CLOP-Affiliated Threat Actor Exploited Oracle E-Business Suite Zero-Day in Widespread Extortion Campaign

0
Google Threat Intelligence Group (GTIG) and Mandiant just published new research about the active, widespread extortion campaign associated with the CL0P extortion brand targeting Oracle E-Business Suite (EBS).

GTIG’s analysis found the actor(s) successfully chained together multiple distinct vulnerabilities (including a zero-day likely identified as CVE-2025-61882) to gain unauthenticated Remote Code Execution (RCE) and steal mass amounts of customer data. The initial exploitation activity may have begun as early as July 10, 2025, nearly 3 months prior to any public detections.

The campaign involves chaining together multiple distinct vulnerabilities (as many as five, according to external analysis), including a zero-day vulnerability (likely CVE-2025-61882) to steal mass amounts of customer data via unauthenticated Remote Code Execution (RCE).   Furthermore, the campaign utilizes sophisticated, multi-stage, fileless malware (GOLDVEIN.JAVA, SAGEGIFT, SAGELEAF, and SAGEWAVE) to evade file-based detection—a crucial new detail.

According to GTIG’s experts, this level of investment suggests the threat actor(s) responsible for the initial intrusion likely dedicated significant resources to pre-attack research.

John Hultquist, Chief Analyst, Google Threat Intelligence Group – Google Cloud, elaborates on the potential scope of this operation “We’re still assessing the scope of this incident, but we believe it affected dozens of organizations. Some historic CL0P data extortion campaigns have had hundreds of victims. Unfortunately large scale zero-day campaigns like this are becoming a regular feature of cybercrime.”

Full research with recommendations can be read here: https://cloud.google.com/blog/topics/threat-intelligence/oracle-ebusiness-suite-zero-day-exploitation

Share.