Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Apple upgrades iPad Pro, MacBook Pro, Vision Pro with new M5 chip

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » As CL0P misuses CVE-2025-61882 in real-world attacks, OracleEB
Identity

As CL0P misuses CVE-2025-61882 in real-world attacks, OracleEB

userBy userOctober 7, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 7, 2025Ravi LakshmananCyber ​​Attacks/Ransomware

CrowdStrike said Monday that the first known exploitation occurred on August 9, 2025, when threat actors tracking the recently disclosed security flaw exploitation in Oracle E-Business Suite as Graceful Spider (also known as CL0P).

Exploitation involves exploitation of CVE-2025-61882 (CVSS score: 9.8), a key vulnerability that facilitates remote code execution without authentication.

The cybersecurity company also noted that it is currently unknown how the collaboration “intimating” a collaboration between scattered spiders, Rapsuas $ (aka Slippy Spider), and Shiny Hunter became the property of Expoloit because of its flaws, and whether they and other threat actors exploited it in actual attacks.

The Telegram channel has been observed to share the alleged Oracle EBS Exploit, criticizing Graceful Spider’s tactics.

DFIR Retainer Service

Activities observed so far include an HTTP request to /oa_html /syncservlet, and authentication bypasses. The attacker then issues a GET request to target the ORACLE’s XML Publisher Manager.

The malicious template command is executed when previewed, and an outbound connection from the Java Web server process to the attacker-controlled infrastructure is connected through port 443. The connection is then used to remotely load the web shell to run the command and establish persistence.

One or more threat actors are believed to own the CVE-2025-61882 exploit for data removal purposes.

“The proof-of-concept disclosure and CVE-2025-61882 patch release almost certainly encourage threat actors, especially those familiar with Oracle EBS, to create weaponized POCs and try to leverage them against Internet-exposed EBS applications.”

In another analysis, “chain” states that “expresses this level of skill and effort, with at least five different bugs being assembled together to achieve pre-recognized remote code execution.” The entire sequence of events is:

Send an HTTP POST request containing the created XML to /OA_HTML/Configurator/UISERVLET to force the backend server to send any HTTP request via a server-side request forgery (SSRF) attack and initiate any adoption of HTP requests using carriage return/line feed (CRLF) injection. Use this vulnerability to smuggle requests to an Oracle EBS application exposed to the Internet via “apps.example.com:7201/oa_html/help/../ieshostedsurvey.jsp” to load a malicious XSLT template

This attack takes advantage of the fact that at its core, a JSP file can load unreliable stylesheets from a remote URL, allowing the attacker to open the door to achieve arbitrary code execution.

“This combination allows attacker control requests via SSRF to request framing, reusing the same TCP connection for additional requests, increasing reliability and reducing noise,” the company said. “Also known as HTTP Persistent Connections (also known as HTTP Keep-Alive or Connection Reuse) ensures that a single TCP connection carries multiple HTTP request/response pairs instead of opening a new connection for all exchanges.”

CIS Build Kit

CVE-2025-61882 has since been added to the known exploited vulnerabilities (KEV) catalog by the Cybersecurity and Infrastructure Security Agency (CISA) and used in ransomware campaigns, urging federal agencies to apply the fix by October 27, 2025.

“CL0P has been exploiting multiple vulnerabilities in Oracle EBS since at least August 2025, stealing a large amount of data from several casualties, and has been sending fear tor emails to some of those victims since last Monday.”

“Based on the evidence, I consider this to be a CL0P activity and fully expect to see indiscriminate exploitation of mass from multiple groups within a few days. When I run Oracle EBS, this is the red alert. Patch it immediately, actively hunt it, tighten control – fast.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleShackleton’s infamous ship “There were obviously some structural defects in durability,” a new analysis reveals
Next Article Unlock the power of biometric authentication
user
  • Website

Related Posts

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

October 15, 2025

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

October 15, 2025

Over 100 VS Code extensions expose developers to hidden supply chain risks

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Apple upgrades iPad Pro, MacBook Pro, Vision Pro with new M5 chip

Group chats added to Threads as Messaging rolls out to the EU

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.