Cl0p ransomware extortion gang have a zero day in Oracle E-Business Suite (component: BI Publisher Integration) - which they’ve been exploiting since last month to steal data.

https://www.bleepingcomputer.com/news/security/oracle-patches-ebs-zero-day-exploited-in-clop-data-theft-attacks/

Oracle patches EBS zero-day exploited in Clop data theft attacks

Oracle is warning about a critical E-Business Suite zero-day vulnerability tracked as CVE-2025-61882 that allows attackers to perform unauthenticated remote code execution, with the flaw actively exploited in Clop data theft attacks.

BleepingComputer
A few days ago Oracle, via the media, blamed their own customers for not installing a July security update.. then when the media coverage stopped, quietly released a new security update for the actual exploited vulnerability. 🥴
Here's the original Oracle explanation - before the post mysteriously disappeared (even from Internet Archive etc).

The craziest part of the Oracle story is they got the exploit chain via... LAPSUS$.

Before Oracle had an advisory, on Telegram LAPSUS$ posted a working zero day exploit - dated May 2025.

Yes, the teenagers at LAPSUS$ know more about Oracle's security vulnerabilities than Oracle.

-rw-r----- 1 root root 3713 Jun 15 18:19 exp.py
-rw-r--r-- 1 root root 2749 Oct 3 14:54 readme.md
-rw-r----- 1 root root 2651 May 16 10:07 server.py

Having large corporations pay hundreds of millions of US dollars in Bitcoin to teenagers to cover up their data breaches is fucking stupid by the way, as said teens then spend the bitcoin on exploits* - we're in a race to the bottom to arm teens with rocket launchers.

* one of the LAPSUS kids also allegedly ordered pizza to his nans house with bitcoin

APTs aren't nation states anymore, they're Advanced Persistent Teenagers as covering up breaches has lowered the bar. Global gov inaction.

@GossiTheDog Also, last night I received a booby-trapped email that mentioned lapsuss scattered hunters and threatened physical violence unless demands were met. Visiting the link (I didn't) launches a Windows screenshot file that loads a commercial trojan/backdoor. Mandiant confirmed several other researchers and security firms got similar messages around the same time. More details in a story just published, here: https://krebsonsecurity.com/2025/10/shinyhunters-wage-broad-corporate-extortion-spree/
ShinyHunters Wage Broad Corporate Extortion Spree – Krebs on Security

@GossiTheDog Also, I feel compelled to expand on your reference to rocket launchers to note that one of the Com members who was closely involved in a broad range of telecom breaches very much did attempt to purchase a rocket launcher. His attempts to purchase a Stinger missile were foiled when Turkish authorities put him in prison.

"In several online chats in late 2023 on Discord, IRDev lamented being lured into a law enforcement sting operation after trying to buy a rocket launcher online. A person close to the investigation confirmed that at the beginning of 2023, IRDev began making earnest inquiries about how to purchase a Stinger, an American-made portable weapon that operates as an infrared surface-to-air missile."

"Sources told KrebsOnSecurity Binns’ repeated efforts to purchase the projectile earned him multiple visits from the Turkish authorities, who were justifiably curious why he kept seeking to acquire such a powerful weapon."

https://krebsonsecurity.com/2024/11/canadian-man-arrested-in-snowflake-data-extortions/

Canadian Man Arrested in Snowflake Data Extortions – Krebs on Security