Recent Oracle EBS Breaches: Korean Air and University of Phoenix Targeted

Published:

spot_img

Impact of CL0P Ransomware Attacks: Latest Developments

The aftermath of the CL0P ransomware group’s aggressive campaign targeting Oracle E-Business Suite (EBS) vulnerabilities continues to unfold. Recently, both Korean Air and the University of Phoenix disclosed that they fell victim to this widespread cyberattack, which has left many organizations grappling with the implications of compromised data.

University of Phoenix Confirms Breach

This month, the University of Phoenix made headlines with an SEC filing revealing its involvement in the latest string of cyberattacks linked to Oracle EBS vulnerabilities. After being publicly named as a victim by the CL0P group on their dark web leak site, the university provided additional details of the breach to the Maine Attorney General’s office. The data breach potentially affects approximately 3.5 million individuals, exposing sensitive information such as names, dates of birth, Social Security numbers, and even bank account details.

Support for Affected Individuals

In a proactive move, the University of Phoenix is offering victims complimentary identity protection services. These services include a year of credit monitoring, dark web surveillance, and comprehensive identity theft recovery options. Additionally, each victim is entitled to a $1 million identity fraud loss reimbursement policy, aimed at alleviating some of the stress associated with identity theft.

Korean Air and Employee Data Compromise

Korean Air is also dealing with the repercussions of this cyberattack, apparently linked to the same Oracle EBS campaign. Reports surfaced that KC&D Service, a private equity-owned subsidiary once responsible for in-flight catering, identified a data leak involving personal information of about 30,000 airline employees. The internal notice revealed that names and bank account information were among the compromised data. However, the airline affirmed that there was no breach of customer data.

Company Response

In a message sent to employees, Woo Kee-hong, vice chairman of Korean Air, emphasized the gravity of the situation: “Korean Air takes this incident very seriously, especially since it involves employee data… We are currently focusing all our efforts on identifying the full scope of the breach and who was affected.” While there were no explicit mentions of the Oracle EBS campaign in the reports, the name “Korean Air Catering” appeared among over 100 victims listed on CL0P’s data leak site.

Widespread Victims of the CL0P Campaign

The ripple effects of this campaign have not been limited to just these two organizations. Other confirmed victims include prominent institutions such as The Washington Post, Harvard University, Dartmouth College, and American Airlines’ Envoy Air. Major companies like Logitech, Cox, Mazda, Canon, and Hitachi’s GlobalLogic have also reported being affected.

CL0P’s Expanding Reach in Cyberattacks

CL0P has secured a reputation as a leading ransomware group, leveraging vulnerabilities in file sharing and transfer services. As per Cyble threat intelligence, CL0P has accumulated over 1,000 known victims over its six-year track record. The group has executed formidable campaigns against various platforms, including Cleo MFT, MOVEit, and SolarWinds Serv-U, among others.

Connection to Broader Threat Groups

Amidst the fallout from these attacks, industry experts have linked the Oracle EBS campaign to the FIN11 threat group, suggesting that CL0P might be acting as the public face of the operation. Their willingness to exploit known vulnerabilities has resulted in a significant spike in ransomware incidents in recent months, making it crucial for organizations to bolster their cybersecurity measures.

Final Thoughts on Cybersecurity

As organizations like Korean Air and the University of Phoenix grapple with the effects of CL0P’s attacks, the importance of robust cybersecurity practices and ongoing monitoring cannot be overstated. With the growing sophistication of such threat actors, protecting sensitive personal information remains a top priority for all entities involved.

spot_img

Related articles

Recent articles

CISOs Shift Focus from Security to Resilience: A 2023 Imperative for Critical Infrastructure

CISOs Shift Focus from Security to Resilience: A 2023 Imperative for Critical Infrastructure In the evolving landscape of cybersecurity, the traditional pursuit of 100% prevention...

Cybersecurity Stocks Q4 Earnings Show Mixed Results: Varonis Reports Growth, CrowdStrike Leads Peers

Cybersecurity Stocks Q4 Earnings Show Mixed Results: Varonis Reports Growth, CrowdStrike Leads Peers March 19, 2026 – The latest financial performance review of cybersecurity stocks...

Li Ning Company Limited Strengthens Competitive Edge with 3.2% Revenue Growth in 2025 Annual Results

Li Ning Company Limited Strengthens Competitive Edge with 3.2% Revenue Growth in 2025 Annual Results Li Ning Company Limited has announced its audited annual results...

Interlock Ransomware Exploits Cisco FMC Zero-Day Vulnerability 36 Days Prior to Public Disclosure

Interlock Ransomware Exploits Cisco FMC Zero-Day Vulnerability 36 Days Prior to Public Disclosure A recent investigation by Amazon's threat intelligence teams has unveiled a significant...