TechCrunch News 10月10日 01:59
黑客利用Oracle软件漏洞窃取企业数据
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

谷歌安全研究人员披露,名为Clop的勒索软件团伙利用Oracle E-Business Suite软件中的多项安全漏洞,成功窃取了数十家企业的大量数据。此次攻击活动至少从7月10日开始,远早于最初发现的三个月前。尽管Oracle此前声称已修补相关漏洞,但该团伙仍利用一个零日漏洞,无需用户名和密码即可进行网络攻击,持续窃取企业高管的个人信息和公司数据。Clop团伙以大规模利用未知漏洞进行数据窃取而闻名,此次事件再次凸显了企业在软件安全方面面临的严峻挑战。

🔑 **Oracle E-Business Suite软件漏洞被利用**: 谷歌安全研究人员发现,黑客组织Clop利用了Oracle E-Business Suite软件中的多项安全漏洞,成功窃取了数十家公司的敏感数据。该软件常用于存储客户数据和员工人力资源文件,此次攻击直接威胁到企业核心信息的安全。

⏳ **攻击活动持续时间长且隐蔽**: 黑客攻击活动至少可以追溯到7月10日,这意味着在漏洞被发现并开始修复前,攻击已持续了相当长一段时间。这表明黑客能够利用未被察觉的漏洞进行长期的数据窃取。

⚠️ **零日漏洞加剧风险**: Oracle承认存在一个零日漏洞,该漏洞无需用户名和密码即可通过网络进行利用。这种类型的漏洞因其事先未被软件供应商知晓和修复,对企业构成了极大的即时风险,难以防御。

🌐 **Clop团伙的惯用手法**: Clop勒索软件团伙以大规模利用未知的软件漏洞进行数据窃取而闻名,此前已成功攻击过Cleo Software、MOVEit和GoAnywhere等文件传输工具。此次针对Oracle的攻击是其惯用模式的延续,表明其技术能力和攻击手段的成熟度。

Security researchers at Google say hackers targeting corporate executives with extortion emails have stolen data from “dozens of organizations,” one of the first signs that the hacking campaign may be far-reaching.

The tech giant said Thursday in a statement shared with TechCrunch that the Clop extortion gang exploited multiple security vulnerabilities in Oracle’s E-Business Suite software to steal significant amounts of data from affected organizations.

Oracle’s E-Business software allows companies to run their operations, such as storing their customer data and their employees’ human resources files. 

Google said in a corresponding blog post that the hacking campaign targeting Oracle customers dates back to at least July 10, some three months before the hacks were first detected. 

Oracle conceded earlier this week that the hackers behind the extortion campaign were still abusing its software to steal personal information about corporate executives and their companies. Days earlier, Oracle’s chief security officer, Rob Duhart, claimed in the same post — since scrubbed — that the extortion campaign was linked to previously identified vulnerabilities that Oracle patched in July, suggesting the hacks were over.

But in a security advisory published over the weekend, Oracle said the zero-day bug — named because Oracle had no time to fix the bug as it was already being exploited by hackers — can be “exploited over a network without the need for a username and password.” 

The Russia-linked Clop ransomware and extortion gang has made a name for itself in recent years for mass-hacking campaigns, often involving the abuse of vulnerabilities unknown to the software vendor at the time they were exploited, to steal large amounts of corporate and customer data. This includes managed file transfer tools, like Cleo Software, MOVEit, and GoAnywhere, which companies use as a way to send sensitive corporate data over the internet.

Google’s blog post includes email addresses and other technical details that network defenders can use to look for extortion emails and other indications that their Oracle systems may have been compromised.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Oracle E-Business Suite Clop 勒索软件 数据泄露 零日漏洞 网络安全 Extortion Data Breach Zero-Day Vulnerability Cybersecurity
相关文章