#clop

[ follow ]
fromTheregister
14 hours ago

NHS confirms investigation into Clop cyberattack claim

The cybercriminal gang, which in recent months has targeted organizations using an Oracle E-Business Suite (EBS) exploit, added the NHS to its leak site on November 11, but has yet to publish any data. Clop simply lists the NHS.uk domain, but does not specify which of the myriad branches of the UK's healthcare system it breached. It also listed the NHS's revenue as $234 billion, which appears to be a crude calculation taken from the Department of Health and Social Care's budget.
Information security
#oracle-e-business-suite
Privacy professionals
fromTheregister
1 month ago

Clop raid on Oracle EBS started months ago, say researchers

Clop exploited multiple Oracle E-Business Suite vulnerabilities since August 2025, stole data, sent extortion demands, and public proof-of-concept exploit code now enables widespread attacks.
Information security
fromTechzine Global
1 month ago

Oracle patches actively exploited zero-day vulnerability in E-Business Suite

A critical unauthenticated remote-code-execution zero-day (CVE-2025-61882) in Oracle E-Business Suite was actively exploited by Clop; Oracle released an emergency patch.
Information security
fromTechzine Global
1 month ago

Emergency patch for vulnerability in Oracle E-Business Suite

Critical Oracle E-Business Suite vulnerability CVE-2025-61884 allows unauthenticated attackers to disclose sensitive data across EBS versions 12.2.3–12.2.14; urgent patching recommended.
Information security
fromTechCrunch
1 month ago

Hackers are sending extortion emails to executives after claiming Oracle apps' data breach | TechCrunch

Clop-linked hackers claim to have stolen sensitive data from Oracle E-Business Suite and are sending extortion emails to executives at numerous large organizations.
fromTheregister
1 month ago

Clop-linked crims shake down Oracle with data theft claims

Google's Threat Intelligence Group (GTIG) and Mandiant are tracking the "high-volume" activity, which began last month, and are investigating whether there is any truth to the attackers' boasts. In a statement to The Register, Genevieve Stark, head of cybercrime and information operations intelligence analysis at GTIG, said: "This activity began on or before September 29, 2025, but Mandiant's experts are still in the early stages of multiple investigations, and have not yet substantiated the claims made by this group."
Information security
[ Load more ]