Article Details

Scrape Timestamp (UTC): 2025-10-06 11:41:12.409

Source: https://thehackernews.com/2025/10/weekly-recap-oracle-0-day-bitlocker.html

Original Article Text

Click to Toggle View

⚑ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More. The cyber world never hits pause, and staying alert matters more than ever. Every week brings new tricks, smarter attacks, and fresh lessons from the field. This recap cuts through the noise to share what really mattersβ€”key trends, warning signs, and stories shaping today's security landscape. Whether you're defending systems or just keeping up, these highlights help you spot what's coming before it lands on your screen. ⚑ Threat of the Week Oracle 0-Day Under Attack β€” Threat actors with ties to the Cl0p ransomware group have exploited a zero-day flaw in E-Business Suite to facilitate data theft attacks. The vulnerability, tracked as CVE-2025-61882 (CVSS score: 9.8), concerns an unspecified bug that could allow an unauthenticated attacker with network access via HTTP to compromise and take control of the Oracle Concurrent Processing component. In a post shared on LinkedIn, Charles Carmakal, CTO of Mandiant at Google Cloud, said "Cl0p exploited multiple vulnerabilities in Oracle EBS which enabled them to steal large amounts of data from several victims in August 2025," adding "multiple vulnerabilities were exploited including vulnerabilities that were patched in Oracle's July 2025 update as well as one that was patched this weekend (CVE-2025-61882)." Don't Just Find Threats, Fix Them Faster with XM Cyber & Google XM Cyber's integration with Google Security Operations helps you focus on what matters most. Proactively reduce your attack surface by turning security context into a clear, actionable remediation plan. πŸ”” Top News β€ŽοΈβ€πŸ”₯ Trending CVEs Hackers move fast. They often exploit new vulnerabilities within hours, turning a single missed patch into a major breach. One unpatched CVE can be all it takes for a full compromise. Below are this week's most critical vulnerabilities gaining attention across the industry. Review them, prioritize your fixes, and close the gap before attackers take advantage. This week's list includes β€” CVE-2025-27915 (Zimbra Collaboration), CVE-2025-61882 (Oracle E-Business Suite), CVE-2025-4008 (Smartbedded Meteobridge), CVE-2025-10725 (Red Hat OpenShift AI), CVE-2025-59934 (Formbricks), CVE-2024-58260 (SUSE Rancher), CVE-2025-43400 (iOS 26.0.1, iPadOS 26.0.1, iOS 18.7.1, iPadOS 18.7.1, macOS Tahoe 26.0.1, macOS Sequoia 15.7.1, macOS Sonoma 14.8.1, and visionOS 26.0.1), CVE-2025-30247 (Western Digital MyCloud), CVE-2025-41250, CVE-2025-41251, CVE-2025-41252 (Broadcom VMware), CVE-2025-9230, CVE-2025-9231, CVE-2025-9232 (OpenSSL), CVE-2025-52906 (TOTOLINK), CVE-2025-59951 (Termix Docker), CVE-2025-10547 (DrayTek), CVE-2025-49844 (Redis), CVE-2025-57714 (QNAP NetBak Replicator), and vulnerabilities in a Russian guest management system called PassOffice. πŸ“° Around the Cyber World πŸŽ₯ Cybersecurity Webinars πŸ”§ Cybersecurity Tools Disclaimer: These tools are for educational and research use only. They haven't been fully security-tested and could pose risks if used incorrectly. Review the code before trying them, test only in safe environments, and follow all ethical, legal, and organizational rules. πŸ”’ Tip of the Week Quick Windows Hardening with Open-Source Tools β€” Most Windows attacks succeed not because of zero-days, but because of weak defaults β€” open ports, old protocols, reused admin passwords, or missing patches. Attackers exploit what's already there. A few small, smart changes can block most threats before they start. Harden your Windows systems using free, trusted open-source tools that cover audit, configuration, and monitoring. You don't need enterprise tools to raise your defense baseline β€” just a few solid steps. Quick Actions (Under 30 Minutes): Key Risks to Watch: πŸ”‘ Reused or shared admin passwords 🌐 Open RDP/SMB without firewall or NLA βš™οΈ Old PowerShell versions without logging 🧩 Users running with local admin rights πŸͺŸ Missing Defender Attack Surface Reduction (ASR) rules πŸ“¦ Unpatched or unsigned software from third-party repos These simple, repeatable checks close 80% of the attack surface exploited in ransomware and credential theft campaigns. They cost nothing, take minutes, and build muscle memory for good cyber hygiene. Conclusion Thanks for reading this week's recap. Keep learning, stay curious, and don't wait for the next alert to take action. A few smart moves today can save you a lot of cleanup tomorrow.

Daily Brief Summary

VULNERABILITIES // Cl0p Ransomware Exploits Oracle E-Business Suite Zero-Day
β€’

Cl0p ransomware group has targeted Oracle E-Business Suite, exploiting a zero-day vulnerability, CVE-2025-61882, with a critical CVSS score of 9.8, to facilitate data theft.

β€’

The flaw allows unauthenticated attackers to compromise the Oracle Concurrent Processing component via HTTP, posing significant risks to affected organizations.

β€’

Mandiant at Google Cloud reported multiple vulnerabilities were exploited, including those patched in Oracle's July 2025 update and the recent zero-day.

β€’

The rapid exploitation of vulnerabilities by threat actors emphasizes the critical need for timely patch management to prevent breaches.

β€’

Organizations are urged to prioritize patching and implement robust security measures to mitigate potential exploitation risks.

β€’

This incident underscores the ongoing threat posed by ransomware groups leveraging unpatched vulnerabilities for large-scale data theft.

β€’

Security teams should enhance monitoring and response strategies to detect and mitigate similar threats promptly.