The **Cl0p ransomware gang** breached **Broadcom**, a $300+ billion semiconductor and infrastructure software leader, by exploiting an **unpatched zero-day vulnerability in Oracle E-Business Suite**. This ERP platform manages critical operations, including **supply chain, financial systems, and customer data**, making it a high-value target. The attackers likely **exfiltrated sensitive corporate data** (potentially including **intellectual property, manufacturing secrets, and customer information**) before deploying ransomware, following Cl0p’s typical double-extortion tactic. The breach risks **operational disruptions in global manufacturing**, **regulatory penalties for data exposure**, and **reputational damage** due to the involvement of a notorious ransomware group. The use of a **zero-day exploit** amplifies the threat, as other organizations using Oracle E-Business Suite may face similar attacks until a patch is released. Broadcom has not confirmed the incident, but the alleged compromise aligns with Cl0p’s pattern of targeting **high-value enterprises** via unpatched vulnerabilities in widely used software.
Source: https://gbhackers.com/clop-ransomware-claims-broadcom-breach/
Broadcom cybersecurity rating report: https://www.rankiteo.com/company/broadcom
"id": "BRO0893008112125",
"linkid": "broadcom",
"type": "Ransomware",
"date": "5/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization’s existence"
{'affected_entities': [{'industry': ['semiconductor manufacturing',
'infrastructure software'],
'location': 'global (HQ: San Jose, California, USA)',
'name': 'Broadcom Inc.',
'size': '$300+ billion market cap',
'type': 'public company'}],
'attack_vector': ['zero-day vulnerability in Oracle E-Business Suite',
'arbitrary code execution',
'lateral movement',
'credential theft',
'data exfiltration'],
'data_breach': {'data_exfiltration': ['claimed by Cl0p (typical tactic before '
'ransomware deployment)'],
'sensitivity_of_data': ['high (enterprise resource planning '
'data)',
'potentially confidential '
'(manufacturing, R&D)'],
'type_of_data_compromised': ['potential: corporate data '
'(supply chain, financial, '
'customer)',
'intellectual property (research '
'data)']},
'description': 'The Cl0p ransomware gang has publicly claimed responsibility '
'for breaching Broadcom, a leading semiconductor and '
'infrastructure software company. The attackers allegedly '
'exploited an unpatched zero-day vulnerability in Oracle '
'E-Business Suite to gain initial access. The incident follows '
'a pattern of Cl0p targeting high-value enterprise systems '
'using zero-day and known vulnerabilities. Broadcom has not '
'issued an official statement, and the claim remains '
'unverified by independent security researchers. The '
'vulnerability allows arbitrary code execution, persistent '
'access, and lateral movement across corporate networks. Cl0p '
'is known for combining zero-day exploitation with credential '
'theft and data exfiltration before deploying ransomware.',
'impact': {'brand_reputation_impact': ['high (targeting a $300B+ company)',
'potential loss of trust in supply '
'chain security'],
'legal_liabilities': ['potential regulatory compliance violations '
'(e.g., data protection laws)'],
'operational_impact': ['potential disruption of manufacturing '
'operations',
'supply chain interruptions',
'global infrastructure risks'],
'systems_affected': ['Oracle E-Business Suite',
'supply chain operations',
'financial systems',
'customer data',
'manufacturing operations',
'research data']},
'initial_access_broker': {'backdoors_established': ['likely (Cl0p tactic for '
'persistence)'],
'entry_point': 'unpatched zero-day vulnerability in '
'Oracle E-Business Suite',
'high_value_targets': ["Broadcom's manufacturing "
'operations',
'research data',
'customer information',
'supply chain systems']},
'investigation_status': 'unverified (claimed by Cl0p, no official statement '
'from Broadcom; independent verification pending)',
'lessons_learned': ['Zero-day vulnerabilities in enterprise software (e.g., '
'Oracle E-Business Suite) pose severe risks due to lack '
'of patches at exploitation time.',
'High-value targets (e.g., semiconductor manufacturers) '
'are prioritized by ransomware groups like Cl0p for '
'maximum impact.',
'Proactive measures (e.g., network segmentation, EDR, '
'threat intelligence monitoring) are critical for '
'mitigating zero-day risks.',
'Supply chain and ERP systems are attractive targets due '
'to their central role in business operations.'],
'motivation': ['financial gain (ransomware)',
'data theft for extortion',
'disruption of high-value enterprise targets'],
'post_incident_analysis': {'root_causes': ['Use of unpatched enterprise '
'software (Oracle E-Business '
'Suite) with zero-day '
'vulnerability.',
'Potential lack of network '
'segmentation allowing lateral '
'movement.',
'Targeting by a sophisticated '
'threat actor (Cl0p) with a '
'history of exploiting '
'zero-days.']},
'ransomware': {'data_encryption': ['likely (standard Cl0p tactic '
'post-exfiltration)'],
'data_exfiltration': ['claimed (pre-ransomware deployment)'],
'ransomware_strain': 'Cl0p'},
'recommendations': ['Immediately review security logs for unauthorized access '
'attempts in Oracle E-Business Suite environments.',
'Apply security patches for Oracle E-Business Suite as '
'soon as they are released.',
'Implement network segmentation to limit lateral movement '
'in case of breach.',
'Deploy endpoint detection and response (EDR) solutions '
'for early threat detection.',
'Monitor threat intelligence sources for zero-day '
'disclosures related to enterprise software.',
'Conduct regular vulnerability assessments for critical '
'ERP and supply chain systems.',
'Prepare incident response plans specifically for '
'ransomware and zero-day scenarios.'],
'references': [{'source': 'GBHackers (GBH)'}],
'response': {'enhanced_monitoring': ['recommended: review security logs for '
'unauthorized access, deploy EDR '
'solutions'],
'network_segmentation': ['recommended for organizations using '
'Oracle E-Business Suite']},
'threat_actor': 'Cl0p ransomware gang',
'title': 'Cl0p Ransomware Gang Claims Breach of Broadcom via Zero-Day in '
'Oracle E-Business Suite',
'type': ['ransomware', 'data breach', 'zero-day exploit'],
'vulnerability_exploited': 'Unpatched zero-day vulnerability in Oracle '
'E-Business Suite (arbitrary code execution)'}