Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks
Briefly

Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks
"Google Threat Intelligence Group (GTIG) and Mandiant have continued to analyze the recent Oracle E-Business Suite (EBS) extortion campaign and their researchers have identified some of the pieces of malware deployed in the attacks. The attacks came to light on October 2, when GTIG and Mandiant warned that executives at many organizations using Oracle EBS had received extortion emails. It has since been determined that hackers likely exploited known EBS vulnerabilities patched in July, likely along with a zero-day flaw tracked as CVE-2025-61882."
"The hacker groups ShinyHunters and Scattered Spider (now calling themselves Scattered LAPSUS$ Hunters) have published a proof-of-concept (PoC) exploit that appears to target CVE-2025-61882, but it's still unclear which other CVEs are involved in the exploit chain. It's worth noting that even on its own, according to Oracle, CVE-2025-61882 allows unauthenticated remote code execution. CrowdStrike has found evidence that exploitation of CVE-2025-61882 started on August 9."
"A blog post published on Thursday by GTIG and Mandiant reveals that some suspicious activity was seen as early as July 10, right before Oracle published its July patches. GTIG and Mandiant have not obtained definitive proof, but they say it's plausible that the July 10 activity was an early attempt to exploit EBS servers. GTIG and Mandiant researchers have also analyzed the exploit chain and malware deployed in the Oracle EBS campaign."
GTIG and Mandiant continued analysis of an Oracle E-Business Suite (EBS) extortion campaign and identified malware used in the attacks. Executives at many organizations using Oracle EBS received extortion emails beginning October 2. Attackers likely exploited known EBS vulnerabilities patched in July and a zero-day tracked as CVE-2025-61882, which allows unauthenticated remote code execution. ShinyHunters and Scattered Spider published a PoC targeting CVE-2025-61882. CrowdStrike found exploitation evidence dating to August 9, and suspicious activity appeared as early as July 10. Attackers created malicious EBS templates storing payloads, including a downloader tracked as GoldVein.Java that attempts to fetch a second-stage payload.
Read at SecurityWeek
Unable to calculate read time
[
|
]