Korea (national)

Related Entities(initial)

Threat Actors

Clop TA505FIN11

Products & Tech

Other

Korean Air KC&D Service

CVE Identifiers

CVE-2025-61882
CRITICAL
CVSS:9.8

Full Report(when first published)

Executive Summary

Korean Air has confirmed a data breach impacting the personal information of around 30,000 employees, including names and bank account numbers. The incident, announced on December 29, 2025, was not a direct attack on the airline but a supply chain attack targeting its former in-flight catering subsidiary, KC&D Service. The notorious Clop ransomware group (also tracked as TA505/FIN11) is the primary suspect, having claimed responsibility on its dark web leak site. The attack vector is believed to be the exploitation of a critical zero-day vulnerability in Oracle E-Business Suite (CVE-2025-61882), a 9.8 CVSS flaw enabling unauthenticated remote code execution. This breach highlights a persistent and targeted campaign by Clop against the global aviation sector.


Threat Overview

The attack on KC&D Service and the subsequent data exposure at Korean Air exemplifies the growing threat of supply chain attacks. Threat actors are increasingly targeting smaller, less secure partners to gain access to larger, high-value organizations. The Clop ransomware gang has been at the forefront of this trend, specializing in exploiting zero-day vulnerabilities in widely used enterprise software to execute large-scale data theft and extortion campaigns.

This incident is part of a broader 2025 campaign by Clop focused on the aviation industry. A similar attack on Asiana Airlines a week prior suggests a concerted effort to compromise the sector's interconnected ecosystem. By breaching KC&D Service, the attackers gained access to sensitive Korean Air employee data that was managed by the subsidiary.

Technical Analysis

The initial access vector for this attack was the exploitation of CVE-2025-61882, a critical vulnerability in the BI Publisher Integration component of Oracle E-Business Suite. This flaw allows for unauthenticated remote code execution (RCE), giving attackers a direct foothold into the target's network.

Clop's typical attack chain following exploitation often involves:

  1. Initial Access: Exploiting a public-facing application vulnerability like T1190 - Exploit Public-Facing Application.
  2. Execution & Persistence: Deploying web shells or other backdoors to maintain access.
  3. Discovery: Mapping the internal network and identifying valuable data repositories.
  4. Credential Access: Using tools like Mimikatz to dump credentials.
  5. Lateral Movement: Moving across the network to access additional systems, often using compromised credentials.
  6. Exfiltration: Stealing large volumes of sensitive data using T1041 - Exfiltration Over C2 Channel.
  7. Impact: Deploying ransomware to encrypt files as the final step in their double extortion tactic (T1486 - Data Encrypted for Impact).

Impact Assessment

  • Direct Impact: The personal information of approximately 30,000 Korean Air employees has been compromised, including names and bank account numbers. This exposes affected individuals to risks of identity theft and financial fraud.
  • Business Impact: While Korean Air stated customer data was not affected, the breach causes significant reputational damage and requires costly incident response, investigation, and potential regulatory fines. It also disrupts the trust-based relationship with its supply chain partners.
  • Systemic Risk: This attack underscores the systemic risk within the aviation industry. A single vulnerability in a common software product can lead to multiple, cascading breaches across airlines and their suppliers, potentially impacting operations and safety.

Cyber Observables for Detection

Security teams should hunt for indicators related to the exploitation of Oracle E-Business Suite and Clop TTPs:

Type Value Description
api_endpoint /OA_HTML/BneViewer A common URL path associated with vulnerabilities in Oracle's BI Publisher. Monitor for anomalous requests.
process_name java.exe On Oracle servers, watch for java.exe processes spawning suspicious child processes like cmd.exe or powershell.exe.
network_traffic_pattern Unusual outbound traffic from Oracle servers Monitor for large data transfers from E-Business Suite servers to unknown external IP addresses.
log_source Web server access logs Scrutinize logs for Oracle E-Business Suite servers for unusual GET or POST requests, especially those targeting BI Publisher endpoints.

Detection & Response

  1. Vulnerability Scanning: Immediately scan for vulnerable instances of Oracle E-Business Suite within the environment and across third-party suppliers.
  2. Web Log Analysis: Analyze web server access logs for any requests matching the patterns associated with CVE-2025-61882 exploitation. Use URL Analysis (D3-UA) to identify malicious requests.
  3. Endpoint Detection and Response (EDR): Deploy EDR solutions on critical servers, including those running Oracle applications, to detect post-exploitation activity such as suspicious process chains or the loading of malicious tools.
  4. Threat Intelligence Integration: Ingest IOCs and TTPs related to Clop into SIEM and other security tools to enable real-time detection of their activity.

Mitigation

  1. Patch Management: Prioritize the application of Oracle's security patch for CVE-2025-61882 on all E-Business Suite instances. (D3-SU: Software Update)
  2. Supply Chain Risk Management: Implement a robust third-party risk management (TPRM) program. This includes conducting security assessments of all vendors, mandating security standards in contracts, and monitoring their security posture.
  3. Network Segmentation: Isolate critical systems like Oracle E-Business Suite in segmented network zones. Restrict access from less secure parts of the network to limit lateral movement in case of a breach. (D3-NI: Network Isolation)
  4. Web Application Firewall (WAF): Deploy a WAF with virtual patching capabilities to block exploit attempts against the Oracle vulnerability until a permanent patch can be applied.

Timeline of Events

1
December 29, 2025
Korean Air announces it has suffered a data breach affecting 30,000 employees due to an attack on a subsidiary.
2
December 29, 2025
This article was published

Article Updates

December 31, 2025

New report on Korean Air breach details supply chain attack on KC&D, omitting specific Clop attribution and Oracle zero-day exploit.

January 4, 2026

Clop confirmed data leak, Oracle zero-day exploited for months since August 2025, impacting numerous organizations globally.

MITRE ATT&CK Mitigations

Promptly apply security patches for CVE-2025-61882 to all Oracle E-Business Suite instances to remove the initial access vector.

Isolate critical applications like Oracle E-Business Suite from other parts of the network to contain breaches and prevent lateral movement.

While this attack was a zero-day exploit, Clop often uses phishing. Training users to recognize and report phishing attempts is a crucial defense layer.

Maintain regular, tested, and immutable backups to ensure data can be restored in the event of a successful ransomware attack.

D3FEND Defensive Countermeasures

The most effective defense against the initial intrusion vector used in the Korean Air supply chain attack is to apply the security patch for CVE-2025-61882. All organizations using Oracle E-Business Suite must prioritize this update. Given the critical 9.8 CVSS score and its use as a zero-day by Clop, this patch should be treated as an emergency change. Asset management systems should be used to identify all instances of the vulnerable software, including those managed by third parties. The update process should include verification to confirm the patch has been successfully applied and the vulnerability is remediated. This action closes the door that the Clop group used to gain initial access.

To limit the blast radius of a potential compromise, organizations should implement robust network isolation for critical applications like Oracle E-Business Suite. These servers should be placed in a secure, segmented network zone with strict ingress and egress filtering. Access to the application should be limited to specific, authorized user groups and application servers. This prevents attackers who compromise one part of the network from easily moving laterally to the E-Business Suite environment. Furthermore, isolating the application servers from direct internet access and placing them behind a reverse proxy or WAF adds another layer of protection. This countermeasure is crucial for containing threats originating from less secure parts of the network or, as in this case, a compromised supply chain partner.

Continuous network traffic analysis is essential for detecting post-exploitation activity associated with the Clop ransomware group. After exploiting CVE-2025-61882, attackers will attempt to exfiltrate data. Security teams should use NDR (Network Detection and Response) tools to monitor for anomalous traffic patterns originating from Oracle E-Business Suite servers. Specifically, look for large data transfers to unknown or suspicious IP addresses, connections over non-standard ports, or traffic destined for cloud storage providers not used by the organization. Establishing a baseline of normal network behavior for these servers is key to identifying deviations that could signal a data theft in progress. This allows for a rapid response to interrupt the exfiltration and begin incident response procedures.

Sources & References(when first published)

Korean Air Employee Data Breach Clop Ransomware Supply Chain Attack Report
Korea JoongAng Daily (koreajoongangdaily.joins.com) December 29, 2025
Korean Air Employee Data Breach Clop Ransomware Supply Chain Attack Report
Example Threat Intel (example-threat-intel.com) December 29, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

ClopRansomwareSupply Chain AttackKorean AirOracleZero-DayAviationTA505

📢 Share This Article

Help others stay informed about cybersecurity threats