Cyber News

Latest Oracle EBS Victims Include Korean Air, University of Phoenix

Victims of the CL0P ransomware group’s August campaign targeting Oracle E-Business Suite vulnerabilities are still coping with the aftermath of the cyberattacks, as Korean Air and the University of Phoenix have become the latest to reveal details of the breach.

The University of Phoenix reported earlier this month in an SEC filing that it was among the Oracle EBS victims, after the company was named as a victim by CL0P on the threat group’s dark web data leak site.

In a new filing with the Maine Attorney General’s office, the University of Phoenix revealed the extent of the breach – nearly 3.5 million people may have had their personal data compromised, including names, dates of birth, Social Security numbers, and bank account and routing numbers.

The sample notification letter provided by the university offered victims complimentary identity protection services. including a year of credit monitoring, dark web monitoring services, a $1 million identity fraud loss reimbursement policy, and identity theft recovery services.

Oracle EBS victims continue to grapple with the aftermath of the attacks even as CL0P has reportedly moved on to a new extortion campaign targeting internet-facing Gladinet CentreStack file servers.

Korean Air Among Oracle EBS Victims

Korean Air also reported a cyberattack that appears linked to the Oracle EBS campaign.

According to news reports, KC&D Service – the former in-flight catering subsidiary of the airline that’s now owned by a private equity firm – informed Korean Air of a leak that involved personal data belonging to the airline’s employees. The compromised data involved 30,000 records and included names and bank account numbers. The breach was revealed in an “internal notice,” according to the reports.

The airline said no customer data appears to have been compromised by the breach.

According to Korea JoongAng Daily, Woo Kee-hong, vice chairman of Korean Air, said in a message to employees, “Korean Air takes this incident very seriously, especially since it involves employee data, even if it originated from a third-party vendor that was sold off. We are currently focusing all our efforts on identifying the full scope of the breach and who was affected.”

While the reports didn’t specifically mention the Oracle EBS campaign, “Korean Air Catering” was one of more than 100 victims listed by CL0P on its data leak site.

Other confirmed victims in the Oracle campaign have included The Washington PostHarvard University, Dartmouth College, the University of Pennsylvania, American Airlines’ Envoy Air, Logitech, Cox, Mazda, Canon, and Hitachi’s GlobalLogic.

CL0P’s File Services Exploits

CL0P’s ability to exploit file sharing and transfer services at scale has made it a top five ransomware group over its six-year history, with more than 1,000 known victims to date, according to Cyble threat intelligence data.

Other CL0P campaigns have targeted Cleo MFT, MOVEit, CrushFTP, SolarWinds Serv-U, PaperCut, and GoAnywhere, among others.

CL0P’s exploitation of Cleo MFT vulnerabilities led to a record number of ransomware attacks earlier this year, and CL0P has also successfully exploited Accellion FTA vulnerabilities.

Some reports have linked the Oracle EBS campaign to the FIN11 threat group, with CL0P acting as the public face of the campaign.

Paul Shread

Paul Shread, International Editor for The Cyber Express and Cyble, has covered nearly every aspect of enterprise technology in his 25 years in IT journalism, including award-winning articles on endpoint security and virtual data centers, and a report exposing critical security flaws in a major SIEM system. Publications he has edited and written for include eSecurity Planet, Datamation, eWeek, IT Business Edge, Webopedia, and many more. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst, cybersecurity, and analytics certifications. You can follow him on LinkedIn at: https://www.linkedin.com/in/paul-shread/

Recent Posts

A Satellite Receiver Trusted by Pentagon, ESA Has More Than 20 Security Flaws — and the Maker Never Responded

A penetration tester found more than 20 vulnerabilities in a satellite receiver deployed by the U.S. Department of War, the…

1 day ago

INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

INC Ransom's affiliate model now enables a broad range of threat actors to target critical infrastructure.

1 day ago

Israel Claims it ‘Struck’ Iran’s Cyber Warfare Headquarters

Israel has claimed a successful strike on a Tehran-based compound that housed Iran’s "cyber warfare headquarters" and the "Intelligence Directorate,"…

2 days ago

Florida Software Distributor Sentenced for Illicit Microsoft COA Trafficking

Since 2020, the section has secured more than 180 cybercriminal convictions and obtained court orders returning over $350 million in…

2 days ago

FBI and Europol Dismantle LeakBase Cybercrime Forum With 142,000 Users

Officials say the investigation is now entering a prevention phase that aims to deter others from engaging in similar cybercrime…

3 days ago

Cyber-Kinetic Warfare Escalates as Iran, US, and Israel Clash Across Military and Digital Fronts

Middle East conflict intensifies as Iran, US, and Israel deploy cyberattacks, missiles, and hacktivist campaigns reshaping regional security.

4 days ago

This website uses cookies. By continuing to use this website you are giving consent to cookies being used.

Read More