Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

17th November – Threat Intelligence Report

0
Medium
Vulnerability
Published: Mon Nov 17 2025 (11/17/2025, 11:04:52 UTC)
Source: Check Point Research

Description

For the latest discoveries in cyber research for the week of 17th November, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Cl0p’s Oracle E-Business Suite (CVE-2025-61882) zero-day campaign continues to expand. There are new confirmed breaches at The Washington Post, Logitech, Allianz UK, and GlobalLogic, as well as a newly listed but unconfirmed […] The post 17th November – Threat Intelligence Report appeared first on Check Point Research .

AI-Powered Analysis

AILast updated: 11/17/2025, 11:06:42 UTC

Technical Analysis

This threat intelligence report highlights an ongoing and expanding zero-day exploitation campaign by the Cl0p ransomware group targeting Oracle E-Business Suite (CVE-2025-61882). The vulnerability enables remote code execution within Oracle EBS, a widely deployed enterprise resource planning platform. Exploitation has led to confirmed breaches at high-profile organizations including Allianz UK, Logitech, The Washington Post, and GlobalLogic, with a suspected breach of the British NHS. Attackers exfiltrate data ranging from gigabytes to terabytes and use extortion tactics against Oracle EBS customers. Oracle has issued emergency patches, but investigations reveal exploitation started months prior to disclosure, indicating prolonged undetected access. The report also details other critical zero-day vulnerabilities actively exploited in Microsoft Windows (kernel privilege escalation CVE-2025-62215 and GDI+ RCE CVE-2025-60724), Cisco Identity Services Engine (CVE-2025-20337), Citrix NetScaler (CVE-2025-5777), and Triofox enterprise file sharing platform (CVE-2025-12480). These flaws allow remote code execution, authentication bypass, and deployment of persistent webshells without requiring authentication, severely compromising affected systems. Additional threats include social engineering breaches (DoorDash), data leaks from legacy cloud storage (Checkout.com), and DDoS attacks by pro-Russian groups targeting Danish government and Russian port operator infrastructure. The report underscores a fragmented ransomware landscape with numerous active groups and rising attack volumes, alongside emerging risks from AI-related data leakage and sophisticated phishing campaigns. Protection is available via Check Point IPS signatures for several vulnerabilities. The report emphasizes the need for urgent patching, threat monitoring, and incident response readiness.

Potential Impact

European organizations face significant risks from this threat landscape. The Oracle E-Business Suite zero-day exploitation threatens confidentiality and integrity of critical business data, potentially leading to large-scale data breaches, operational disruption, and ransomware extortion. Breaches at Allianz UK and suspected NHS involvement highlight risks to financial services and healthcare sectors, which are vital to European economies and public welfare. The active exploitation of critical vulnerabilities in Microsoft, Cisco, Citrix, and Triofox products further exposes enterprises to remote code execution and privilege escalation attacks, enabling attackers to gain persistent access and control over networks. DDoS attacks against Danish government and defense-related sites demonstrate ongoing geopolitical cyber conflict risks, potentially disrupting public services and critical infrastructure. The combination of zero-day exploits, social engineering, and ransomware campaigns increases the attack surface and complicates defense efforts. Failure to mitigate these threats could result in financial losses, regulatory penalties under GDPR, reputational damage, and erosion of trust among customers and partners.

Mitigation Recommendations

1. Immediate deployment of Oracle's emergency patches for CVE-2025-61882 and all other vendor-issued updates for Microsoft, Cisco, Citrix, and Triofox vulnerabilities is critical to close known attack vectors. 2. Implement network segmentation to isolate Oracle EBS servers and other critical infrastructure, limiting lateral movement in case of compromise. 3. Enhance monitoring and logging for unusual activities on Oracle EBS, Windows kernel events, and network traffic to detect exploitation attempts early. 4. Deploy advanced intrusion prevention systems (IPS) with signatures for these specific vulnerabilities, such as those provided by Check Point, to block known exploit attempts. 5. Conduct thorough audits of legacy cloud storage and decommission unused systems securely to prevent data leakage. 6. Train employees to recognize and resist social engineering and phishing attacks, especially in sectors targeted by recent campaigns. 7. Establish incident response plans tailored to ransomware and data breach scenarios, including data backup verification and recovery procedures. 8. Collaborate with threat intelligence providers to stay updated on emerging threats and attacker tactics. 9. For organizations in critical infrastructure sectors, coordinate with national cybersecurity agencies to share information and receive support. 10. Review and tighten access controls, especially for remote access and VPN solutions, to prevent unauthorized persistence as seen in recent attacks.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://research.checkpoint.com/2025/17th-november-threat-intelligence-report/","fetched":true,"fetchedAt":"2025-11-17T11:06:25.378Z","wordCount":976}

Threat ID: 691b01b1502dbbeec6d34efd

Added to database: 11/17/2025, 11:06:25 AM

Last enriched: 11/17/2025, 11:06:42 AM

Last updated: 11/22/2025, 4:33:51 AM

Views: 115

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats