Thursday, March 19, 2026
Cybersecurity12 Oct 20253 min read

Google Confirms Oracle Breach Tied to CL0P Cybercrime Group

A significant breach affecting Oracle's E-Business Suite has been confirmed by Google. The attack, linked to the Russian cybercrime group CL0P, impacts over 100 companies globally.

Google Confirms Oracle Breach Tied to CL0P Cybercrime Group
Image via the420.in

Key Takeaways

  • 1."This marks a dangerous escalation in the wave of attacks targeting major enterprise systems in 2025," said a representative from GTIG.
  • 2.In a proactive response, Oracle urged global customers to apply the critical security update known as Oracle Security Alert CVE-2025-61882 just two days later.
  • 3."The attackers leveraged the applmgr account, a privileged system account within Oracle EBS, to perform outbound communications to command-and-control servers, exfiltrating critical business data in small, undetectable bursts," said one cybersecurity expert.

In a troubling development for enterprise cybersecurity, Google has verified that Oracle's E-Business Suite (EBS) has suffered a substantial breach attributed to the notorious cybercrime collective, CL0P. This revelation, made on October 12, 2025, comes in the wake of ongoing concerns surrounding security within major enterprise systems.

According to officials from Google’s Threat Intelligence Group (GTIG), the breach is particularly alarming as it stems from a software vulnerability, differentiating it from previous incidents that were often attributed to user misconfigurations. "This marks a dangerous escalation in the wave of attacks targeting major enterprise systems in 2025," said a representative from GTIG.

"This marks a dangerous escalation in the wave of attacks targeting major enterprise systems in 2025,"

Person using laptop with holographic cybersecurity shield and digital interface elements
Person using laptop with holographic cybersecurity shield and digital interface elements

The timeline for this breach began on September 29, 2025, when unusual activity was detected linked to CL0P's infrastructure. Within days, extortion emails began circulating, reaching hundreds of executives across various organizations and confirming that sensitive corporate data had been compromised.

Career Journey

Career Journey

Career Journey

Following early investigations, Oracle officially acknowledged the breach on October 2, revealing that the attackers likely exploited vulnerabilities patched in July 2025. In a proactive response, Oracle urged global customers to apply the critical security update known as Oracle Security Alert CVE-2025-61882 just two days later. The rapid response was vital since the breach resulted from a vulnerability within Oracle's own systems, posing a more significant threat compared to previous incidents like the Salesforce breach, where user-side issues were to blame.

Data center server room with multiple monitors displaying code and red LED lighting
Data center server room with multiple monitors displaying code and red LED lighting

The methodology used by CL0P in this attack was marked by stealth and precision. Security analysts believe that the group utilized sophisticated Java-based implants such as GOLDVEIN, SAGEGIFT, and SAGEWAVE to infiltrate Oracle systems. These implants execute within Oracle's database environment, deploying dynamic filters and template-based payload delivery, which complicates detection efforts.

"The attackers leveraged the applmgr account, a privileged system account within Oracle EBS, to perform outbound communications to command-and-control servers, exfiltrating critical business data in small, undetectable bursts," said one cybersecurity expert. Notably, Google highlighted that CL0P has yet to enumerate its victims on its public leak site, adhering to its customary strategy of delaying data publication while negotiations with the affected organizations occur.

"The attackers leveraged the applmgr account, a privileged system account within Oracle EBS, to perform outbound communications to command-and-control servers, exfiltrating critical business data in small, undetectable bursts,"

The implications of this breach are profound, as Oracle EBS is integral to the operations of thousands of companies worldwide, managing essential functions from financial transactions to supply chain logistics. Cybersecurity analysts warn that by targeting such a vital platform, hackers could gain potential access to a range of sensitive information.

As the landscape evolves, the sophistication of attacks continues to rise. "The use of zero-day exploits, in-memory payloads, and minimal lateral movement showcases CL0P’s increasing capabilities. Their strategy mirrors high-profile attacks from the past, but now there is a sharper focus on enterprise-grade applications," an analyst noted.

By the Numbers

By the Numbers

2025 has been a particularly turbulent year for enterprise cybersecurity, marked by the theft of over one billion Salesforce records alongside the Oracle breach. Analysts caution that the repercussions of such attacks could trigger widespread disruptions across various industries, impacting supply chains and government operations reliant on Oracle's ERP framework.

Looking Ahead

Despite the release of patches, specialists advocate for immediate implementation of updates, account segmentation, and ongoing threat monitoring to mitigate future risks. The consensus in the cybersecurity community is clear; vigilance is essential to prevent further incidents.

One cybersecurity analyst succinctly captured the essence of this transition: "The battlefield has moved inside the databases, and the attackers know it."