A new wave of extortion attacks linked to the Clop ransomware group has recently shaken organizations using Oracle E-Business Suite (EBS), bringing urgent attention to the critical importance of patch management and data protection in business operations.
What Happened?
Since late September 2025, hundreds of Oracle E-Business Suite customers across industries have received sophisticated extortion emails. Attackers claim to have stolen sensitive business data from EBS environments and threaten to publicly release it unless multi-million dollar ransoms are paid. Evidence, such as sample files or internal records, is offered to recipients as “proof” to amplify fear and urgency.
Technical Breakdown
The campaign exploits multiple remotely accessible vulnerabilities patched by Oracle in its July 2025 Critical Patch Update (notably CVE-2025-30745, CVE-2025-30746, and CVE-2025-50107). Attackers have targeted businesses that had not yet applied the latest security fixes, leveraging common EBS misconfigurations and default settings to access data through compromised credentials and password reset flaws.
Who is Behind the Attacks?
The campaign is attributed by both Oracle and independent threat analysts to FIN11, a cybercriminal group widely associated with Clop ransomware. Their tactics have evolved from deploying ransomware payloads toward data theft, exfiltration, and direct extortion, especially focusing on mission-critical enterprise software like Oracle EBS.
Impacted Organizations
- Fortune 500 companies
- Healthcare providers
- Logistics and supply chain operators
- Financial services firms
- Government agencies
While the total number of confirmed data theft incidents is still being assessed, several organizations have validated that their information was exposed[16]. The attackers’ strategy involves contacting senior executives and technical contacts with targeted ransom demands and tailored threats.
Defense and Response Steps
- Immediate Patching: Apply all updates from Oracle’s July 2025 CPU without delay. Unpatched systems remain highly vulnerable.
- Audit EBS Environments: Thoroughly review access logs and authentication workflows for signs of suspicious activity or credential misuse.
- Monitor for Extortion Attempts: Alert executive and IT teams to any direct contact from threat actors and preserve all evidence for investigation.
- Engage Incident Response: Escalate to cybersecurity, legal, and law enforcement professionals if targeted, and avoid engaging with demands directly.
- Educate and Communicate: Proactively inform users and partners about risks and technical solutions to increase organizational resilience.
Lessons Learned
This incident underscores the growing threat to ERP and critical business platforms from advanced extortion groups. Sophisticated actors like Clop are increasingly targeting unpatched vulnerabilities and relying on large-scale data theft over traditional ransomware encryption strategies. Oracle EBS customers must make vulnerability management and incident preparedness a top priority to protect sensitive business data from disruption or loss.
Final Thoughts
As threat actors continue to innovate, defending against extortion requires a proactive security posture and swift response strategies. Staying informed, patching immediately, and collaborating with trusted partners is the most effective path to reducing risk and limiting business impact from campaigns like the Clop Oracle EBS attacks.