
A widespread and ambitious Oracle hacking campaign has compromised dozens of organizations, according to a recent Google cybersecurity analysis. However, reports say the impacted organizations could exceed one hundred.
The operation, which may have commenced as early as three months ago, targets Oracle's E-Business Suite (EBS)—a set of applications used by enterprises to manage critical business processes such as logistics, manufacturing, and customer relations.
Google's analysis indicates that the threat actors exfiltrated "mass amounts of customer data," suggesting significant data breach risks for the affected companies. Google analyst Austin Larsen told Reuters that the tech giant is aware of dozens of victims for now. “Based on the scale of previous CL0P campaigns, it is likely there are over a hundred."
Initially, Oracle acknowledged that some corporate executives received extortion emails linked to previously identified vulnerabilities patched in July. Soon after, Oracle chief security officer Rob Duhart said the tech giant released a new patch to fix a newly identified zero-day vulnerability in its EBS, versions 12.2.3-12.2.14.
The security advisory said the flaw, tracked as CVE-2025-61882, is remotely exploitable without authentication, and its exploit could lead to remote code execution.
CVE-2025-61882 is a vulnerability in the BI Publisher Integration component of Oracle Concurrent Processing within Oracle EBS that allows an unauthenticated attacker to send specially crafted HTTP requests to the affected component, resulting in full system compromise.
Google has attributed the sophisticated intrusions to CL0P, a well-known cybercriminal group that was linked to the MOVEit and Cleo incidents. This assessment is based on the operational tactics and the scale of the attack, which align with previous CL0P cyberattacks.
The group is known for exploiting vulnerabilities in third-party software and service providers to execute wide-ranging compromises. According to Google analysts, the level of investment in pre-attack research suggests the threat actor dedicated significant resources to planning the operation.
Oracle previously confirmed that there was extortion activity directed at its customers, a hallmark of CL0P's methodology. “Clop has been sending extortion emails to several victims since last Monday,” said Charles Carmakal, Chief Technology Officer at Mandiant.
The campaign highlights the substantial risk posed by vulnerabilities within critical enterprise software suites. By targeting Oracle's EBS, the attackers gained access to the core operational data of numerous businesses.
The U.K. National Cyber Security Centre (NCSC) issued the following recommendations: