FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

Dozens of Organizations Hit in a New Wave of Oracle Attacks

Bill Thompson
Last updated: October 9, 2025 10:07 pm
By Bill Thompson
Technology
7 Min Read
SHARE

A widespread hacking campaign that has been tied to computer systems used by hundreds of organizations, including multiple U.S. agencies, is the “work of a high-risk actor,” in part engaged in collecting intelligence on behalf of the Russian government, according to officials at FireEye, one of the world’s leading cybersecurity firms. The campaign highlights how enterprise resource planning systems, once thought of as the backbone of back-office operations technology, have now become desirable targets for large-scale data theft.

Oracle E‑Business Suite Zero‑Day Exploited at Scale

Google’s security team reported that the intrusions are connected to Oracle’s E‑Business Suite, a common component of large companies’ management records of customer databases, finances, supply chains, and human resources. Oracle confirmed that attackers were actively exploiting a zero‑day vulnerability automatable remotely without requiring a username or password, the worst possible situation for internet‑exposed ERP components. It has since issued guidance and mitigation measures, but investigators believe that exploitation started weeks before the problem was publicly disclosed.

Table of Contents
  • Oracle E‑Business Suite Zero‑Day Exploited at Scale
  • How the Oracle Campaign Unfolded Across Organizations
  • Clop Ransomware’s Mass‑Exfiltration Playbook
  • Why ERP Data Represents a High‑Value Target
  • What Organizations Can Do Now to Reduce Oracle Risk
  • The Big Picture for Vendor Risk in Enterprise Suites
Oracle logo with red padlock over code, depicting cyberattacks on dozens of organizations

E‑Business Suite implementations typically have external‑facing modules—like supplier portals or self‑service HR—that connect internal data to partners and employees. It’s that architecture which makes it all the more necessary that enterprises deploy rigorous patching and segmentation, but also means a single missed update or misconfigured gateway can be an easy on‑ramp for data exfiltration across all departments.

How the Oracle Campaign Unfolded Across Organizations

Google’s researchers outlined a common pattern: first hitting Oracle app endpoints, quickly identifying sensitive stores and exfiltrating data in preparation for extortion emails sent directly to executives. The messages cite purloined HR files and customer data to ratchet up pressure, a move aimed at short‑circuiting the longer incident‑response cycle. Several technical indicators have been published for defenders to use in hunting, including sender addresses and infrastructure fingerprints from Google.

Crucially, the attackers appear to have begun stealing data long before they would have been detected more broadly, indicating a reconnaissance phase that preceded public advisories. That gap is typical in zero‑day operations and frequently drives the severity of downstream impact, particularly for large suites with complex patch cadences and customized integrations.

Clop Ransomware’s Mass‑Exfiltration Playbook

The Russia‑linked Clop group has been tied to widespread exploitation of enterprise software to exfiltrate data for use in extortion, with other efforts targeting managed file transfer tools like MOVEit, GoAnywhere, and Cleo. Independent tallies from incident‑response firms and nonprofit trackers added up in the MOVEit spree to breaches at over 2,700 organizations and more than 90 million individuals worldwide — a vivid example of how one systemic flaw can ripple through supply chains until entire sectors are affected.

The new Oracle‑linked activity is no different: exploiting an extremely widely used platform, emphasizing data theft over encryption, and strong‑arming victims with targeted communications that reference specific datasets. That tactic circumvents a slew of ransomware defenses and pushes legal, security, and executive teams into negotiating under the gun.

Oracle attacks hit dozens of organizations in new cyberattack wave

Why ERP Data Represents a High‑Value Target

ERP systems corral the most sensitive assets an organization has—salary histories, vendor bank data, purchase orders, and contact information for the C‑suite. One breach could expose compliance‑sensitive records across payroll, procurement, and customer service. For attackers, that concentration of data provides maximum leverage; for defenders, it means a breach can set off simultaneous legal, regulatory, and contractual requirements in multiple places.

To make matters worse, most E‑Business Suite installations also have extensive customizations and data warehouse, identity, and third‑party logistics provider interfaces. Those interconnections broaden the attack surface and can make it difficult to patch a system quickly, especially when a fix needs to go through regression testing or coordination with a vendor.

What Organizations Can Do Now to Reduce Oracle Risk

Security teams should check today whether Oracle E‑Business Suite components are exposed to the internet, and apply Oracle’s mitigations or fixes as advisories are prioritized. In cases where emergency patching isn’t possible, consider reducing exposure by limiting access to trusted networks and putting the vulnerable parts behind a zero‑trust gateway with strong authentication.

Defenders should also search for signs pointed to by Google and Oracle, such as unusual login attempts to supplier and self‑service modules, odd outbound traffic from application servers, or strange archive or export jobs. Check for HR‑ or customer file‑themed extortion emails in email gateways, and work with the legal and communications teams to proactively disarm any pressure tactics aimed at executives.

The Big Picture for Vendor Risk in Enterprise Suites

This is yet another example of how enterprise suites are high‑impact single points of failure. Boards and CISOs should now consider ERP patching and exposure management as a tier‑one risk alongside the likes of identity security and email security. Concurrency’s Greg Gomel found that protecting the environment “spans technical controls (monitoring the attack surface externally 24/7),” as well as SLAs around critical patch windows, network segmentation—especially around data‑rich modules—and tabletop exercises simulating data‑theft extortion, without encryption.

The blast radius for that kind of organization is not limited to IT; it includes everyone’s access and every business‑critical application. As investigators tally the number of victims, these operations offer no gentle lessons: when attackers can walk directly into your business‑critical applications without even knocking, the damage isn’t just collateral—it’s central. The companies that act with the most speed to minimize exposure, verify configurations, and operationalize threat intelligence will be in the greatest position to limit both data loss and its use as leverage in the next wave of extortion.

Bill Thompson
ByBill Thompson
Bill Thompson is a veteran technology columnist and digital culture analyst with decades of experience reporting on the intersection of media, society, and the internet. His commentary has been featured across major publications and global broadcasters. Known for exploring the social impact of digital transformation, Bill writes with a focus on ethics, innovation, and the future of information.
Latest News
Intel Announces the New 18A Processor Platform
Investing at the edge of Space at Disrupt 2025
Dia AI Browser Now Free For Mac with Windows Waitlist
Live Prime Day Under $25 Tech Deals Still Available
Last Call: Prime Day Smartwatch And Tracker Deals
Prime Day Laptop Deals That Are Still Live Now
10 Dyson Prime Day Deals That Are Still Live Right Now
AT&T Debuts Nationwide Standalone 5G With Slicing
Massive Samsung OLED Gaming Monitor Still $700 Off
YouTube Maps Road Back For Some Banned Creators
YouTube Creates Path To Return For Banned Creators
Italian Tycoon Is Hacked In a Spyware Campaign
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.