Dark Mode Light Mode

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Use

๐Ÿšจ Data Breach: Organizations Hacked via Oracle Vulnerabilities ๐Ÿšจ

โ€˜Dozensโ€™ of organizations had data stolen in Oracle-linked hacks โ€˜Dozensโ€™ of organizations had data stolen in Oracle-linked hacks

Security researchers at Google say hackers targeting corporate executives with extortion emails have stolen data from โ€œdozens of organizations,โ€ one of the first signs that the hacking campaign may be far-reaching.

The tech giant said Thursday in a statement shared with TechCrunch that the Clop extortion gang exploited multiple security vulnerabilities in Oracleโ€™s E-Business Suite software to steal significant amounts of data from affected organizations.

Oracleโ€™s E-Business software allows companies to run their operations, such as storing their customer data and their employeesโ€™ human resources files.ย 

Google said in a corresponding blog post that the hacking campaign targeting Oracle customers dates back to at least July 10, some three months before the hacks were first detected.ย 

Oracle conceded earlier this week that the hackers behind the extortion campaign were still abusing its software to steal personal information about corporate executives and their companies. Days earlier, Oracleโ€™s chief security officer, Rob Duhart, claimed in the same post โ€” since scrubbed โ€” that the extortion campaign was linked to previously identified vulnerabilities that Oracle patched in July, suggesting the hacks were over.

But in a security advisory published over the weekend, Oracle said the zero-day bug โ€” named because Oracle had no time to fix the bug, as it was already being exploited by hackers โ€” can be โ€œexploited over a network without the need for a username and password.โ€ย 

The Russia-linked Clop ransomware and extortion gang has made a name for itself in recent years for mass-hacking campaigns, often involving the abuse of vulnerabilities unknown to the software vendor at the time they were exploited, to steal large amounts of corporate and customer data. This includes managed file transfer tools, like Cleo, MOVEit, and GoAnywhere, which companies use as a way to send sensitive corporate data over the internet.

Googleโ€™s blog post includes email addresses and other technical details that network defenders can use to look for extortion emails and other indications that their Oracle systems may have been compromised.

Source link

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Use
Add a comment Add a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post
Sora copycats flooded Apple's App Store, and some still remain

๐Ÿšซ Beware of Fake Sora Apps on Apple's App Store! ๐Ÿ•ต๏ธโ€โ™€๏ธ

Next Post
Reflection raises $2B to be America's open frontier AI lab, challenging DeepSeek

Reflection AI Secures $2B Funding! ๐Ÿš€