Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Oracle Patch EBS zero-day exploitation clop data stolen attacks
    Security

    Oracle Patch EBS zero-day exploitation clop data stolen attacks

    PineapplesUpdateBy PineapplesUpdateOctober 6, 2025No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Oracle Patch EBS zero-day exploitation clop data stolen attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Oracle Patch EBS zero-day exploitation clop data stolen attacks

    The OraCle is warning about an important e-business suit zero-day vulnerability, which allows the attackers to perform informal distance code execution with active exploitation in clop data theft attacks.

    The Oracle e-Business Suite (component: BI publisher integration) is within the Oracle concurrent processing product and a CVSS base score of 9.8 due to its lack of authentication and ease of exploitation.

    “This safety alert addresses the vulnerability CVE-2025-61882 in the Oracle e-business suit,” reads a new Oracle advisor.

    “This vulnerability is exploiting from far away without authentication, that is, it can be exploited on a network without the need for a user name and password. If successfully exploited, this vulnerability can result in distance code execution as a result of this vulnerability.

    Oracle has confirmed that zero-day vulnerability affects the Oracle e-business suit, version 12.2.3-12.2.14, and has released one Emergency update To address the defect. The company notes that customers must first install the critical patch updates on October 2023, before they can install new security updates.

    As a public POC exploitation exists and the defect is actively exploited, it is important to install security updates as soon as possible for Oracle Admins.

    Zero-day exploited in clop data theft attacks

    While Oracle clearly did not say that it is a zero-day vulnerability, he has shared the indicators of the compromise that in line with an Oracle EBS exploitation shared by the danger actors on Telegram recently.

    Charles Carmacal, CTO, Mandient – Google Cloud, also confirmed that it was a blame exploited by the clop ransomware gang in data theft attacks in August 2025.

    Carmakal shared BlappingCompter in a statement, “Clop exploited several weaknesses in Oracle EBS, which enabled them to steal a large amount of data from many victims in August 2025.”

    “Many weaknesses were exploited, including the weaknesses, which were in Oracle’s update of July 2025 as well as to patch on the end of this week (CVE-2015-61882),” the Carmacal continued.

    CVE-2025-61882 is an important (9.8 CVSS) vulnerability that enables informal distance code execution.

    The news of the latest extortion campaign of the clop was broken for the first time last week, when Mandient and Google Threat Intelligence Group (GTIG) reported that they were monitoring a new campaign in which many companies had received emails claiming to be from danger actors.

    These emails stated that the clop had stolen data from the company’s Oracle e-business suit system and was demanding ransom not to leak the stolen data.

    “We are CL0P teams. If you haven’t heard of us, you can go to the internet about us,” reads the forced recovery email shared with bleepingcomputer.

    “We have recently violated your Oracle e-Business Suit application and have copied a lot of documents. All private files and other information are now conducted on our system.”

    Clop Extortion Email
    Clop Extortion Email
    Source: Google

    Clop Extortion gang has a long history of exploiting zero-day vulnerability in large-scale data theft attacks, including:

    The clop later confirmed the Blapping connecting that he was behind the email of forced recovery and indicated that he exploited an Oracle zero-day vulnerability to steal the data.

    Clop told Blapping Copper, “Soon everyone will be clear that Oracle provoked his main product and once again, working on the clop to save the day.”

    However, Oracle initially linked the clop extraction campaign to the weaknesses that were patches in July 2025 instead of new zero-days, which we now know that was used in attacks.

    Oracle has now shared indicators of agreement for zero-day exploitation, including two IP addresses that exploit the server, a command to open a remote shell, and exploitation collections and related files.

    Exploitation leaked by scattered lapsus $ hunter

    While clops are behind the theft attacks and the exploitation of Oracle Zero-Day, zero-day reports have come from a separate group of danger actors who are making their headlines recently with their comprehensive data theft attacks on salesforce customers.

    On Friday, these actors called themselves “scattered lapsus $ hunters”, as they claim the scattered spider, lapsus $, and the danger actors of shiny -deleters, claiming two files on Telegram, which they said that they belonged to clop attacks.

    A file called “Gift_from_Cl0p.7Z” has an ORACLE source code that appears to be related to “Support.oracle.com” based on file names.

    However, the danger actors also released a “OraCle_EBS_EXPLIC_POC_POCS_LAPS_LAPS_CL0P_CL0P_Hunters.zip” collection, which he provoked by the file name, which was the Oral e-breach exploitation used by the clop.

    Oracle e-business exploitation for zero-day defect
    Oracle e-business exploitation for zero-day defect

    Bleepingcomputer has confirmed that this is the same file listed in the indicators of Oracle’s agreement.

    This archives have a readme.MD instruction file and two python scripts, named Exp.Py and Server.py. These python scripts are used to take advantage of a weak oral e-business suit example and either execute an arbitrary command or open a reverse shell on the server of the actor with danger.

    List the name of the explight archives shared by Lapsus $ Hunters scattered as IOCS shared by Oracle, now it is confirmed that it is exploitation used by clop ransomware gangs.

    However, it raises the question of how the actors of scattered lapsus $ Hunteers have access to exploitation and are they working with clops in some capacity.

    Bleepingcomputer contacted both Shinyhunters and representatives of Clop to ask questions about the relationship, but no response was received at this time.


    Picus Base Summit

    attend Violation and attack simulation summit And experience Future of security verificationListen to top experts and see how AI-managed base Breach is changing and attacking simulation.

    Do not remember the event that will shape the future of your safety strategy

    attacks Clop data EBS exploitation Oracle patch stolen zeroday
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleHold EERO Outdoor 7 router at a new low price
    Next Article Get EERO Outdoor 7 router for 20% discount
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    How to Disable ACR on Your TV (And Stop Data Tracking Forever)

    January 13, 2026
    Startups

    Can You Become an AI Data Trainer? How to prepare and what is it worth

    January 3, 2026
    Startups

    Oracle meltdown causes Larry Ellison to lose $25B in a single day

    December 12, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.