Oracle Clop Data Theft Campaign Started Months Ago
The Clop extortion campaign on Oracle customers last week stemmed from months of intrusion activity tracking back to July 10.
All topics
The Clop extortion campaign on Oracle customers last week stemmed from months of intrusion activity tracking back to July 10.
Dennis and Lindsey dissect a busy week in security news, starting with the Cl0p group’s extortion campaign against Oracle customers (3:24), then moving into the Crimson Collective’s claimed breach of some of Red Hat GitLab’s repos (12:41), and finally the consequences of the expiration of th CISA legislation and de-funding of the MS-ISAC (22:46). We also […]
This aggressive approach aligns with Akira's historical tactics of exploiting VPN infrastructure as an initial access vector.
Cisco’s Talos threat intelligence team said this campaign is the work of an actor it tracks as UAT4356, an APT team that has previously targeted ASA devices.
The incident is a pointed example of how an intrusion at a key point in the software supply chain can have a wide range of downstream effects.
In a new report, ESET researchers have detailed several instances when the two groups’ tools have been found on the same compromised machines in Ukraine.