Logitech Named As The Latest Victim Of The Oracle’s E-Business Suite Vulnerability
Recently, Logitech disclosed a data breach after it was named a victim of the hacking and extortion campaign targeting customers of Oracle’s E-Business Suite (EBS) enterprise resource planning solution.
Adrian Culley, Senior Sales Engineer at SafeBreach hd this to say:
“The Oracle E-Business Suite zero-day campaign (CVE-2025-61882) is one of the most technically advanced operations we have seen from the Cl0p extortion group this year. It reinforces that Cl0p has matured into a threat actor capable of conducting its own vulnerability research and weaponizing flaws before defenders even know they exist. The group recently published a list of alleged victims on its TOR site, although several organizations have not yet confirmed compromise.
This activity highlights a broader and recurring pattern. Cl0p continues to find and exploit systemic weaknesses in enterprise software supply chains, and they are accelerating. Organizations do not have to wait to become the next name on a leak site. These attack paths can be simulated and the security gaps addressed before an intrusion occurs. Now is the time to run these scenarios and close the exposures that groups like Cl0p rely on.”
VP of Cyber Risk for HITRUST, Tom Kellermann adds this:
“As we head into the fifth anniversary of the SolarWinds attack, this Logitech breach underscores again the systemic risk created by zero-day exploitation within trusted enterprise platforms. The Cl0p extortion campaign targeting Oracle E-Business Suite customers is not an isolated criminal act; it reflects the broader evolution of cyber insurgency against Western supply chains. When over 50 major organizations are impacted through the same vector, we are witnessing a campaign of island hopping—where adversaries infiltrate a third-party platform to traverse into corporate networks at scale.
This incident highlights the escalating threat posed by financially motivated groups with nation-state tradecraft, such as the cluster linked to FIN11. These actors are weaponizing supply chain dependencies to exfiltrate sensitive corporate data without disrupting operations, making detection far more difficult.
Enterprises must dramatically enhance third-party risk management and expand continuous monitoring of interconnected systems. Zero-day exploitation campaigns of this magnitude demonstrate that defending your own perimeter is no longer enough. Organizations must assume their software providers are targets, harden identity controls, and increase threat hunting across all integrated platforms to suppress these campaigns before they metastasize.”
I have said it before and I will say it again, this will be the biggest hack since the last biggest hack. And I suspect that the victims will really start to pile up in the coming days as more victims come forward.
December 3, 2025 at 2:01 pm
[…] of a cybersecurity incident involving the Oracle E-Business Suite software platform. They join Logitech, The Washington Post and Harvard among others who have been pwned via this […]