Cybercriminals are trying to extort executives with data allegedly stolen through Oracle tool

Hackers possibly connected to a prominent Russian ransomware gang are attempting to extort corporate executives by threatening to leak sensitive information they claim was stolen through a popular tool made by Oracle. 

Incident responders at Mandiant and Google Threat Intelligence Group (GTIG) released a warning about the campaign on Wednesday evening, telling Recorded Future News in an email that they are tracking a campaign launched by a threat actor potentially linked to Clop — a gang that previously made a name for itself with high-profile data thefts involving file transfer tools. 

The latest campaign, according to the incident responders, involves data the hackers said was stolen through the Oracle E-Business Suite, a widely used business platform containing several applications that manage a company’s finance, human resources and supply chain functions.  

Genevieve Stark, a senior cybercrime investigator at GTIG, said the team believes the campaign started on September 29 but is still in the early stages of multiple investigations. 

The threat actors have sent extortion emails to executives at “numerous organizations,” but Mandiant would not share how many companies have been impacted or what kind of information might have been stolen. Oracle did not respond to requests for comment. 

Mandiant and GTIG “are actively tracking recent activity involving an actor claiming affiliation with the Clop extortion group,” said Charles Carmakal, CTO of Mandiant, later referring to the group by its cybersecurity industry name FIN11.

“We are currently observing a high-volume email campaign being launched from hundreds of compromised accounts and our initial analysis confirms that at least one of these accounts has been previously associated with activity from FIN11, a long-running financially motivated threat group known for deploying ransomware and engaging in extortion.”

GTIG cybersecurity expert Austin Larsen added that the contact addresses provided in the extortion notes — [email protected] and [email protected] — are the same ones publicly listed on the official Clop data leak site. Mandiant explained that it has not yet substantiated the claims made by the group. 

Carmakal warned that the hackers may simply be leveraging Clop’s name to scare victims into paying ransoms and that Mandiant “does not currently have sufficient evidence to definitively assess the veracity of these claims.”

Clop has earned hundreds of millions of dollars by exploiting unreported vulnerabilities in popular file transfer tools from Cleo, MOVEit, GoAnywhere and Accellion

In each of the attacks, the group typically focuses on stealing data held in the file transfer software and selling that for a ransom as opposed to the typical attempt to shut down or damage an organization’s devices or systems. 

The most recent Clop campaign against MOVEit had global implications, impacting several U.S. federal departments, governments and Fortune 500 companies

Cybersecurity firm Emsisoft estimated that 2,773 organizations were impacted by the attacks on MOVEit, and the records of nearly 96 million people were exposed and stolen by the group behind the exploitation. 

Clop is estimated to have earned anywhere from $75 million to $100 million just from ransoms during the MOVEit campaign.

Earlier this year, Oracle told customers of a January incident where hackers stole information and accessed client credentials held on legacy Oracle systems. 

The Cybersecurity and Infrastructure Security Agency (CISA) eventually warned that while the scope of the incident remained unconfirmed, the “nature of the reported activity presents potential risk to organizations and individuals, particularly where credential material may be exposed, reused across separate, unaffiliated systems, or embedded.”

CISA did not respond to requests for comment about whether the January incident is tied to the current campaign. 

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware

Next Post

CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild

Related Posts

Active Directory Under Siege: Why Critical Infrastructure Needs Stronger Security

Active Directory remains the authentication backbone for over 90% of Fortune 1000 companies. AD's importance has grown as companies adopt hybrid and cloud infrastructure, but so has its complexity. Every application, user, and device traces back to AD for authentication and authorization, making it the ultimate target. For attackers, it represents the holy grail: compromise Active
Read More

Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover

A severe security flaw has been disclosed in the Red Hat OpenShift AI service that could allow attackers to escalate privileges and take control of the complete infrastructure under certain conditions. OpenShift AI is a platform for managing the lifecycle of predictive and generative artificial intelligence (GenAI) models at scale and across hybrid cloud environments. It also facilitates data
Read More

Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling

Cybersecurity researchers have called attention to a cyber attack in which unknown threat actors deployed an open-source endpoint monitoring and digital forensic tool called Velociraptor, illustrating ongoing abuse of legitimate software for malicious purposes. "In this incident, the threat actor used the tool to download and execute Visual Studio Code with the likely intention of creating a
Read More