Logitech discloses data breach after Clop claims

Technology manufacturer Logitech filed documents with the Securities and Exchange Commission (SEC) on Friday about a recent cybersecurity incident that involved a zero-day vulnerability.

The company told the SEC that an investigation revealed that hackers exploited a bug “in a third-party software platform and copied certain data from the internal IT system.” 

“The zero-day vulnerability was patched by Logitech following its release by the software platform vendor. The data likely included limited information about employees and consumers and data relating to customers and suppliers,” the company said, adding that the attack did not impact its products, business operations or manufacturing. 

“Logitech does not believe any sensitive personal information, such as national ID numbers or credit card information, was housed in the impacted IT system.”

The attack will not have an impact on the company’s finances and plans to cover any costs with cyber insurance, the company noted. 

The filing comes one week after the Clop cybercriminal organization claimed it stole information from Logitech through a zero-day vulnerability in Oracle’s E-Business Suite tool. 

A spokesperson for Logitech declined to confirm whether the incident involved Clop or the zero-day impacting Oracle’s E-Business Suite. 

Reports from Google and other security firms indicate the hackers used a variety of vulnerabilities in Oracle E-Business Suite to gain access to sensitive data, including at least one zero-day vulnerability that was added to a federal watchlist in September. 

The Clop cybercriminal group initially attempted to extort corporate executives in October by threatening to leak sensitive information stolen through the application. Oracle confirmed the campaign but initially said the hackers were exploiting bugs that had been addressed in a July update, without specifying which vulnerabilities were being used. 

FBI Assistant Director Brett Leatherman said that one of the bugs exploited in the campaign is a “‘stop-what-you’re-doing and patch immediately’ vulnerability.”

Since then, several organizations have come forward to confirm data theft incidents, including regional American airline Envoy Air and Harvard University. The Washington Post told regulators last week that nearly 10,000 people had information stolen as part of the breach. 

Since announcing that it was behind the exploitation of the zero-day affecting Oracle E-Business Suite customers, Clop has listed dozens of victims on its leak site. 

The Russia-based extortion group has earned hundreds of millions of dollars by exploiting unreported vulnerabilities in popular file transfer tools from Cleo, MOVEit, GoAnywhere and Accellion.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT

Next Post

Kenyan gov’t websites back online after hackers deface pages with white supremacist messages

Related Posts

Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors

In December 2024, the popular Ultralytics AI library was compromised, installing malicious code that hijacked system resources for cryptocurrency mining. In August 2025, malicious Nx packages leaked 2,349 GitHub, cloud, and AI credentials. Throughout 2024, ChatGPT vulnerabilities allowed unauthorized extraction of user data from AI memory. The result: 23.77 million secrets were leaked through AI
Read More

Kimwolf Android Botnet Infects Over 2 Million Devices via Exposed ADB and Proxy Networks

The botnet known as Kimwolf has infected more than 2 million Android devices by tunneling through residential proxy networks, according to findings from Synthient. "Key actors involved in the Kimwolf botnet are observed monetizing the botnet through app installs, selling residential proxy bandwidth, and selling its DDoS functionality," the company said in an analysis published last week. Kimwolf
Read More