Key Takeaways
The Cl0p hacking group has claimed it successfully breached the networks of two prominent Japanese manufacturers, Canon and Mazda. The claim, which is currently pending verification, was made on November 20, 2025. This alleged Canon and Mazda cyberattack is indicative of Cl0p's continued focus on high-value enterprise targets.Â
The group's public assertion places both companies on high alert as security teams work to validate the extent of any potential compromise.
Security analysts suspect these data breaches are linked to the active exploitation of a zero-day vulnerability within the Oracle E-Business Suite (EBS), which allegedly impacted 100 organizations.
This enterprise resource planning (ERP) software is widely used across major industries for managing critical business operations, making it a prime target for threat actors.
As a well-known cybercrime syndicate specializing in ransomware and data extortion, Cl0p has a history of executing large-scale attacks with significant financial and operational consequences for its victims.Â
By exploiting an unpatched flaw in such a foundational system, the Cl0p ransomware group could gain deep access to corporate networks. This method highlights the severe risk posed by zero-day vulnerabilities in ubiquitous third-party software.
Industrial giants like Japan’s Canon and Mazda possess valuable design, production, and supply chain data, making them attractive targets for financially motivated cybercriminals.Â
An attack that leverages a vulnerability in a core business application like Oracle's EBS demonstrates a sophisticated understanding of enterprise IT environments.Â
The potential success of such a campaign would reinforce the need for:
Among Cl0p Ransomware’s latest claimed victims are Swiss tech giant Logitech, the Washington Post, American Airlines, and the prestigious Harvard University.