On November 8, 2025, The Washington Post confirmed it was compromised as part of a massive cyberattack campaign targeting vulnerabilities in Oracle E-Business Suite. The notorious Clop ransomware gang has claimed responsibility, having breached over 100 companies in a campaign characterized by large-scale data theft and multi-million dollar extortion demands. The attackers are leveraging a double-extortion strategy, not only encrypting data but also exfiltrating it and threatening public release on their dark web leak site. The incident highlights the severe risks associated with unpatched enterprise resource planning (ERP) systems and the relentless pressure tactics used by top-tier ransomware operators. Organizations using Oracle E-Business Suite are urged to assume compromise and initiate immediate threat hunting and incident response procedures.
The attack campaign, which began in late September 2025, exploits unspecified vulnerabilities within the Oracle E-Business Suite, a widely used set of enterprise applications. The threat actor, identified as the financially motivated Clop group (also known as TA505), has successfully breached a diverse range of organizations across media, finance, and healthcare sectors. After gaining initial access, the attackers exfiltrate large volumes of sensitive corporate and employee data before making their presence known.
The extortion phase is particularly aggressive. Clop has publicly named The Washington Post and other victims on its dedicated leak site, a tactic designed to create public and regulatory pressure. The group has reportedly contacted executives directly with ransom demands reaching up to $50 million. This campaign follows a pattern similar to previous large-scale attacks by Clop, such as the exploitation of the MOVEit Transfer vulnerability, which also impacted hundreds of organizations globally.
While specific CVEs for the Oracle E-Business Suite exploitation have not been publicly disclosed, the attack pattern is consistent with Clop's established modus operandi. The attack likely involves the following MITRE ATT&CK techniques:
T1190 - Exploit Public-Facing Application: The attackers exploited vulnerabilities in the internet-facing components of the Oracle E-Business Suite.T1203 - Exploitation for Client Execution: After gaining a foothold, the attackers likely executed malicious code to further their objectives within the compromised environment.T1003 - OS Credential Dumping: Clop is known to dump credentials to facilitate lateral movement and gain access to additional systems and data.T1560 - Archive Collected Data: Before exfiltration, data is often staged and compressed into archives to facilitate faster transfer.T1041 - Exfiltration Over C2 Channel: Sensitive data was stolen and transferred to attacker-controlled infrastructure.T1486 - Data Encrypted for Impact and T1657 - Financial Cryptojacking: While the primary impact is data theft for extortion (a form of data encryption for impact), the end goal is financial gain through ransom payments.The impact of this campaign is substantial and multi-faceted. For victims like The Washington Post, the consequences include:
Google's estimate of over 100 affected companies suggests a systemic risk event, with potential cascading effects across supply chains if inter-connected businesses were compromised.
No specific Indicators of Compromise (IOCs) such as IP addresses, domains, or file hashes were provided in the source articles.
Security teams should proactively hunt for signs of compromise related to Oracle E-Business Suite. These observables are generated based on typical exploitation patterns for such systems:
| Type | Value | Description |
|---|---|---|
url_pattern |
/OA_HTML/, /OA_JAVA/, /forms/ |
Monitor web server logs for unusual requests or exploit attempts targeting common Oracle EBS URL paths. |
process_name |
frmweb, oacore, apache |
Look for anomalous child processes spawned by core Oracle EBS processes on the application servers. |
network_traffic_pattern |
Unusual outbound connections from EBS servers |
Monitor for large data transfers or connections to untrusted IP addresses from application or database servers, especially to known cloud storage providers. |
log_source |
EBS Access Logs, Database Audit Logs |
Analyze logs for signs of SQL injection, unauthorized access, or large data queries from unexpected sources. |
D3-NTA: Network Traffic Analysis and D3-WSAA: Web Session Activity Analysis.lsass.exe) and lateral movement.D3-OTF: Outbound Traffic Filtering.D3-SU: Software Update.D3-NI: Network Isolation.D3-UAP: User Account Permissions.Apply security patches from Oracle for E-Business Suite to close the exploited vulnerabilities.
Mapped D3FEND Techniques:
Isolate ERP systems from other parts of the network to contain breaches and prevent lateral movement.
Use egress filtering to block exfiltration to known malicious domains or untrusted destinations.
Mapped D3FEND Techniques:
Organizations must prioritize the immediate application of all security patches for Oracle E-Business Suite. Given the active exploitation by a sophisticated actor like Clop, this is the most critical defense. Establish a rapid patching cycle for critical enterprise applications like Oracle EBS, with a goal of applying security-related updates within 72 hours of release. Before deployment, patches should be tested in a staging environment to ensure they do not disrupt business operations. Use asset management systems to verify that all instances of EBS, including development and test environments, are patched. This directly mitigates the initial access vector (T1190) by closing the vulnerabilities the attackers are known to be exploiting. Failure to patch leaves the primary door open for this campaign.
To counter the data exfiltration phase of the attack, implement strict outbound traffic filtering on the network segments hosting Oracle E-Business Suite servers. By default, deny all outbound traffic from these servers to the internet. Create explicit allow-rules only for necessary business functions, such as connections to Oracle's patch servers or other trusted third-party services. This 'default-deny' posture can prevent or disrupt the attackers' ability to exfiltrate stolen data, even if they achieve initial access. Monitor for and alert on any attempts to violate these outbound rules, as this is a strong indicator of compromise. This technique is a powerful compensating control that can break the attack chain at the exfiltration stage (T1041), limiting the overall damage of a breach.
Implement robust network segmentation to isolate the Oracle E-Business Suite environment. The application servers, database servers, and web front-ends should reside in a dedicated, highly restricted virtual local area network (VLAN) or cloud virtual private cloud (VPC). Access to this zone should be controlled via a jump box or privileged access management (PAM) solution, with multi-factor authentication enforced. This isolation prevents attackers who compromise the EBS system from easily moving laterally to other parts of the corporate network. It also limits the 'blast radius' of an incident, containing the threat to the compromised segment and protecting other critical assets. This directly counters lateral movement and helps contain the impact of the initial breach.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats