Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Cox Confirms Oracle EBS Hack as Cybercriminals Name 100 Alleged Victims

0
Medium
Vulnerability
Published: Mon Nov 24 2025 (11/24/2025, 10:52:36 UTC)
Source: SecurityWeek

Description

More than 1.6 Tb of data allegedly stolen from Cox was made public by the hackers. The post Cox Confirms Oracle EBS Hack as Cybercriminals Name 100 Alleged Victims appeared first on SecurityWeek .

AI-Powered Analysis

AILast updated: 11/24/2025, 10:53:16 UTC

Technical Analysis

The reported security incident involves a confirmed breach of Cox Communications' Oracle E-Business Suite (EBS) environment, where cybercriminals have allegedly stolen and publicly disclosed more than 1.6 terabytes of data. Oracle EBS is a widely used enterprise resource planning (ERP) platform that manages critical business processes such as finance, supply chain, and human resources. The breach indicates a significant compromise of sensitive corporate data, potentially including personally identifiable information (PII), financial records, and proprietary business information. Although the exact attack vector remains undisclosed, such breaches often result from exploiting misconfigurations, unpatched vulnerabilities, or compromised credentials within the Oracle EBS infrastructure. The attackers have named around 100 alleged victims, suggesting that the breach may have exposed data related to multiple organizations or individuals connected to Cox. No specific CVEs or patches have been referenced, and no known exploits are currently reported in the wild, which may indicate a targeted or sophisticated attack rather than a widespread automated exploit. The incident underscores the importance of securing ERP systems, which are high-value targets due to the sensitive data they contain and their integral role in business operations. The public release of such a large data volume can lead to secondary attacks such as identity theft, fraud, and corporate espionage. Organizations using Oracle EBS, especially those with integrations or partnerships with Cox, should conduct thorough security assessments and incident response activities.

Potential Impact

For European organizations, the breach poses significant risks to confidentiality and integrity of sensitive data, potentially affecting customers, partners, and internal operations. The exposure of large volumes of data can lead to identity theft, financial fraud, and reputational damage. Organizations relying on Oracle EBS for critical business functions may experience operational disruptions if the breach leads to further exploitation or ransomware attacks. Additionally, regulatory compliance impacts under GDPR are considerable, as data breaches involving personal data require notification and may result in fines. The breach also raises concerns about supply chain security, especially for European companies connected to Cox or its ecosystem. The public disclosure of alleged victims may increase targeted phishing or social engineering attacks against those entities. Overall, the breach could undermine trust in affected organizations and lead to long-term financial and legal consequences.

Mitigation Recommendations

European organizations should immediately review and harden their Oracle EBS environments by applying the latest security patches and updates, even if no specific CVEs have been identified. Conduct comprehensive audits of user access controls, ensuring least privilege principles and multi-factor authentication (MFA) are enforced for all administrative and remote access. Implement continuous monitoring and anomaly detection to identify unusual activities within Oracle EBS and related network segments. Encrypt sensitive data at rest and in transit to reduce exposure in case of compromise. Conduct thorough incident response exercises and prepare communication plans for potential data breach notifications under GDPR. Engage with Cox and other partners to understand the breach scope and shared risks. Additionally, perform supply chain risk assessments to identify and mitigate dependencies that could be exploited. Regularly back up critical data and verify backup integrity to enable recovery in case of ransomware or data destruction attacks. Finally, educate employees on phishing and social engineering risks that may increase following the breach disclosure.

Need more detailed analysis?Get Pro

Threat ID: 6924390e296ff79352ebf870

Added to database: 11/24/2025, 10:53:02 AM

Last enriched: 11/24/2025, 10:53:16 AM

Last updated: 11/25/2025, 9:44:18 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats