Cl0p ransomware extortion gang have a zero day in Oracle E-Business Suite (component: BI Publisher Integration) - which they’ve been exploiting since last month to steal data.

https://www.bleepingcomputer.com/news/security/oracle-patches-ebs-zero-day-exploited-in-clop-data-theft-attacks/

Oracle patches EBS zero-day exploited in Clop data theft attacks

Oracle is warning about a critical E-Business Suite zero-day vulnerability tracked as CVE-2025-61882 that allows attackers to perform unauthenticated remote code execution, with the flaw actively exploited in Clop data theft attacks.

BleepingComputer
A few days ago Oracle, via the media, blamed their own customers for not installing a July security update.. then when the media coverage stopped, quietly released a new security update for the actual exploited vulnerability. 🥴
Here's the original Oracle explanation - before the post mysteriously disappeared (even from Internet Archive etc).

The craziest part of the Oracle story is they got the exploit chain via... LAPSUS$.

Before Oracle had an advisory, on Telegram LAPSUS$ posted a working zero day exploit - dated May 2025.

Yes, the teenagers at LAPSUS$ know more about Oracle's security vulnerabilities than Oracle.

-rw-r----- 1 root root 3713 Jun 15 18:19 exp.py
-rw-r--r-- 1 root root 2749 Oct 3 14:54 readme.md
-rw-r----- 1 root root 2651 May 16 10:07 server.py

Having large corporations pay hundreds of millions of US dollars in Bitcoin to teenagers to cover up their data breaches is fucking stupid by the way, as said teens then spend the bitcoin on exploits* - we're in a race to the bottom to arm teens with rocket launchers.

* one of the LAPSUS kids also allegedly ordered pizza to his nans house with bitcoin

APTs aren't nation states anymore, they're Advanced Persistent Teenagers as covering up breaches has lowered the bar. Global gov inaction.

@GossiTheDog LAPSUS$? More like LAPSUS₿.

@GossiTheDog > * one of the LAPSUS kids also allegedly ordered pizza to his nans house with bitcoin

That's the most 2025 sentence I have ever read

@GossiTheDog
"Advanced Persistent Teenagers"
you made my day. 😂
@GossiTheDog Its even more funny they don't even buy exploits that often (rather sell them) its a brain-race between the old capitalists and young bored digital-native teenagers xD check out stuff like darknetdiaries podcast (especially the xbox underground episodes for example) for more fun in that department ;)
Edit: and we don't "arm" teenagers. the old gov officials are just fighting with rocks and sticks against tanks ;) Tho your right with providing them with alot of cash does not help the problem.
@GossiTheDog btw. it gets quite obvious cause the most incredible hacks where the ones done by teenagers. without anything criminal before the hack that made them publicly immortal, so no cash but time and knowledge. or a skill to just RTFM xD

@snornik it really is wild what access a teenager has to the world, these days. I mean, I poked around and did things way back when, but there was so much less to exploit.

@GossiTheDog

@bobdobberson @GossiTheDog
What in what days did you poke around? 2000 was basically a free for all deathmatch xD

@snornik I missed out on that, I was keeping my nose clean in those days, and avoiding tempting knowledge that might get me behind bars.

@GossiTheDog

@bobdobberson @GossiTheDog
I do get that... but modem times, pre DSL routers. no firewalls. remote exploits of win95 win98 xp. so many weak servers. its was hilarious. got better tho, way way better. still it was way more wild what you could do early 2k. than now.
@bobdobberson @GossiTheDog
but the attack surface changed. back then it was fun, but not much damage. but the data hoarding makes it way more valuable today thats for sure! and thats not the kids fault! if companies wouldn't hoard massive databank's to monetize them. kids wouldn't have a harder but way more valuable surface.

@snornik no doubt, however there were far fewer things on 'the net' to begin with.

And yeah, you get to the point near the end there; smaller attack surface, not as much infrastructure to get into, possible to get in through someone's modem, but modem -> net -> modem was painfully slow.

I also think there's more of an enticing cat-n-mouse challenge these days, as security has changed and learned a lot since the modem days. hell, we used to use rsh, or telnet.

@GossiTheDog

@bobdobberson @GossiTheDog check out kevin mitnick's books.. back then was much much more to capture but different stuff like military, secret services etc. yeah security has changed but companies didn't. the vulnerable systems got less but are now much more valuable if you get one. it got much worse in that department. cause of data hoarding about millions on a single server. or a "cloud" or rather the whole cloud nonsense. catch one capture all is today's markup
@bobdobberson @GossiTheDog
in 2k even if there was a interesting server. it was not a catch-all with a single takeover.
@bobdobberson @GossiTheDog also telnet was not inertly insecure. if there wasnt a exploit out in the wild. they were just unencrypted. ftp was truly a easier and much more valuable target (and also unencrypted), not only by common exploits out in the wild but also cause of the files.. there is always a work/profit balance. 2k was easier but way less profit. the profit margins of a takeover are in my humble opinion the problem nowadays. ransomware would not exist if there would be not enough to demand a ransom about.

@snornik getting access to a router rsh or telnet was going through got access to passwords. *shrug*

FTP holds a soft spot in my heart as I once caught an MP3 release crew in a honey-pot and hosted for them for a while. They were some interesting folks.

@GossiTheDog

@bobdobberson @GossiTheDog
i am taking before routers existed *shrug* yeah open telnet on a router .... got damn i never have bought such a thing. btw. hosting a mp3 release group is punishable way harder than accessing a company. copyright is just sick
@bobdobberson @GossiTheDog
just FYI. to copy and sell a movie in germany is punished harder than pedophilia -.- for who knows what shitty reason. okay sry i know the reason cause money is worth more than a life.

@snornik I feel that. It's really a shame that we've allowed corporations to have such control over things.

@GossiTheDog

@bobdobberson @GossiTheDog
to come back to the original topic: at least there are the teens to put them into perspective xD I'm proud sometimes. those who didn't got it 40 years ago will never. but 15 year olds can punish them like its a joke today.

@snornik I think it's a shame that the fallout from all of these exploits and hacks tends to affect the people, not the corporations.

@GossiTheDog

@bobdobberson @GossiTheDog nah it does affect them it costs either alot of cash or loss of trust, corporate identity and customers. problem is alot of companies dont care, dont realise data hoarding is dangerous. fuck every privacy right of all humans. dont patch and don't spend any money on professionals until its to late. not the fault of the kids.

@snornik Kevin Mitnick also got caught. ;)

Security is difficult and security costs money and companies are cheap.

That they do spend any money on security is probably what keeps it fun for the kids. It's a cat-n-mouse game these days.

Back in the day, you could probably sit on a mil server for months and do loud port-scans without raising any eyebrows.

@GossiTheDog

@GossiTheDog I'm using a screenshot of your post in a story today. Thanks!

@briankrebs @GossiTheDog

omg path canonicalization is one of the first things we fixed in honey danber uucp … in 1983

@GossiTheDog I cannot stress enough how deceptive this tactic is.

First, Oracle gaslight their own customers into "if something happens, it's because you haven't patched". Then, after downloading a zero-day off Telegram finding out that they have been pwned by Scattered Lapsus$ Hunters, they quitely edit out the previous content.

And this is not some anonymous marketing writer, but the Chief Security Officer for one of the biggest corporations on the globe.

1/2

@christopherkunz @GossiTheDog it wouldn't be their first, right?
@mr0vka @GossiTheDog Certainly not, hence my ire. Not much longer than half a year ago, Oracle Classic Cloud "lost" data in an incident that had me look on web.archive.org and despair at Oracle's wordsmithing: https://heise.de/-10336366 I think this is a system, not a one-off occurrence.
Data leak at Oracle: Up to 2000 German victims? What is known and what is not

Data from the "Oracle Classic" cloud is for sale on the darknet. Analysts agree: the data is genuine. But some pieces of the puzzle are still missing.

heise online
@GossiTheDog It's always '../', isn't it?

@icing @GossiTheDog

Oh for.... oh my god.

Nineteen Ninety Seven phoned and want their shitty path traversal bugs back!
Lets just throw in an SQL injection `DROP TABLE;` or buffer overrun while we're at it.

sigh.

@GossiTheDog No way! Surely Oracle's software doesn't have bugs, let alone stupid bugs like this. They told us so 10 years ago:

https://web.archive.org/web/20150811090106/https://blogs.oracle.com/maryanndavidson/entry/no_you_really_can_t

(Archived, because the original has disappeared from Oracle's site, for some unfathomable reason.)

No, You Really Can’t (Mary Ann Davidson Blog)

Blogs.Oracle.Com - Mary Ann Davidson Blog

@GossiTheDog Respectfully disagree lol. Compared to other straightforward bug analyses published by watchtowr, this exploit chain is pretty impressive, so no shame to Oracle.

Path traversal is nice and somewhat expected, but you don't see the double CLRF keep-alive trick everyday.

@GossiTheDog After reading the entire exploit chain, I was honestly quite surprised by the level of creativity.

@frycos @GossiTheDog now I'm just wondering how they initially got the source code for EBS...because that chain looks pretty unlikely to be discoverable without source code access.

Did they pwn Oracle directly or was EBS running on prem at one of their previous targets

CrowdStrike Identifies Campaign Targeting Oracle E-Business Suite via Zero-Day Vulnerability Tracked as CVE-2025-61882

CrowdStrike is tracking a mass exploitation campaign almost certainly leveraging a novel zero-day vulnerability – now tracked as CVE-2025-61882 – targeting Oracle E-Business Suite (EBS) applications for the purposes of data exfiltration.

CrowdStrike.com
@GossiTheDog Crikey. Especially the rather crappy authentication-whitelist-filter, not canonicalising the input first. Ouch!

@GossiTheDog

curl is more powerful than Oracle.

ping @bagder

@GossiTheDog and this is the company that the government has paid a bazillion dollars to write the software and move the VA EHR system over too.

I suspect it's only a matter of time after the rollout before all of our military medical records will be breached.

@GossiTheDog well to be fair it’s in the middle of a wild exploit chain.

@GossiTheDog ah classic Oracle. The same Oracle whose CISO had a meltdown and threatened to sue any security researchers who were obviously using their products against the license agreement.

Ref: https://www.itnews.com.au/news/oracle-cso-blasted-over-anti-security-research-rant-407776

Oracle CSO blasted over anti-security research rant

Throws licence agreement book at those who test for flaws.

iTnews
@GossiTheDog Oracle, not even once
@GossiTheDog "Yes we didn't have a fix for the issue, but you wouldn't install it anyway". Bold strategy.

@GossiTheDog

Make automatic updates mandatory 😉👍

@simonzerafa @GossiTheDog, … what could possibly go wrong.
@GossiTheDog Ah yes, 'one real arsehole called Larry Ellison' strikes again.
@GossiTheDog Oracle have always been spectacular at hiding anything and everything into the news cycle or some fancy gaslighting…

@GossiTheDog They replaced the whole blog post and somehow purged copies from WBM. However, they forgot to change the SEO URL which still hints at their original narrative: "Apply July 2025 CPU".

Cl0p had it, SLSH has it, and if the indicators on the exp aren't faked, they have had it since May or so. And now, everyone has it, I expect it to make CISA KEV by tomorrow.

...and I was right:
CVE-2025-61882 Oracle E-Business Suite Unspecified Vulnerability has been included in the KEV last night.
@GossiTheDog Oracle does not have customers, only hostages.