Logitech discloses data breach after Clop claims

Technology manufacturer Logitech filed documents with the Securities and Exchange Commission (SEC) on Friday about a recent cybersecurity incident that involved a zero-day vulnerability.

The company told the SEC that an investigation revealed that hackers exploited a bug “in a third-party software platform and copied certain data from the internal IT system.” 

“The zero-day vulnerability was patched by Logitech following its release by the software platform vendor. The data likely included limited information about employees and consumers and data relating to customers and suppliers,” the company said, adding that the attack did not impact its products, business operations or manufacturing. 

“Logitech does not believe any sensitive personal information, such as national ID numbers or credit card information, was housed in the impacted IT system.”

The attack will not have an impact on the company’s finances and plans to cover any costs with cyber insurance, the company noted. 

The filing comes one week after the Clop cybercriminal organization claimed it stole information from Logitech through a zero-day vulnerability in Oracle’s E-Business Suite tool. 

A spokesperson for Logitech declined to confirm whether the incident involved Clop or the zero-day impacting Oracle’s E-Business Suite. 

Reports from Google and other security firms indicate the hackers used a variety of vulnerabilities in Oracle E-Business Suite to gain access to sensitive data, including at least one zero-day vulnerability that was added to a federal watchlist in September. 

The Clop cybercriminal group initially attempted to extort corporate executives in October by threatening to leak sensitive information stolen through the application. Oracle confirmed the campaign but initially said the hackers were exploiting bugs that had been addressed in a July update, without specifying which vulnerabilities were being used. 

FBI Assistant Director Brett Leatherman said that one of the bugs exploited in the campaign is a “‘stop-what-you’re-doing and patch immediately’ vulnerability.”

Since then, several organizations have come forward to confirm data theft incidents, including regional American airline Envoy Air and Harvard University. The Washington Post told regulators last week that nearly 10,000 people had information stolen as part of the breach. 

Since announcing that it was behind the exploitation of the zero-day affecting Oracle E-Business Suite customers, Clop has listed dozens of victims on its leak site. 

The Russia-based extortion group has earned hundreds of millions of dollars by exploiting unreported vulnerabilities in popular file transfer tools from Cleo, MOVEit, GoAnywhere and Accellion.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT

Next Post

Kenyan gov’t websites back online after hackers deface pages with white supremacist messages

Related Posts

Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine

A previously unknown threat activity cluster has been observed impersonating Slovak cybersecurity company ESET as part of phishing attacks targeting Ukrainian entities. The campaign, detected in May 2025, is tracked by the security outfit under the moniker InedibleOchotense, describing it as Russia-aligned. "InedibleOchotense sent spear-phishing emails and Signal text messages, containing a link
Read More

Critical React Native CLI Flaw Exposed Millions of Developers to Remote Attacks

Details have emerged about a now-patched critical security flaw in the popular "@react-native-community/cli" npm package that could be potentially exploited to run malicious operating system (OS) commands under certain conditions. "The vulnerability allows remote unauthenticated attackers to easily trigger arbitrary OS command execution on the machine running react-native-community/cli's
Read More

JPCERT Confirms Active Command Injection Attacks on Array AG Gateways

A command injection vulnerability in Array Networks AG Series secure access gateways has been exploited in the wild since August 2025, according to an alert issued by JPCERT/CC this week. The vulnerability, which does not have a CVE identifier, was addressed by the company on May 11, 2025. It's rooted in Array's DesktopDirect, a remote desktop access solution that allows users to securely access
Read More