Recent Oracle EBS Breaches: Korean Air and University of Phoenix Targeted

Published:

spot_img

Impact of CL0P Ransomware Attacks: Latest Developments

The aftermath of the CL0P ransomware group’s aggressive campaign targeting Oracle E-Business Suite (EBS) vulnerabilities continues to unfold. Recently, both Korean Air and the University of Phoenix disclosed that they fell victim to this widespread cyberattack, which has left many organizations grappling with the implications of compromised data.

University of Phoenix Confirms Breach

This month, the University of Phoenix made headlines with an SEC filing revealing its involvement in the latest string of cyberattacks linked to Oracle EBS vulnerabilities. After being publicly named as a victim by the CL0P group on their dark web leak site, the university provided additional details of the breach to the Maine Attorney General’s office. The data breach potentially affects approximately 3.5 million individuals, exposing sensitive information such as names, dates of birth, Social Security numbers, and even bank account details.

Support for Affected Individuals

In a proactive move, the University of Phoenix is offering victims complimentary identity protection services. These services include a year of credit monitoring, dark web surveillance, and comprehensive identity theft recovery options. Additionally, each victim is entitled to a $1 million identity fraud loss reimbursement policy, aimed at alleviating some of the stress associated with identity theft.

Korean Air and Employee Data Compromise

Korean Air is also dealing with the repercussions of this cyberattack, apparently linked to the same Oracle EBS campaign. Reports surfaced that KC&D Service, a private equity-owned subsidiary once responsible for in-flight catering, identified a data leak involving personal information of about 30,000 airline employees. The internal notice revealed that names and bank account information were among the compromised data. However, the airline affirmed that there was no breach of customer data.

Company Response

In a message sent to employees, Woo Kee-hong, vice chairman of Korean Air, emphasized the gravity of the situation: “Korean Air takes this incident very seriously, especially since it involves employee data… We are currently focusing all our efforts on identifying the full scope of the breach and who was affected.” While there were no explicit mentions of the Oracle EBS campaign in the reports, the name “Korean Air Catering” appeared among over 100 victims listed on CL0P’s data leak site.

Widespread Victims of the CL0P Campaign

The ripple effects of this campaign have not been limited to just these two organizations. Other confirmed victims include prominent institutions such as The Washington Post, Harvard University, Dartmouth College, and American Airlines’ Envoy Air. Major companies like Logitech, Cox, Mazda, Canon, and Hitachi’s GlobalLogic have also reported being affected.

CL0P’s Expanding Reach in Cyberattacks

CL0P has secured a reputation as a leading ransomware group, leveraging vulnerabilities in file sharing and transfer services. As per Cyble threat intelligence, CL0P has accumulated over 1,000 known victims over its six-year track record. The group has executed formidable campaigns against various platforms, including Cleo MFT, MOVEit, and SolarWinds Serv-U, among others.

Connection to Broader Threat Groups

Amidst the fallout from these attacks, industry experts have linked the Oracle EBS campaign to the FIN11 threat group, suggesting that CL0P might be acting as the public face of the operation. Their willingness to exploit known vulnerabilities has resulted in a significant spike in ransomware incidents in recent months, making it crucial for organizations to bolster their cybersecurity measures.

Final Thoughts on Cybersecurity

As organizations like Korean Air and the University of Phoenix grapple with the effects of CL0P’s attacks, the importance of robust cybersecurity practices and ongoing monitoring cannot be overstated. With the growing sophistication of such threat actors, protecting sensitive personal information remains a top priority for all entities involved.

spot_img

Related articles

Recent articles

Google’s Dark Web Monitoring Is Ending: Next Steps for You

Google is set to discontinue its dark web monitoring service designed to warn users about the exposure of personal information, such as names, email...

Understanding the Digital Trust Crisis: Why We Question Every Click

When Convenience Turns into Caution The internet was originally founded on a principle of trust: confidence that online transactions would be secure, personal identities would...

84 Hours of Internet Blackout in Iran Amid Growing Unrest

Iran's Internet Blackout: A Deepening Crisis Amid Unrest Four Days Without Connectivity Iran has plunged into a state of digital isolation as an internet blackout enters...

NSA Appoints Timothy Kosiba to Lead Cybersecurity Strategy

Appointment of Timothy Kosiba as NSA Deputy Director: A Leadership Milestone The National Security Agency (NSA) has recently announced a pivotal leadership change with the...