Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

A new wave of social media apps brings hope to a world of doomscrolling

North Korean hackers use EtherHiding to hide malware inside blockchain smart contracts

Hackers exploit blockchain smart contracts to spread malware via infected WordPress sites

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » After CL0P exploits it in a data theft attack, Oracle Rushes patches are CVE-2025-61882
Identity

After CL0P exploits it in a data theft attack, Oracle Rushes patches are CVE-2025-61882

userBy userOctober 6, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 6, 2025Ravi LakshmananVulnerability/Threat Intelligence

Oracle's flaws

Oracle has released an emergency update to address critical security flaws in its e-business suite, which it said was exploited in the recent wave of CL0P data theft attacks.

The vulnerability tracked as CVE-2025-61882 (CVSS score: 9.8) concerns an unspecified bug that allows unauthenticated attackers with network access over HTTP to compromise and control Oracle Concurrent Processing components.

“This vulnerability can be exploited remotely without authentication, meaning it could be exploited on a network without requiring a username and password,” Oracle said in its advisory. “If successful, this vulnerability could lead to remote code execution.”

Oracle’s Chief Security Officer Rob Duhart said in another alert that the company has released an amendment to CVE-2025-61882, “providing updates on additional potential exploitations discovered during the investigation.”

CIS Build Kit

As a compromise indicator (IOC), the technology shares the following IP addresses and artifacts, indicating the potential for involvement in the scattered Lapsus $Hunters group exploits –

The news about Oracle Zero-Day comes just days after reports of a new campaign likely launched by the CL0P ransomware group targeting Oracle E-Business Suite. Mandiant, owned by Google, described its ongoing activities as a “massive email campaign” that started with hundreds of compromised accounts.

In a post shared on LinkedIn, Charles Carmakal, CTO of Mandiant at Google Cloud, said, “CL0P was able to steal a large amount of data from multiple victims in August 2025 because it exploited multiple vulnerabilities in Oracle EBS,” and multiple vulnerabilities were exploited, including a patched vulnerability for Oracle weekend. (CVE-2025-61882). ”

“No matter when the patch is applied, given the widespread zero-day exploitation that has already occurred (and the continuing N-Day exploitation of other actors), organizations need to look into whether they have already compromised,” Carmakal said.

(This is a developing story. Please check again for more details.)


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWaffles eat blue skis | TechCrunch
Next Article Zimbra Zero-day targeted and exploited the Brazilian military through malicious ICS files
user
  • Website

Related Posts

North Korean hackers use EtherHiding to hide malware inside blockchain smart contracts

October 16, 2025

Hackers exploit blockchain smart contracts to spread malware via infected WordPress sites

October 16, 2025

LinkPro Linux rootkit uses eBPF to hide and activate via Magic TCP packets

October 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

A new wave of social media apps brings hope to a world of doomscrolling

North Korean hackers use EtherHiding to hide malware inside blockchain smart contracts

Hackers exploit blockchain smart contracts to spread malware via infected WordPress sites

LinkPro Linux rootkit uses eBPF to hide and activate via Magic TCP packets

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.