The Clop ransomware group has conducted one of the largest extortion campaigns of 2025-2026, exploiting zero-day vulnerabilities in Oracle E-Business Suite (EBS) to breach nearly 100 organizations worldwide. Victims include major enterprises such as Allianz UK, GlobalLogic (Hitachi), Envoy Air (American Airlines), Harvard University, The Washington Post, and Logitech.

Campaign overview

AttributeDetails
Threat actorClop (CL0P) / GRACEFUL SPIDER
Primary CVECVE-2025-61882 (CVSS 9.8)
Secondary CVECVE-2025-61884 (CVSS 7.5)
Exploitation startJuly 10, 2025 (suspected)
Confirmed zero-day exploitationAugust 9, 2025
Victims~100 organizations
Ransom demandsUp to $50 million
DiscoveryGoogle Threat Intelligence, Mandiant, CrowdStrike

Timeline

DateEvent
July 10, 2025Earliest suspicious activity detected
August 9, 2025Confirmed zero-day exploitation begins
September 29, 2025Google/Mandiant begin tracking campaign
October 11, 2025Oracle releases emergency patch for CVE-2025-61884
October 2025Oracle patches CVE-2025-61882
November 2025Mass victim notifications begin
January 2026Dartmouth College, University of Pennsylvania confirm breaches
February 2026Campaign continues; data leaked via Torrent

The vulnerabilities

CVE-2025-61882 (Critical)

AttributeValue
CVSS score9.8 (Critical)
ComponentBI Publisher Integration (Concurrent Processing)
Attack vectorRemote, unauthenticated
ImpactArbitrary code execution
Affected versionsOracle EBS 12.2.3 - 12.2.14

The vulnerability allows execution of arbitrary code remotely via HTTP without any authentication. No password required, no prior login necessary—simple network access to the EBS server is enough for full control.

CVE-2025-61884 (High)

AttributeValue
CVSS score7.5 (High)
ComponentOracle Configurator Runtime UI
Attack vectorRemote, unauthenticated
ImpactSensitive configuration data access
EndpointUiServlet
CISA KEVAdded immediately upon disclosure

This secondary vulnerability allows remote attackers to access sensitive configuration data without authentication.

Confirmed victims

Financial services

OrganizationSubsidiaryImpact
Allianz UKLiverpool Victoria (LV=)750 customers affected
Other insurersMultipleUnder investigation

Allianz UK confirmed 80 current customers and 670 previous customers were affected. The attackers accessed systems managing home, car, pet, and travel insurance policies.

Technology and services

OrganizationParent companyStatus
GlobalLogicHitachiThousands of employees notified
LogitechN/AData leaked

GlobalLogic notified thousands of employees about the compromise and implemented Oracle’s recommended mitigations.

Transportation

OrganizationParent companyData affected
Envoy AirAmerican AirlinesNo sensitive/customer data (confirmed)

Envoy Air stated: “We have conducted a thorough review of the data at issue and have confirmed no sensitive or customer data was affected.”

Education

InstitutionRecords affectedStatus
Harvard UniversityUnknownData leaked
Dartmouth College40,000+Confirmed breach
University of PennsylvaniaUnknownConfirmed breach

Media

OrganizationStatus
The Washington PostData leaked, available via Torrent

Attack methodology

Exploitation chain

PhaseAction
1Scan for internet-exposed Oracle EBS instances
2Exploit CVE-2025-61882 for initial access
3Establish persistence
4Exfiltrate sensitive data
5Deploy extortion notice
6Leak data if ransom not paid

Data-only extortion model

Unlike traditional ransomware that encrypts files, Clop’s Oracle EBS campaign follows their evolved data theft and extortion model:

Traditional ransomwareClop Oracle EBS campaign
Encrypt filesNo encryption
Demand decryption paymentDemand payment to prevent leak
Operational disruptionMinimal operational impact
Rapid detectionSlower detection (exfiltration only)

This approach mirrors Clop’s previous MOVEit campaign tactics.

Attribution

CrowdStrike assessment

CrowdStrike tracks the campaign with moderate confidence attribution to GRACEFUL SPIDER (Clop), noting they “cannot rule out the possibility that multiple threat actors have exploited CVE-2025-61882.”

Google/Mandiant assessment

Google Threat Intelligence Group and Mandiant confirmed the campaign is conducted by actors “claiming affiliation with the CL0P extortion brand.”

Clop’s history of mass exploitation

CampaignYearVulnerabilityVictims
Accellion FTA2021CVE-2021-27101, etc.~100
GoAnywhere MFT2023CVE-2023-0669~130
MOVEit Transfer2023CVE-2023-34362~2,700 organizations, 95M individuals
Oracle EBS2025-2026CVE-2025-61882, CVE-2025-61884~100

The Oracle EBS campaign follows Clop’s established pattern of exploiting enterprise file transfer and ERP software zero-days for mass data theft.

Ransom demands

FactorDetails
Maximum demand reported$50 million
Payment methodCryptocurrency
NegotiationVia Clop leak site
Data releaseTorrent links if unpaid

According to Halcyon, Clop’s ransom demands in this campaign reached up to $50 million for some victims.

Detection and hunting

Network indicators

Indicator typeWhat to monitor
Oracle EBS accessUnusual queries to BI Publisher endpoints
Data exfiltrationLarge outbound transfers from EBS servers
External accessInternet-facing EBS instances
C2 trafficConnections to known Clop infrastructure

Log analysis

Log sourceSearch for
Oracle EBS audit logsUnauthorized access patterns
Web server logsRequests to vulnerable endpoints
Network logsLarge data transfers to external IPs
Authentication logsFailed/anomalous login attempts

Remediation

Immediate actions

PriorityAction
CriticalApply Oracle October 2025 CPU patches
CriticalVerify EBS is not internet-exposed
HighReview audit logs for exploitation indicators
HighEngage incident response if compromise suspected

Patch verification

CVEPatch source
CVE-2025-61882Oracle Critical Patch Update (October 2025)
CVE-2025-61884Oracle emergency patch (October 11, 2025)

Long-term hardening

ControlPurpose
Network segmentationIsolate EBS from internet
Web application firewallFilter malicious requests
Data loss preventionDetect exfiltration attempts
Regular patchingApply CPU updates promptly

Recommendations

For organizations running Oracle EBS

PriorityAction
CriticalConfirm patches applied for both CVEs
CriticalVerify no internet exposure
HighConduct threat hunting for IOCs
HighReview data access logs since July 2025
MediumEngage third-party assessment if uncertain

For potentially affected organizations

PriorityAction
CriticalAssume breach if unpatched during exploitation window
HighEngage incident response
HighPrepare breach notification
HighMonitor Clop leak site for data appearance
MediumConsider legal and regulatory obligations

Context

The Clop Oracle EBS campaign demonstrates the group’s continued focus on enterprise software zero-days as a mass exploitation vector. Following their devastating MOVEit campaign in 2023, Clop has refined their approach to target widely-deployed enterprise applications where a single vulnerability can yield access to dozens or hundreds of organizations.

The campaign’s targeting of financial services (Allianz UK), technology companies (GlobalLogic, Logitech), transportation (Envoy Air), education (Harvard, Dartmouth, Penn), and media (Washington Post) shows Clop’s opportunistic approach—any organization running vulnerable Oracle EBS was a potential target.

Organizations using Oracle E-Business Suite should verify patching status immediately and assume potential compromise if systems were internet-accessible during the exploitation window (July-October 2025).