
Cl0p Forces Silence from Major Firms After Oracle EBS Extortion
Context and Chronology
Since late November, the extortion group publicly known as Cl0p has posted a rolling list of alleged victims it says were accessed through flaws in Oracle E‑Business Suite (EBS). The postings name more than one hundred organizations across sectors such as semiconductors, construction, consumer goods, healthcare and entertainment. Independent metadata checks tie several public archives to enterprise EBS folders and surface large collections: an archive of about 2 TB linked by forensic traces to Broadcom, and roughly 870 GB associated with Estée Lauder. Some torrent links remain retrievable in public indexes while other material may be redistributed on underground marketplaces.
Not all named organizations have responded the same way. A prominent entertainment operator, Madison Square Garden, has acknowledged that customer records were taken from a vendor‑hosted EBS instance and that notifications to affected individuals followed verification of the compromise; disclosed data types included names and Social Security numbers. Conversely, several very large firms named in Cl0p’s list remain silent or have declined to confirm impact publicly — a posture that shifts legal and disclosure calculus and can extend the timeline for regulatory and investor scrutiny.
Parallel Incidents and Vector Diversity
Reporting from other sources shows contemporaneous intrusions that produced similar outcomes but used different technical vectors. Security teams have observed marketplace‑poisoning campaigns in developer ecosystems (reported under the OpenClaw/ClawHub pattern), malicious packages that harvest credentials and deploy runtime loaders, and discovery of exposed gateway endpoints and API tokens. Separately, a vendor incident reported by LexisNexis described exploitation of an application flaw (cited as React2Shell) combined with poorly protected cloud archival instances; that actor posted multiple gigabytes and claimed mixed hauls including developer artifacts and credentials tied to hundreds of thousands of individuals. These parallel reports suggest the broader phenomenon is not limited to a single exploit class or actor profile.
Threat intelligence communities treat Cl0p as a visible extortion brand that sometimes overlaps with clusters associated with groups such as FIN11, but operational telemetry shows at least two important complications: (1) intrusions that later appear on extortion pages may have originated months earlier than public naming (for example thefts observed in August 2025 with public posting months later), and (2) different intrusions exploit distinct weaknesses—EBS application zero‑days, poisoned marketplace packages, and cloud/archival misconfigurations—so convergence on a single attribution is risky without artifact linkage.
Implications for Risk and Response
For corporate leaders and incident responders the episode underscores three operational priorities. First, treat hosted and vendor‑managed enterprise suites as high‑value targets and require validated attestations and segmentation from providers. Second, assume archived or legacy datasets are live attack surfaces: threat actors re‑use developer secrets and archived credentials to escalate into customer environments. Third, incident disclosure strategies that favour silence or delayed acknowledgement can limit immediate legal triggers but increase the chance that regulators, insurers and shareholders later deem the event material, raising litigation and compliance costs.
Technically, defenders must accelerate EBS‑specific telemetry, prioritize patch orchestration for application‑layer fixes, inventory vendor‑hosted instances, rotate exposed tokens, and validate backup immutability and recovery integrity. Those actions preserve negotiating leverage with insurers and counterparties; failure to act quickly cedes advantage to extortion networks and magnifies downstream fraud and supply‑chain compromise risks.
Full reporting and the original leak listing are documented by SecurityWeek, with corroborating context from industry reporting on Madison Square Garden, OpenClaw/marketplace poisoning, and a LexisNexis archival disclosure.
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you

Madison Square Garden confirms breach linked to Oracle EBS campaign
Madison Square Garden has confirmed a customer data breach tied to the Oracle E-Business Suite intrusion campaign that targeted over one hundred enterprises; personally identifiable information including Social Security numbers was reportedly exposed. The incident traces to an August 2025 exfiltration, public naming by the extortion group in November, and notification activity by MSG in early 2026 — amplifying risks for organizations using hosted Oracle EBS instances.
Global: Over 1,400 Internet‑Accessible MongoDB Instances Compromised in Low‑Value Extortion Campaign
Threat researchers at Flare found roughly 1,416 publicly reachable MongoDB instances altered by an extortion campaign that replaced data with payment demands. Although attackers sought about $500 per victim in cryptocurrency, blockchain checks show only around $400 in receipts, indicating limited financial success despite wide exposure.

LexisNexis breach exposes legacy datasets, raises cloud-hygiene alarm
LexisNexis confirmed an intrusion that exposed legacy files and identifiers, with the attacker alleging exploitation of React2Shell and weak cloud controls. Immediate risks include exposed credentials, roughly 400,000 personal records, and elevated regulatory and insurance scrutiny — a pattern echoed by recent large-scale exfiltrations where fast operational recovery did not eliminate downstream fraud and identity risk.

OpenClaw: Widespread Intrusions Hit Chinese Tech Startups
Security research ties the OpenClaw campaign to a coordinated compromise of its extension ecosystem and widely exposed runtime credentials, which allowed backdoors and token theft to spread across developer environments. Startups and investors have already started emergency containment — rotating tokens, patching gateways, and pausing sensitive deal activity — and the incident will accelerate demand for developer‑centric, enterprise-grade security controls.
Ransomware strike at Ingram Micro exposes sensitive records of ~42,500 people
A July ransomware incident at Ingram Micro led to the theft of employment and applicant records for about 42,521 people and service outages that were largely resolved within a week. A threat actor later published roughly 3.5 TB of claimed data; the company is offering two years of identity protection while facing regulatory notification, legal exposure, and heightened supply‑chain scrutiny.
Ransomware Shift: Low Payouts Force Return to Encryption and Targeted Disruption
Mass data-theft campaigns have lost their profit edge as corporate resistance to paying ransoms grows, prompting ransomware operators to favor encryption and more disruptive tactics. High-profile law-enforcement seizures of prominent forums (e.g., RAMP) are adding friction for criminals but also driving them into more private, invitation-only channels.

U.S. Panera Bread Customer Data Dumped After ShinyHunters Exploit Microsoft Entra SSO
ShinyHunters published a large archive of customer contact data it says was taken from Panera Bread after a failed extortion attempt, claiming about 5.1 million unique email addresses within an asserted 14 million-record haul. Researchers say the Panera intrusion matches a wider, telephone-based social-engineering trend—real-time vishing paired with browser phishing toolkits—and a separate unsecured infostealer cache of roughly 149 million credentials that together amplify risks of credential stuffing and targeted account takeover.

ManoMano: Support-Portal Breach Exposes Millions of Customer Records
ManoMano confirmed a support‑channel compromise tied to a third‑party supplier that a threat actor claims exposed ~37.8 million accounts and ~43 GB of support data. Corroborating incidents show attackers increasingly combine support‑system intrusions with credential caches and real‑time session orchestration—raising immediate risks from phishing, MFA bypass, and long‑tail credential‑stuffing and intensifying EU cross‑border regulatory exposure.