Cox Enterprises, a U.S.-based conglomerate with operations in telecommunications, media, and automotive services (e.g., Cox Communications, Autotrader), suffered a **sophisticated data breach** via a **zero-day exploit (CVE-2025-61882)** in Oracle’s E-Business Suite. Hackers, linked to the **Cl0p ransomware group**, infiltrated the network between **August 9–14, 2025**, exfiltrating **1.6TB of data**—including **sensitive personal information of 9,479 individuals** (names, addresses, dates of birth, Social Security numbers, and internal documents). The breach was detected in **late September 2025**, with Cl0p leaking the data on the dark web. The attack exploited an **unpatched critical vulnerability (CVSS 9.8)** allowing unauthorized database access, heightening risks of **identity theft, financial fraud, and reputational damage**. Oracle released an emergency patch post-breach, but the delay enabled widespread exploitation across other high-profile targets (e.g., The Washington Post, Harvard University). Cox offered affected parties **credit monitoring**, though long-term risks persist. The incident underscores vulnerabilities in **ERP systems**, **supply chain security gaps**, and the escalating threat of **ransomware-as-a-service (RaaS)** campaigns targeting enterprise software.
Source: https://www.webpronews.com/cox-enterprises-data-breach-cl0p-exploits-oracle-zero-day-flaw/
Cox Enterprises cybersecurity rating report: https://www.rankiteo.com/company/cox-enterprises
"id": "COX53102453112425",
"linkid": "cox-enterprises",
"type": "Breach",
"date": "8/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'customers_affected': '9,479 individuals',
'industry': ['Telecommunications',
'Media',
'Automotive Services'],
'location': 'United States',
'name': 'Cox Enterprises',
'size': '55,000+ employees, $23B+ annual revenue',
'type': 'Conglomerate'}],
'attack_vector': ['Zero-Day Exploit (CVE-2025-61882)',
'Unauthenticated Access',
'Multi-Stage Java Implants',
'Data Exfiltration'],
'customer_advisories': 'Free credit monitoring offered to affected parties',
'data_breach': {'data_exfiltration': '1.6 TB of data leaked on the dark web',
'file_types_exposed': ['Databases',
'Documents',
'HR/Employee Records'],
'number_of_records_exposed': '9,479 individuals',
'personally_identifiable_information': True,
'sensitivity_of_data': 'High (includes SSNs, dates of birth, '
'addresses)',
'type_of_data_compromised': ['PII (Personally Identifiable '
'Information)',
'Internal Documents',
'Employee Records',
'Customer Details']},
'date_detected': '2025-09-01T00:00:00Z',
'date_publicly_disclosed': '2025-09-30T00:00:00Z',
'description': 'Cox Enterprises, a U.S. conglomerate in telecommunications, '
'media, and automotive services, suffered a data breach due to '
'a zero-day exploit (CVE-2025-61882) in Oracle’s E-Business '
'Suite. The breach, attributed to the Cl0p ransomware group, '
'exposed sensitive personal data of 9,479 individuals, '
'including names, addresses, dates of birth, Social Security '
'numbers, and other identifiers. The incident occurred between '
'August 9–14, 2025, but was detected in late September. Cl0p '
'leaked 1.6 TB of stolen data on the dark web, and Cox offered '
'affected parties free credit monitoring. The breach '
'highlights vulnerabilities in ERP systems and the risks of '
'delayed patching, with broader implications for supply chain '
'security and regulatory compliance.',
'impact': {'brand_reputation_impact': 'High (potential erosion of customer '
'trust, regulatory scrutiny)',
'data_compromised': ['Names',
'Addresses',
'Dates of Birth',
'Social Security Numbers',
'Personal Identifiers',
'Internal Documents',
'Employee Records',
'Customer Details'],
'identity_theft_risk': 'High (9,479 individuals affected)',
'legal_liabilities': ['Potential lawsuits (e.g., Bloomberg Law '
'report on Oracle’s liability)',
'Regulatory fines under GDPR/CCPA'],
'operational_impact': 'Potential disruption to HR, financial, and '
'supply chain operations',
'systems_affected': ['Oracle E-Business Suite',
'ERP Systems',
'Databases']},
'initial_access_broker': {'backdoors_established': ['Multi-stage Java '
'implants'],
'data_sold_on_dark_web': '1.6 TB of stolen data '
'leaked',
'entry_point': 'Zero-day exploit (CVE-2025-61882) '
'in Oracle E-Business Suite',
'high_value_targets': ['ERP databases',
'HR systems',
'Financial records'],
'reconnaissance_period': 'Potentially since July '
'2025 (part of broader '
'Cl0p campaign)'},
'investigation_status': 'Ongoing (forensic investigation, potential '
'third-party involvement)',
'lessons_learned': ['Zero-day exploits in ERP systems pose severe risks due '
'to their central role in operations.',
'Delayed detection (weeks between breach and discovery) '
'exacerbates impact.',
'Supply chain vulnerabilities (e.g., Oracle software) '
'require proactive patch management.',
'Ransomware-as-a-Service (RaaS) models enable scalable, '
'sophisticated attacks.',
'Public disclosure strategies must balance transparency '
'with investigative integrity.'],
'motivation': ['Financial Gain', 'Data Theft', 'Extortion'],
'post_incident_analysis': {'corrective_actions': ['Applied Oracle’s emergency '
'patch (2025-10-04).',
'Enhanced monitoring for '
'ERP systems.',
'Review of third-party '
'software patching '
'policies.',
'Potential restructuring of '
'incident response '
'protocols to reduce '
'detection lag.'],
'root_causes': ['Unpatched zero-day vulnerability '
'(CVE-2025-61882) in Oracle '
'E-Business Suite.',
'Delayed detection (weeks between '
'intrusion and discovery).',
'Lack of proactive threat hunting '
'for ERP-specific attacks.',
'Potential gaps in network '
'segmentation or access '
'controls.']},
'ransomware': {'data_exfiltration': '1.6 TB',
'ransomware_strain': 'Cl0p (alleged)'},
'recommendations': ['Immediate patching of critical vulnerabilities (e.g., '
'CVE-2025-61882).',
'Adoption of zero-trust architectures and multi-factor '
'authentication (MFA).',
'Enhanced vulnerability scanning and threat hunting '
'capabilities.',
'Network segmentation to limit lateral movement.',
'Regular employee training on phishing and social '
'engineering.',
'Collaboration with vendors (e.g., Oracle) for '
'out-of-band patches.',
'Proactive dark web monitoring for leaked data.',
'Investment in AI-driven anomaly detection systems.',
'International cooperation for cross-border cybercrime '
'investigations.'],
'references': [{'source': 'BleepingComputer',
'url': 'https://www.bleepingcomputer.com'},
{'source': 'SecurityWeek',
'url': 'https://www.securityweek.com'},
{'source': 'The Hacker News',
'url': 'https://thehackernews.com'},
{'source': 'TechRadar', 'url': 'https://www.techradar.com'},
{'source': 'Bloomberg Law',
'url': 'https://news.bloomberglaw.com'},
{'source': 'Maine Attorney General’s Office (Breach '
'Notification)'},
{'source': 'CISA Alerts', 'url': 'https://www.cisa.gov'},
{'source': 'IBM Cost of a Data Breach Report',
'url': 'https://www.ibm.com/reports/data-breach'}],
'regulatory_compliance': {'legal_actions': ['Potential lawsuits (e.g., '
'against Oracle for delayed '
'patching)'],
'regulations_violated': ['Potential GDPR (EU)',
'CCPA (California)',
'State breach notification '
'laws (e.g., Maine)'],
'regulatory_notifications': ['Maine Attorney '
'General’s Office '
'filing',
'CISA alerts for '
'related '
'vulnerabilities '
'(e.g., '
'CVE-2025-61757)']},
'response': {'communication_strategy': ['Notification letters to affected '
'parties',
'Public disclosure via Maine Attorney '
'General’s Office filing'],
'containment_measures': ['Patch application (Oracle emergency '
'patch on 2025-10-04)',
'Network segmentation (assumed)'],
'enhanced_monitoring': 'Recommended (not explicitly confirmed)',
'incident_response_plan_activated': True,
'network_segmentation': 'Recommended (not explicitly confirmed)',
'remediation_measures': ['Free credit monitoring for affected '
'individuals',
'Ongoing forensic investigation'],
'third_party_assistance': ['Potential involvement of Mandiant '
'(forensic investigation)']},
'stakeholder_advisories': ['Notification letters to affected individuals',
'Public statements via regulatory filings'],
'threat_actor': 'Cl0p Ransomware Group (alleged)',
'title': 'The Silent Siege: Cox Enterprises’ Oracle Breach and the Shadowy '
'World of Zero-Day Exploits',
'type': ['Data Breach', 'Zero-Day Exploit', 'Ransomware Attack'],
'vulnerability_exploited': 'CVE-2025-61882 (Critical Authentication Bypass in '
'Oracle E-Business Suite)'}