Oracle

Oracle

Oracle is facing a high-volume extortion campaign targeting executives of its **E-Business Suite (EBS)** customers. Attackers are sending emails claiming unauthorized access to EBS data—critical for finance, supply chain, and CRM operations—demanding ransom under threats of data exposure or operational disruption. While Oracle has not confirmed actual data theft, the campaign risks **legal, reputational, and operational fallout**, including potential ERP downtime, financial workflow disruptions, and supply-chain interruptions. The attack exploits unverified claims to pressure CFOs and CISOs, leveraging fear of regulatory penalties, customer distrust, and system outages. Oracle has urged immediate patching (July 2025 Critical Patch Update) and hardening of environments, including MFA enforcement, SSO token rotation, and third-party integration audits. The incident highlights vulnerabilities in ERP systems, where even unproven threats can trigger costly incident-response measures, executive stress, and preemptive crisis management (e.g., tabletop exercises for breach scenarios).

Source: https://techinformed.com/ransomware-gang-claims-oracle-e-business-suite-breach-what-ebs-admins-should-check-now/

TPRM report: https://www.rankiteo.com/company/oracle

"id": "ora2192321100625",
"linkid": "oracle",
"type": "Cyber Attack",
"date": "7/2025",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'industry': ['multiple industries (finance, supply '
                                     'chain, CRM-dependent sectors)'],
                        'name': 'Oracle E-Business Suite (EBS) customers',
                        'size': ['large organizations'],
                        'type': ['enterprise organizations']}],
 'attack_vector': ['phishing/extortion emails',
                   'potential exploitation of unpatched vulnerabilities in '
                   'Oracle EBS'],
 'customer_advisories': ['Oracle urged customers to apply July 2025 CPU and '
                         'review security controls'],
 'data_breach': {'data_exfiltration': ['unverified claims by threat actors']},
 'description': 'A high-volume extortion campaign is targeting executives with '
                'emails claiming unauthorized access to Oracle E-Business '
                'Suite (EBS) data. The campaign poses risks of executive '
                'pressure, potential data exposure, and ERP downtime across '
                'finance, supply-chain, and CRM workflows. While Oracle has '
                'not confirmed any customer data theft, it has urged EBS '
                'customers to apply the July 2025 Critical Patch Update (CPU) '
                'and harden their environments. Google described the campaign '
                "as 'high volume' but could not verify the data-theft claims.",
 'impact': {'brand_reputation_impact': ['reputational risk due to unverified '
                                        'claims and executive targeting'],
            'legal_liabilities': ['potential legal fallout from unverified '
                                  'ransomware claims'],
            'operational_impact': ['potential disruption to finance, '
                                   'supply-chain, and CRM workflows'],
            'systems_affected': ['Oracle E-Business Suite (EBS)']},
 'initial_access_broker': {'data_sold_on_dark_web': ['unverified claims'],
                           'entry_point': ['phishing/extortion emails '
                                           'targeting executives'],
                           'high_value_targets': ['EBS finance, supply-chain, '
                                                  'and CRM data']},
 'investigation_status': 'ongoing (data theft claims unverified; extortion '
                         'campaign confirmed)',
 'lessons_learned': ['Proactive patching and hardening of ERP systems are '
                     'critical to mitigating extortion risks.',
                     'Executive-targeted extortion emails require coordinated '
                     'legal and security responses.',
                     'Third-party integrations in ERP systems are high-risk '
                     'vectors and require strict monitoring.',
                     'Tabletop exercises help identify procedural gaps before '
                     'real incidents occur.'],
 'motivation': ['financial extortion',
                'potential data theft for resale or further exploitation'],
 'post_incident_analysis': {'corrective_actions': ['Immediate patching and '
                                                   'hardening of EBS '
                                                   'environments.',
                                                   'Enhanced monitoring of '
                                                   'third-party integrations '
                                                   'and privileged access.',
                                                   'Proactive tabletop '
                                                   'exercises to improve '
                                                   'incident response '
                                                   'readiness.'],
                            'root_causes': ['Potential exploitation of '
                                            'unpatched vulnerabilities in '
                                            'Oracle EBS.',
                                            'Targeted phishing/extortion '
                                            'emails leveraging executive '
                                            'pressure.']},
 'ransomware': {'data_exfiltration': ['unverified claims']},
 'recommendations': ['Apply the July 2025 Oracle Critical Patch Update '
                     'immediately.',
                     'Enforce MFA and rotate credentials for EBS admin/service '
                     'accounts.',
                     'Conduct a thorough review of privileged roles and recent '
                     'logins.',
                     'Inventory and re-authorize all third-party integrations '
                     'with EBS.',
                     'Preserve extortion email artifacts for forensic '
                     'analysis.',
                     'Run ERP-compromise tabletop exercises to test response '
                     'readiness.',
                     'Monitor integration logs for anomalies or unauthorized '
                     'access attempts.'],
 'references': [{'source': 'Google Threat Analysis Group (TAG)'},
                {'source': 'Oracle Security Advisory (July 2025 CPU)'},
                {'source': 'Reuters'}],
 'regulatory_compliance': {'regulatory_notifications': ['recommended: '
                                                        'pre-draft regulator '
                                                        'communications']},
 'response': {'communication_strategy': ['route extortion emails via security '
                                         'and legal channels',
                                         'pre-draft customer and regulator '
                                         'communications'],
              'containment_measures': ['patch verification (July 2025 CPU)',
                                       'rotate SSO tokens',
                                       'enforce MFA on EBS admin/service '
                                       'accounts',
                                       'review privileged roles and recent '
                                       'admin logins for anomalies'],
              'enhanced_monitoring': ['monitor ERP integration points for '
                                      'anomalies'],
              'incident_response_plan_activated': ['recommended: '
                                                   'ERP-compromise tabletop '
                                                   'exercises within 24–48 '
                                                   'hours'],
              'law_enforcement_notified': ['recommended: preserve email '
                                           'headers/artifacts for law '
                                           'enforcement or threat '
                                           'intelligence'],
              'remediation_measures': ['inventory and re-authorize third-party '
                                       'integrations (APIs, connectors, file '
                                       'transfers)',
                                       'monitor interface logs for unusual '
                                       'spikes/failures']},
 'stakeholder_advisories': ['CFOs and CISOs advised to prioritize patching and '
                            'hardening EBS environments'],
 'title': 'High-Volume Extortion Campaign Targeting Oracle E-Business Suite '
          '(EBS) Executives',
 'type': ['extortion', 'potential data breach', 'ransomware threat'],
 'vulnerability_exploited': ['unpatched Oracle EBS vulnerabilities (addressed '
                             'in July 2025 CPU)']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.