Skip to content
Vulnerability Recap
What You Missed Last Week
Vulnerability Recap

Cybersecurity News, CVE Recaps, and Education Resource

  • Home
  • What You Missed Last Week
  • HackHer News
  • Cybersecurity Blog
Vulnerability Recap

Cybersecurity News, CVE Recaps, and Education Resource

Oracle Warns: Patch It or Pay the Price, Known Vulns Could Be Behind New Extortion Campaigns

HackHer News, October 7, 2025October 7, 2025

Cracking the Case: What’s Going On at Oracle

Oracle is ringing the alarm: some of their clients have been hit with extortion emails, and it looks like the perpetrators may have exploited vulnerabilities that already had patches. 

Those extortion messages claim to come from Cl0p (a well-known cybercrime group) and refer to accounts tied to FIN11; a gang with a history of high-profile attacks.  Researchers are still confirming whether the leaks are legit, but the timing is suspicious. 

Oracle’s security team is investigating whether flaws fixed in their July 2025 Critical Patch Update are involved.  Among those are at least three vulnerabilities in their E-Business Suite that allow remote exploitation without authentication, and others requiring minimal user interaction. 


Why This Is a Big Deal

  • Patched, but not safe: If attackers are using flaws that were already patched, it suggests some systems never applied the updates, or the patches didn’t fully close the door.
  • Risk magnification: E-Business Suite is a backbone tool in many enterprises. A vuln here can open up access to financials, HR systems, supply chains, you name it.
  • Familiar tactics, new targets: Cl0p and FIN11 have hit file transfer apps, legacy clouds, and other core infrastructure software. This move into Oracle’s environment shows how attackers keep stretching into deeper enterprise territory. 
  • The human factor: Patches don’t do much good if admins don’t deploy them, and relying on users to avoid clicking malicious links is always a shaky defense.

What You Should Do (If You’re Using Oracle/E-Business Suite)

  1. Check patch status immediately. Make sure every critical patch from July 2025 (and earlier) is applied everywhere.
  2. Audit configurations and access. Even patched systems can be misconfigured. Limit admin access, enforce least privilege, and monitor for odd behavior.
  3. Monitor for signs of compromise. Look for unusual logins, data exfiltration patterns, or sudden configuration changes.
  4. Use anomaly detection & threat intel. Tools that spot deviations from baseline can catch attacks even when they use known vulnerabilities.
  5. Train teams. Even if they can’t fix zero-days, knowing how attacks generally unfold helps everyone act faster when alarms go off.

Final Word

This incident is a brutal reminder: vulnerability management isn’t a “set and forget” checkbox. Even known flaws can become a liability if your systems aren’t patched, patched properly, and protected by layered security.

Oracle’s message is clear: the risks are real, the threat actors are getting bolder, and complacency is no longer an option.

Post Views: 6
HackHer News Critical Patch UpdateE-Business Suiteextortion campaignFIN11OracleVulnerabilityvulnerability management

Post navigation

Previous post
Next post

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

If you'd like to subscribe to our email, add your Name & E-Mail below.

Name
Email
The form has been submitted successfully!
There has been some error while submitting the form. Please verify all form fields again.
©2025 Vulnerability Recap | WordPress Theme by SuperbThemes