University of Phoenix Oracle EBS breach notice
Victims of the CL0P ransomware group’s August campaign targeting Oracle E-Business Suite vulnerabilities are still coping with the aftermath of the cyberattacks, as Korean Air and the University of Phoenix have become the latest to reveal details of the breach.
The University of Phoenix reported earlier this month in an SEC filing that it was among the Oracle EBS victims, after the company was named as a victim by CL0P on the threat group’s dark web data leak site.
In a new filing with the Maine Attorney General’s office, the University of Phoenix revealed the extent of the breach – nearly 3.5 million people may have had their personal data compromised, including names, dates of birth, Social Security numbers, and bank account and routing numbers.
The sample notification letter provided by the university offered victims complimentary identity protection services. including a year of credit monitoring, dark web monitoring services, a $1 million identity fraud loss reimbursement policy, and identity theft recovery services.
Oracle EBS victims continue to grapple with the aftermath of the attacks even as CL0P has reportedly moved on to a new extortion campaign targeting internet-facing Gladinet CentreStack file servers.
Korean Air also reported a cyberattack that appears linked to the Oracle EBS campaign.
According to news reports, KC&D Service – the former in-flight catering subsidiary of the airline that’s now owned by a private equity firm – informed Korean Air of a leak that involved personal data belonging to the airline’s employees. The compromised data involved 30,000 records and included names and bank account numbers. The breach was revealed in an “internal notice,” according to the reports.
The airline said no customer data appears to have been compromised by the breach.
According to Korea JoongAng Daily, Woo Kee-hong, vice chairman of Korean Air, said in a message to employees, “Korean Air takes this incident very seriously, especially since it involves employee data, even if it originated from a third-party vendor that was sold off. We are currently focusing all our efforts on identifying the full scope of the breach and who was affected.”
While the reports didn’t specifically mention the Oracle EBS campaign, “Korean Air Catering” was one of more than 100 victims listed by CL0P on its data leak site.
Other confirmed victims in the Oracle campaign have included The Washington Post, Harvard University, Dartmouth College, the University of Pennsylvania, American Airlines’ Envoy Air, Logitech, Cox, Mazda, Canon, and Hitachi’s GlobalLogic.
CL0P’s ability to exploit file sharing and transfer services at scale has made it a top five ransomware group over its six-year history, with more than 1,000 known victims to date, according to Cyble threat intelligence data.
Other CL0P campaigns have targeted Cleo MFT, MOVEit, CrushFTP, SolarWinds Serv-U, PaperCut, and GoAnywhere, among others.
CL0P’s exploitation of Cleo MFT vulnerabilities led to a record number of ransomware attacks earlier this year, and CL0P has also successfully exploited Accellion FTA vulnerabilities.
Some reports have linked the Oracle EBS campaign to the FIN11 threat group, with CL0P acting as the public face of the campaign.
A penetration tester found more than 20 vulnerabilities in a satellite receiver deployed by the U.S. Department of War, the…
INC Ransom's affiliate model now enables a broad range of threat actors to target critical infrastructure.
Israel has claimed a successful strike on a Tehran-based compound that housed Iran’s "cyber warfare headquarters" and the "Intelligence Directorate,"…
Since 2020, the section has secured more than 180 cybercriminal convictions and obtained court orders returning over $350 million in…
Officials say the investigation is now entering a prevention phase that aims to deter others from engaging in similar cybercrime…
Middle East conflict intensifies as Iran, US, and Israel deploy cyberattacks, missiles, and hacktivist campaigns reshaping regional security.
This website uses cookies. By continuing to use this website you are giving consent to cookies being used.
Read More