Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

17th November – Threat Intelligence Report

0
Medium
Vulnerability
Published: Mon Nov 17 2025 (11/17/2025, 11:04:52 UTC)
Source: Check Point Research

Description

For the latest discoveries in cyber research for the week of 17th November, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Cl0p’s Oracle E-Business Suite (CVE-2025-61882) zero-day campaign continues to expand. There are new confirmed breaches at The Washington Post, Logitech, Allianz UK, and GlobalLogic, as well as a newly listed but unconfirmed […] The post 17th November – Threat Intelligence Report appeared first on Check Point Research .

AI-Powered Analysis

AILast updated: 12/16/2025, 08:23:02 UTC

Technical Analysis

The primary threat detailed is the ongoing exploitation of a zero-day vulnerability in Oracle E-Business Suite (CVE-2025-61882) by the Cl0p ransomware group. This vulnerability enables remote code execution, allowing attackers to gain unauthorized access to enterprise systems. The exploitation campaign has resulted in confirmed breaches at high-profile organizations including Allianz UK, Logitech, The Washington Post, and GlobalLogic, with unconfirmed reports involving the British NHS. Attackers have exfiltrated data ranging from gigabytes to terabytes and are conducting extortion via ransom demands. Oracle issued emergency patches; however, investigations reveal exploitation began months before public disclosure, indicating a prolonged undetected threat presence. The report also highlights other critical vulnerabilities actively exploited: a Windows kernel privilege escalation (CVE-2025-62215), a critical GDI+ remote code execution flaw (CVE-2025-60724), Cisco Identity Services Engine and Citrix zero-days enabling remote code execution without authentication, and a Triofox authentication bypass allowing attacker persistence and remote access tool deployment. Additionally, pro-Russian threat actors have launched DDoS attacks against Danish government and defense-related websites, aligning with geopolitical conflict patterns. The threat landscape is compounded by ransomware activity, phishing campaigns abusing Meta’s Facebook Business Suite, and malvertising networks targeting payroll and financial systems. Check Point IPS protections are available for several of these vulnerabilities, emphasizing the importance of layered defense. The combination of zero-day exploits, data breaches, and geopolitical cyber operations illustrates a complex, multi-faceted threat environment impacting global and European organizations.

Potential Impact

European organizations face significant risks from the Oracle E-Business Suite zero-day exploitation, particularly those in finance, manufacturing, and public sectors that rely heavily on Oracle EBS. Successful exploitation can lead to unauthorized remote code execution, data exfiltration of sensitive corporate and personal information, operational disruption, and financial extortion. The confirmed breach of Allianz UK underscores the threat to European financial institutions. The unconfirmed NHS breach raises concerns about potential impacts on critical healthcare infrastructure. The prolonged undetected exploitation period increases the likelihood of widespread compromise and secondary attacks. Additional vulnerabilities in Microsoft, Cisco, Citrix, and Triofox products, which are widely used in European enterprises, further elevate risk levels by enabling privilege escalation and persistent access. The DDoS attacks on Danish government and defense-related websites demonstrate the threat of service disruption tied to geopolitical conflicts, potentially affecting public trust and government operations. Collectively, these threats can degrade confidentiality, integrity, and availability of critical systems, cause reputational damage, regulatory penalties under GDPR, and financial losses. The broad targeting of SMBs via phishing and malvertising campaigns also threatens European small and medium enterprises, which may lack robust defenses.

Mitigation Recommendations

1. Immediate application of Oracle’s emergency patches for CVE-2025-61882 across all Oracle E-Business Suite deployments, prioritizing critical and internet-facing systems. 2. Conduct comprehensive network segmentation to isolate Oracle EBS environments and limit lateral movement in case of compromise. 3. Deploy and update intrusion prevention systems (IPS) such as Check Point IPS signatures that detect and block exploitation attempts for Oracle, Microsoft, Cisco, Citrix, and Triofox vulnerabilities. 4. Implement continuous monitoring and threat hunting focused on unusual access patterns, new admin account creations, and data exfiltration indicators within Oracle EBS and related systems. 5. Harden endpoint security by applying all relevant patches from Microsoft’s October Patch Tuesday and Cisco/Citrix updates, ensuring no legacy or unpatched systems remain exposed. 6. Enhance email security and user awareness training to mitigate phishing campaigns abusing Meta’s Facebook Business Suite and malvertising threats. 7. Review and securely decommission legacy cloud storage systems to prevent data leakage as seen in the Checkout.com breach. 8. For government and critical infrastructure entities, prepare DDoS mitigation strategies including traffic filtering and scrubbing services to counter pro-Russian attacks. 9. Conduct regular incident response drills incorporating scenarios involving ransomware extortion and zero-day exploitation. 10. Engage with threat intelligence providers to stay updated on emerging indicators of compromise and attacker TTPs related to these threats.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://research.checkpoint.com/2025/17th-november-threat-intelligence-report/","fetched":true,"fetchedAt":"2025-11-17T11:06:25.378Z","wordCount":976}

Threat ID: 691b01b1502dbbeec6d34efd

Added to database: 11/17/2025, 11:06:25 AM

Last enriched: 12/16/2025, 8:23:02 AM

Last updated: 1/7/2026, 10:23:50 AM

Views: 213

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats