Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Hackers Target Unpatched Flaws in Oracle E-Business Suite
News

Hackers Target Unpatched Flaws in Oracle E-Business Suite

Team-CWDBy Team-CWDOctober 3, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Oracle has advised customers that hackers may be exploiting vulnerabilities in unpatched instances of its E-Business Suite (EBS).

This follows a warning by the Google Threat Intelligence Group (GTIG) that an individual or group of hackers were sending extortion emails to executives in several companies, claiming to have stolen sensitive data from Oracle’s EBS.

Oracle is aware that some Oracle EBS customers have received extortion emails, Rob Duhart, Oracle Security’s CSO, confirmed in a statement published October 2.

“Our ongoing investigation has found the potential use of previously identified vulnerabilities that are addressed in the July 2025 Critical Patch Update,” said Duhart, urging customers to apply the patches.

Nine Oracle E-Business Suite Flaws to Patch Now

Oracle’s July 2025 critical patch update was a major security advisory where the business software provider released patches for 309 vulnerabilities across its product range.

These included nine flaws affecting its E-Business Suite. Three are critical and three others are exploitable remotely without authentication.

Here is the full list, from most to least severe:

  • CVE-2025-30743 (CVSS: 8.1):  vulnerability in Oracle Lease and Finance Management, no remote exploit without authentication
  • CVE-2025-30744 (CVSS: 8.1): vulnerability in Oracle Mobile Field Service, no remote exploit without authentication
  • CVE-2025-50105 (CVSS: 8.1): vulnerability in Oracle Universal Work Queue, no remote exploit without authentication
  • CVE-2025-50071 (CVSS: 6.4): vulnerability in Oracle Applications Framework, no remote exploit without authentication
  • CVE-2025-30746 (CVSS: 6.1): vulnerability in Oracle iStore, possibility of remote exploit without authentication
  • CVE-2025-30745 (CVSS: 6.1): vulnerability in Oracle MES for Process Manufacturing, possibility of remote exploit without authentication
  • CVE-2025-50107 (CVSS: 6.1): vulnerability in Oracle Universal Work Queue, possibility of remote exploit without authentication
  • CVE-2025-30739 (CVSS: 5.5): vulnerability in Oracle CRM Technical Foundation, no remote exploit without authentication
  • CVE-2025-50090 (CVSS: 5.4): vulnerability in Oracle Applications Framework, no remote exploit without authentication

Google Probes Large-Scale Email Extortion Campaign

Researchers from Mandiant and GTIG contacted Infosecurity on October 2, saying they were investigating a large-scale email campaign linked to hundreds of compromised accounts. 

Charles Carmakal, CTO of Mandiant at Google Cloud, noted that the campaign appears to be high-volume, with preliminary analysis tying at least one of the accounts to FIN11, a financially motivated threat group known for ransomware attacks and extortion schemes. 

While the investigation is ongoing, the evidence so far suggests the attackers may be leveraging established cybercriminal infrastructure.

The malicious emails include contact details that match addresses listed on the Clop ransomware group’s data leak site (DLS), hinting at a possible connection to the notorious gang. 

However, Carmakal cautioned that this does not confirm Clop’s direct involvement, only that the attackers are exploiting the group’s reputation to amplify pressure on victims. 

Such tactics are common in financially driven cybercrime, where threat actors often impersonate or mimic well-known ransomware brands to enhance credibility and coercion.

Given the complexities of attribution in cybercrime, Carmakal emphasized that the campaign could be the work of copycats rather than Clop itself. 

He advised affected organizations to proactively investigate their systems for signs of compromise, as the use of Clop’s branding may be a deliberate strategy to maximize intimidation. 

Read more: Fraudsters Impersonate Clop Ransomware to Extort Businesses



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCisco Warns of Actively Exploited SNMP Vulnerability Allowing RCE or DoS in IOS Software
Next Article Malicious Rust Crates Steal Solana and Ethereum Keys — 8,424 Downloads Confirmed
Team-CWD
  • Website

Related Posts

News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

2025’s most common passwords were as predictable as ever

January 21, 2026

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

Beware of Winter Olympics scams and other cyberthreats

February 2, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.