
Mandiants and Google are monitoring a new forced recovery campaign, where officials of many companies received emails claiming that sensitive data was stolen from their orac e-business suit system
According to the leading Stark, the head of cyber crime and information operating intelligence analysis at GTIG, the campaign began in late September.
Stark said, “The activity began on or earlier on September 29, 2025, but the experts in the Mandiant are still in the early stages of several investigations, and have not yet confirmed the claims made by the group,” Stark said.
Charles Karmakal, Mandient – CTO of Google Cloud, said that forcible recovery emails are being sent in large numbers from compromised email accounts.
“We are currently observing a high-length email campaign being launched from hundreds of compromised accounts and our initial analysis confirms that at least one of these accounts is associated with at least one activity, which is known for deploying the long-running financially motivated threats to deploy ransomware and forcibly recovered.
Mandiants and GTIG reports that the email contains contact addresses listed on the clop ransomware gang’s data leak site, which reflects the potential link of the Extortion Group.
However, Karmakal says that while the strategy is similar to the previous forced recovery operations of the clop and email addresses indicate a possible link, there is not enough evidence to determine whether the data is actually stolen.
Mandiants and GTIGs recommend that organizations receiving these emails examine their atmosphere for abnormal access or compromise in their Oracle e-business suit platforms.
Bleepingcomputer approached the clop ransomware gang to confirm if they were behind the email of forcible recovery, but no response was received at this time.
We have also contacted Oirakal to determine if they know about any recent zero-day exploitation, which can lead to data theft.
If you have any information about this phenomenon or any other unknown attacks, you can secretly contact us at 646-961-3731 or through the signal at tips@bleepingcomputer.com.
Who is the clop extortion gang?
The clop ransomware operation, also tracked as the TA505, CL0p, and Fin11, when launched in March 2019, when it began to target the enterprise network with a version of the cryptomics ransomware.
Like other ransomware gangs, clop members violate corporate networks, steal data, and then deploy ransomware to encry the system.
The stolen data and encrypted files are then used as a profit to forces companies to pay ransom demand and to prevent the leaks of the stolen data in exchange for a decrypter.
While the group is still known to deploy ransomware, since 2020, they have moved to the secured file transfer platforms to exploit zero-day weaknesses in platforms.
Some of his most notable attacks are involved:
The most recent campaign associated with clop was in October 2024, when the danger actors exploited two Cleo File Transfer Zero-Day (CVE-2024-50623 and CVE-2024-55956) to steal data and steal companies.
The US State Department currently awards a reward of $ 10 million through its award for the justice program for the information of linking the ransomware activities of the clops with a foreign government.


