Company Details
cox-enterprises
34,920
122,740
51
coxenterprises.com
0
COX_6514943
In-progress

Cox Enterprises Company CyberSecurity Posture
coxenterprises.comThousands of employees, one goal: empower people today to build a better future for the next generation. How do we do that? By disrupting industries. By treating our employees as our most important resource. By improving the quality of life in our communities and by protecting our planet. We create a culture with flexible career growth, generous benefits and an environment where you’re empowered to make time for teammates, family, friends and yourself. Founded in 1898, Cox’s legacy of innovation continues to drive us forward today. We know great things never came from comfort zones. Today we’re powering smart cities with powerhouse broadband communications, pioneering greener modes of transportation and hatching new technologies to slash the glut of global waste. Through our investments and our major divisions — Cox Communications and Cox Automotive — we’re focused on the future of mobility, connectivity and sustainability. We are a global, family-owned organization with a purpose. Come build a better future with us and make your mark.
Company Details
cox-enterprises
34,920
122,740
51
coxenterprises.com
0
COX_6514943
In-progress
Between 650 and 699

Cox Enterprises Global Score (TPRM)XXXX

Description: In January 2023, 1.4M records from the Autotrader online vehicle marketplace appeared on a popular hacking forum. The data relates to aged listing data that was generally publicly available on our site at the time and open to automated collection methods. The data contained 20k unique email addresses alongside physical addresses and phone numbers of dealers and vehicle details including VIN numbers.
Description: Cox Communications, a large cable company recently suffered a data breach incident in December 2021. The attackers impersonated a Cox agent through a social engineering attack and managed to access the company's customer data. The compromised data includes address, telephone number, Cox account number, usernames, and other personal information of the customers. The company with the help of cyber security experts investigated the attack and secured its data from such future attacks and notified the affected customers of the breach.
Description: Cox Communications suffered a cyber attack that caused an internet outage that affected the Tucson region. no customer information was compromised in the attack. however, the Cox says their efforts to stop the attack were the reason for the internet outage.
Description: Cox Enterprises, a U.S.-based conglomerate with operations in telecommunications, media, and automotive services (e.g., Cox Communications, Autotrader), suffered a **sophisticated data breach** via a **zero-day exploit (CVE-2025-61882)** in Oracle’s E-Business Suite. Hackers, linked to the **Cl0p ransomware group**, infiltrated the network between **August 9–14, 2025**, exfiltrating **1.6TB of data**—including **sensitive personal information of 9,479 individuals** (names, addresses, dates of birth, Social Security numbers, and internal documents). The breach was detected in **late September 2025**, with Cl0p leaking the data on the dark web. The attack exploited an **unpatched critical vulnerability (CVSS 9.8)** allowing unauthorized database access, heightening risks of **identity theft, financial fraud, and reputational damage**. Oracle released an emergency patch post-breach, but the delay enabled widespread exploitation across other high-profile targets (e.g., The Washington Post, Harvard University). Cox offered affected parties **credit monitoring**, though long-term risks persist. The incident underscores vulnerabilities in **ERP systems**, **supply chain security gaps**, and the escalating threat of **ransomware-as-a-service (RaaS)** campaigns targeting enterprise software.
Description: Cox Enterprises disclosed a data breach stemming from a zero-day exploit (CVE-2025-61882) in Oracle E-Business Suite, discovered in late September 2024 after hackers breached its network in August. The Cl0p ransomware group claimed responsibility, exploiting the vulnerability before Oracle released a patch on October 5. While the company confirmed exposure of personal data, the specific types of compromised information (e.g., financial, employee, or customer records) were not disclosed. The delayed detection suggests prolonged unauthorized access, though the full scope of the leak—including whether sensitive data like SSNs, financial details, or proprietary business information was exfiltrated—remains unclear. The incident underscores the risks of third-party software vulnerabilities and the operational gaps in timely threat detection.
Description: On May 16, 2019, the Massachusetts Office of Consumer Affairs and Business Regulation reported a data breach involving RapidScale, Inc. The breach affected 2 residents and compromised electronic records, specifically credit and debit numbers. This incident highlights the vulnerability of financial information in digital systems and the potential impact on individuals' financial security.


Cox Enterprises has 0.0% fewer incidents than the average of same-industry companies with at least one recorded incident.
Cox Enterprises has 56.25% more incidents than the average of all companies with at least one recorded incident.
Cox Enterprises reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
Cox Enterprises cyber incidents detection timeline including parent company and subsidiaries

Thousands of employees, one goal: empower people today to build a better future for the next generation. How do we do that? By disrupting industries. By treating our employees as our most important resource. By improving the quality of life in our communities and by protecting our planet. We create a culture with flexible career growth, generous benefits and an environment where you’re empowered to make time for teammates, family, friends and yourself. Founded in 1898, Cox’s legacy of innovation continues to drive us forward today. We know great things never came from comfort zones. Today we’re powering smart cities with powerhouse broadband communications, pioneering greener modes of transportation and hatching new technologies to slash the glut of global waste. Through our investments and our major divisions — Cox Communications and Cox Automotive — we’re focused on the future of mobility, connectivity and sustainability. We are a global, family-owned organization with a purpose. Come build a better future with us and make your mark.


A globo é feita de gente que quer fazer diferente, fazer junto, fazer o futuro. Gente espalhada por todo o país (e mundo!) trabalhando com conteúdo, notícias, negócios, tecnologia e brasilidade de sobra. Canais na TV aberta e por assinatura, produtos digitais como globoplay, Cartola, g1, ge, gsho
.png)
Some Atlantans and companies are dabbling in AI, while others have fully embraced it. But with any fast-changing technology promising opportunity,...
Cox Enterprises breached via Oracle E-Business Suite zero‑day, exposing data of 9,479 individuals; Cl0p ransomware group claimed...
Canon confirms a U.S. subsidiary was impacted by the Oracle EBS hacking campaign linked to the Cl0p ransomware group, but states the breach...
Cybercriminals use command-and-control (C2) servers to manage botnets and distribute malware. Last week, Kaspersky revealed that the...
The Silent Siege: Cox Enterprises' Oracle Breach and the Shadowy World of Zero-Day Exploits. In the ever-evolving landscape of cybersecurity...
CrowdStrike catches insider selling data, Spanish airline Iberia suffers breach and data leak, AI is too risky to insure, say insurers.
Cox Enterprises has confirmed that its Oracle E-Business Suite (EBS) instance was impacted in the recent cybercrime campaign that has...
Cox Enterprises is notifying impacted individuals of a data breach that exposed their personal data to hackers who breached the company...
The UK's national healthcare system is working with the country's National Cyber Security Centre to investigate the incident.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Cox Enterprises is http://www.coxenterprises.com.
According to Rankiteo, Cox Enterprises’s AI-generated cybersecurity score is 668, reflecting their Weak security posture.
According to Rankiteo, Cox Enterprises currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Cox Enterprises is not certified under SOC 2 Type 1.
According to Rankiteo, Cox Enterprises does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Cox Enterprises is not listed as GDPR compliant.
According to Rankiteo, Cox Enterprises does not currently maintain PCI DSS compliance.
According to Rankiteo, Cox Enterprises is not compliant with HIPAA regulations.
According to Rankiteo,Cox Enterprises is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Cox Enterprises operates primarily in the Technology, Information and Media industry.
Cox Enterprises employs approximately 34,920 people worldwide.
Cox Enterprises presently has no subsidiaries across any sectors.
Cox Enterprises’s official LinkedIn profile has approximately 122,740 followers.
Cox Enterprises is classified under the NAICS code 51, which corresponds to Information.
Yes, Cox Enterprises has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/cox-enterprises.
Yes, Cox Enterprises maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/cox-enterprises.
As of November 27, 2025, Rankiteo reports that Cox Enterprises has experienced 6 cybersecurity incidents.
Cox Enterprises has an estimated 949 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak, Breach, Cyber Attack and Ransomware.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with cyber security experts, and recovery measures with investigated the attack and secured its data from such future attacks, and communication strategy with notified the affected customers of the breach, and containment measures with efforts to stop the attack, and and communication strategy with public disclosure emphasizing no customer data compromise, and and third party assistance with potential involvement of mandiant (forensic investigation), and containment measures with patch application (oracle emergency patch on 2025-10-04), containment measures with network segmentation (assumed), and remediation measures with free credit monitoring for affected individuals, remediation measures with ongoing forensic investigation, and communication strategy with notification letters to affected parties, communication strategy with public disclosure via maine attorney general’s office filing, and network segmentation with recommended (not explicitly confirmed), and enhanced monitoring with recommended (not explicitly confirmed)..
Title: Cox Communications Data Breach
Description: Cox Communications suffered a data breach incident in December 2021 where attackers impersonated a Cox agent through a social engineering attack and accessed customer data.
Date Detected: December 2021
Type: Data Breach
Attack Vector: Social Engineering
Vulnerability Exploited: Human vulnerability through impersonation
Title: Cyber Attack on Cox Communications
Description: Cox Communications suffered a cyber attack that caused an internet outage affecting the Tucson region. No customer information was compromised in the attack. The efforts to stop the attack were the reason for the internet outage.
Type: Cyber Attack
Title: Autotrader Data Breach
Description: In January 2023, 1.4 million records from the Autotrader online vehicle marketplace appeared on a popular hacking forum. The data relates to aged listing data that was generally publicly available on our site at the time and open to automated collection methods. The data contained 20,000 unique email addresses alongside physical addresses and phone numbers of dealers and vehicle details including VIN numbers.
Date Detected: 2023-01-01
Type: Data Breach
Attack Vector: Automated Collection Methods
Vulnerability Exploited: Publicly Available Data
Title: RapidScale, Inc. Data Breach
Description: A data breach involving RapidScale, Inc. was reported by the Massachusetts Office of Consumer Affairs and Business Regulation. The breach affected 2 residents and compromised electronic records, specifically credit and debit numbers.
Date Publicly Disclosed: 2019-05-16
Type: Data Breach
Title: CrowdStrike Insider Threat Incident
Description: CrowdStrike confirmed that an insider shared screenshots taken on internal systems. The company emphasized that its systems were not breached, and customers’ data was not compromised. The threat group responsible was not specified.
Type: Insider Threat
Attack Vector: Internal (Insider)
Title: The Silent Siege: Cox Enterprises’ Oracle Breach and the Shadowy World of Zero-Day Exploits
Description: Cox Enterprises, a U.S. conglomerate in telecommunications, media, and automotive services, suffered a data breach due to a zero-day exploit (CVE-2025-61882) in Oracle’s E-Business Suite. The breach, attributed to the Cl0p ransomware group, exposed sensitive personal data of 9,479 individuals, including names, addresses, dates of birth, Social Security numbers, and other identifiers. The incident occurred between August 9–14, 2025, but was detected in late September. Cl0p leaked 1.6 TB of stolen data on the dark web, and Cox offered affected parties free credit monitoring. The breach highlights vulnerabilities in ERP systems and the risks of delayed patching, with broader implications for supply chain security and regulatory compliance.
Date Detected: 2025-09-01T00:00:00Z
Date Publicly Disclosed: 2025-09-30T00:00:00Z
Type: Data Breach
Attack Vector: Zero-Day Exploit (CVE-2025-61882)Unauthenticated AccessMulti-Stage Java ImplantsData Exfiltration
Vulnerability Exploited: CVE-2025-61882 (Critical Authentication Bypass in Oracle E-Business Suite)
Threat Actor: Cl0p Ransomware Group (alleged)
Motivation: Financial GainData TheftExtortion
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Zero-day exploit (CVE-2025-61882) in Oracle E-Business Suite.

Data Compromised: Address, Telephone number, Cox account number, Usernames, Other personal information

Systems Affected: Internet Services
Downtime: Internet Outage
Operational Impact: Internet Services Disrupted

Data Compromised: Email addresses, Physical addresses, Phone numbers, Vehicle details including vin numbers

Data Compromised: Credit and debit numbers

Data Compromised: Internal screenshots (no customer data)
Brand Reputation Impact: Potential reputational risk due to insider incident

Data Compromised: Names, Addresses, Dates of birth, Social security numbers, Personal identifiers, Internal documents, Employee records, Customer details
Systems Affected: Oracle E-Business SuiteERP SystemsDatabases
Operational Impact: Potential disruption to HR, financial, and supply chain operations
Brand Reputation Impact: High (potential erosion of customer trust, regulatory scrutiny)
Legal Liabilities: Potential lawsuits (e.g., Bloomberg Law report on Oracle’s liability)Regulatory fines under GDPR/CCPA
Identity Theft Risk: High (9,479 individuals affected)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Address, Telephone Number, Cox Account Number, Usernames, Other Personal Information, , Email Addresses, Physical Addresses, Phone Numbers, Vehicle Details Including Vin Numbers, , credit and debit numbers, Internal screenshots, Pii (Personally Identifiable Information), Internal Documents, Employee Records, Customer Details and .

Entity Name: Cox Communications
Entity Type: Corporation
Industry: Telecommunications
Size: Large

Entity Name: Cox Communications
Entity Type: Telecommunications Company
Industry: Telecommunications
Location: Tucson Region

Entity Name: Autotrader
Entity Type: Company
Industry: Online Vehicle Marketplace

Entity Name: RapidScale, Inc.
Entity Type: Company
Customers Affected: 2

Entity Name: CrowdStrike
Entity Type: Cybersecurity Company
Industry: Technology
Location: Global (HQ: USA)
Customers Affected: None (no customer data compromised)

Entity Name: Cox Enterprises
Entity Type: Conglomerate
Industry: Telecommunications, Media, Automotive Services
Location: United States
Size: 55,000+ employees, $23B+ annual revenue
Customers Affected: 9,479 individuals

Incident Response Plan Activated: True
Third Party Assistance: Cyber security experts
Recovery Measures: Investigated the attack and secured its data from such future attacks
Communication Strategy: Notified the affected customers of the breach

Containment Measures: Efforts to stop the attack

Incident Response Plan Activated: True
Communication Strategy: Public disclosure emphasizing no customer data compromise

Incident Response Plan Activated: True
Third Party Assistance: Potential Involvement Of Mandiant (Forensic Investigation).
Containment Measures: Patch application (Oracle emergency patch on 2025-10-04)Network segmentation (assumed)
Remediation Measures: Free credit monitoring for affected individualsOngoing forensic investigation
Communication Strategy: Notification letters to affected partiesPublic disclosure via Maine Attorney General’s Office filing
Network Segmentation: Recommended (not explicitly confirmed)
Enhanced Monitoring: Recommended (not explicitly confirmed)
Third-Party Assistance: The company involves third-party assistance in incident response through Cyber security experts, Potential involvement of Mandiant (forensic investigation), .

Type of Data Compromised: Address, Telephone number, Cox account number, Usernames, Other personal information

Type of Data Compromised: Email addresses, Physical addresses, Phone numbers, Vehicle details including vin numbers
Number of Records Exposed: 1,400,000

Type of Data Compromised: credit and debit numbers
Number of Records Exposed: 2

Type of Data Compromised: Internal screenshots
Sensitivity of Data: Moderate (internal systems)
File Types Exposed: Screenshots

Type of Data Compromised: Pii (personally identifiable information), Internal documents, Employee records, Customer details
Number of Records Exposed: 9,479 individuals
Sensitivity of Data: High (includes SSNs, dates of birth, addresses)
Data Exfiltration: 1.6 TB of data leaked on the dark web
File Types Exposed: DatabasesDocumentsHR/Employee Records
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Free credit monitoring for affected individuals, Ongoing forensic investigation, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by efforts to stop the attack, patch application (oracle emergency patch on 2025-10-04), network segmentation (assumed) and .
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Investigated the attack and secured its data from such future attacks.

Regulations Violated: Potential GDPR (EU), CCPA (California), State breach notification laws (e.g., Maine),
Legal Actions: Potential lawsuits (e.g., against Oracle for delayed patching),
Regulatory Notifications: Maine Attorney General’s Office filingCISA alerts for related vulnerabilities (e.g., CVE-2025-61757)
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Potential lawsuits (e.g., against Oracle for delayed patching), .

Lessons Learned: Zero-day exploits in ERP systems pose severe risks due to their central role in operations., Delayed detection (weeks between breach and discovery) exacerbates impact., Supply chain vulnerabilities (e.g., Oracle software) require proactive patch management., Ransomware-as-a-Service (RaaS) models enable scalable, sophisticated attacks., Public disclosure strategies must balance transparency with investigative integrity.

Recommendations: Immediate patching of critical vulnerabilities (e.g., CVE-2025-61882)., Adoption of zero-trust architectures and multi-factor authentication (MFA)., Enhanced vulnerability scanning and threat hunting capabilities., Network segmentation to limit lateral movement., Regular employee training on phishing and social engineering., Collaboration with vendors (e.g., Oracle) for out-of-band patches., Proactive dark web monitoring for leaked data., Investment in AI-driven anomaly detection systems., International cooperation for cross-border cybercrime investigations.Immediate patching of critical vulnerabilities (e.g., CVE-2025-61882)., Adoption of zero-trust architectures and multi-factor authentication (MFA)., Enhanced vulnerability scanning and threat hunting capabilities., Network segmentation to limit lateral movement., Regular employee training on phishing and social engineering., Collaboration with vendors (e.g., Oracle) for out-of-band patches., Proactive dark web monitoring for leaked data., Investment in AI-driven anomaly detection systems., International cooperation for cross-border cybercrime investigations.Immediate patching of critical vulnerabilities (e.g., CVE-2025-61882)., Adoption of zero-trust architectures and multi-factor authentication (MFA)., Enhanced vulnerability scanning and threat hunting capabilities., Network segmentation to limit lateral movement., Regular employee training on phishing and social engineering., Collaboration with vendors (e.g., Oracle) for out-of-band patches., Proactive dark web monitoring for leaked data., Investment in AI-driven anomaly detection systems., International cooperation for cross-border cybercrime investigations.Immediate patching of critical vulnerabilities (e.g., CVE-2025-61882)., Adoption of zero-trust architectures and multi-factor authentication (MFA)., Enhanced vulnerability scanning and threat hunting capabilities., Network segmentation to limit lateral movement., Regular employee training on phishing and social engineering., Collaboration with vendors (e.g., Oracle) for out-of-band patches., Proactive dark web monitoring for leaked data., Investment in AI-driven anomaly detection systems., International cooperation for cross-border cybercrime investigations.Immediate patching of critical vulnerabilities (e.g., CVE-2025-61882)., Adoption of zero-trust architectures and multi-factor authentication (MFA)., Enhanced vulnerability scanning and threat hunting capabilities., Network segmentation to limit lateral movement., Regular employee training on phishing and social engineering., Collaboration with vendors (e.g., Oracle) for out-of-band patches., Proactive dark web monitoring for leaked data., Investment in AI-driven anomaly detection systems., International cooperation for cross-border cybercrime investigations.Immediate patching of critical vulnerabilities (e.g., CVE-2025-61882)., Adoption of zero-trust architectures and multi-factor authentication (MFA)., Enhanced vulnerability scanning and threat hunting capabilities., Network segmentation to limit lateral movement., Regular employee training on phishing and social engineering., Collaboration with vendors (e.g., Oracle) for out-of-band patches., Proactive dark web monitoring for leaked data., Investment in AI-driven anomaly detection systems., International cooperation for cross-border cybercrime investigations.Immediate patching of critical vulnerabilities (e.g., CVE-2025-61882)., Adoption of zero-trust architectures and multi-factor authentication (MFA)., Enhanced vulnerability scanning and threat hunting capabilities., Network segmentation to limit lateral movement., Regular employee training on phishing and social engineering., Collaboration with vendors (e.g., Oracle) for out-of-band patches., Proactive dark web monitoring for leaked data., Investment in AI-driven anomaly detection systems., International cooperation for cross-border cybercrime investigations.Immediate patching of critical vulnerabilities (e.g., CVE-2025-61882)., Adoption of zero-trust architectures and multi-factor authentication (MFA)., Enhanced vulnerability scanning and threat hunting capabilities., Network segmentation to limit lateral movement., Regular employee training on phishing and social engineering., Collaboration with vendors (e.g., Oracle) for out-of-band patches., Proactive dark web monitoring for leaked data., Investment in AI-driven anomaly detection systems., International cooperation for cross-border cybercrime investigations.Immediate patching of critical vulnerabilities (e.g., CVE-2025-61882)., Adoption of zero-trust architectures and multi-factor authentication (MFA)., Enhanced vulnerability scanning and threat hunting capabilities., Network segmentation to limit lateral movement., Regular employee training on phishing and social engineering., Collaboration with vendors (e.g., Oracle) for out-of-band patches., Proactive dark web monitoring for leaked data., Investment in AI-driven anomaly detection systems., International cooperation for cross-border cybercrime investigations.
Key Lessons Learned: The key lessons learned from past incidents are Zero-day exploits in ERP systems pose severe risks due to their central role in operations.,Delayed detection (weeks between breach and discovery) exacerbates impact.,Supply chain vulnerabilities (e.g., Oracle software) require proactive patch management.,Ransomware-as-a-Service (RaaS) models enable scalable, sophisticated attacks.,Public disclosure strategies must balance transparency with investigative integrity.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: International cooperation for cross-border cybercrime investigations., Enhanced vulnerability scanning and threat hunting capabilities., Regular employee training on phishing and social engineering., Immediate patching of critical vulnerabilities (e.g., CVE-2025-61882)., Proactive dark web monitoring for leaked data., Investment in AI-driven anomaly detection systems., Network segmentation to limit lateral movement., Collaboration with vendors (e.g., Oracle) for out-of-band patches. and Adoption of zero-trust architectures and multi-factor authentication (MFA)..

Source: Massachusetts Office of Consumer Affairs and Business Regulation
Date Accessed: 2019-05-16

Source: BleepingComputer

Source: BleepingComputer

Source: Maine Attorney General’s Office (Breach Notification)

Source: IBM Cost of a Data Breach Report
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Massachusetts Office of Consumer Affairs and Business RegulationDate Accessed: 2019-05-16, and Source: BleepingComputer, and Source: BleepingComputerUrl: https://www.bleepingcomputer.com, and Source: SecurityWeekUrl: https://www.securityweek.com, and Source: The Hacker NewsUrl: https://thehackernews.com, and Source: TechRadarUrl: https://www.techradar.com, and Source: Bloomberg LawUrl: https://news.bloomberglaw.com, and Source: Maine Attorney General’s Office (Breach Notification), and Source: CISA AlertsUrl: https://www.cisa.gov, and Source: IBM Cost of a Data Breach ReportUrl: https://www.ibm.com/reports/data-breach.

Investigation Status: Confirmed (insider incident)

Investigation Status: Ongoing (forensic investigation, potential third-party involvement)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notified the affected customers of the breach, Public disclosure emphasizing no customer data compromise, Notification Letters To Affected Parties and Public Disclosure Via Maine Attorney General’S Office Filing.

Customer Advisories: No customer data compromised

Stakeholder Advisories: Notification Letters To Affected Individuals, Public Statements Via Regulatory Filings.
Customer Advisories: Free credit monitoring offered to affected parties
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were No customer data compromised, Notification Letters To Affected Individuals, Public Statements Via Regulatory Filings and Free credit monitoring offered to affected parties.

Entry Point: Zero-day exploit (CVE-2025-61882) in Oracle E-Business Suite
Reconnaissance Period: Potentially since July 2025 (part of broader Cl0p campaign)
Backdoors Established: ['Multi-stage Java implants']
High Value Targets: Erp Databases, Hr Systems, Financial Records,
Data Sold on Dark Web: Erp Databases, Hr Systems, Financial Records,

Root Causes: Insider threat (unauthorized screenshot sharing)

Root Causes: Unpatched Zero-Day Vulnerability (Cve-2025-61882) In Oracle E-Business Suite., Delayed Detection (Weeks Between Intrusion And Discovery)., Lack Of Proactive Threat Hunting For Erp-Specific Attacks., Potential Gaps In Network Segmentation Or Access Controls.,
Corrective Actions: Applied Oracle’S Emergency Patch (2025-10-04)., Enhanced Monitoring For Erp Systems., Review Of Third-Party Software Patching Policies., Potential Restructuring Of Incident Response Protocols To Reduce Detection Lag.,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Cyber security experts, Potential Involvement Of Mandiant (Forensic Investigation), , Recommended (not explicitly confirmed).
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Applied Oracle’S Emergency Patch (2025-10-04)., Enhanced Monitoring For Erp Systems., Review Of Third-Party Software Patching Policies., Potential Restructuring Of Incident Response Protocols To Reduce Detection Lag., .
Last Attacking Group: The attacking group in the last incident was an Cl0p Ransomware Group (alleged).
Most Recent Incident Detected: The most recent incident detected was on December 2021.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-09-30T00:00:00Z.
Most Significant Data Compromised: The most significant data compromised in an incident were Address, Telephone number, Cox account number, Usernames, Other personal information, , Email addresses, Physical addresses, Phone numbers, Vehicle details including VIN numbers, , credit and debit numbers, , Internal screenshots (no customer data), Names, Addresses, Dates of Birth, Social Security Numbers, Personal Identifiers, Internal Documents, Employee Records, Customer Details and .
Most Significant System Affected: The most significant system affected in an incident was Oracle E-Business SuiteERP SystemsDatabases.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Cyber security experts, potential involvement of mandiant (forensic investigation), .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Efforts to stop the attack and Patch application (Oracle emergency patch on 2025-10-04)Network segmentation (assumed).
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Vehicle details including VIN numbers, Phone numbers, Dates of Birth, Address, Internal screenshots (no customer data), Cox account number, Social Security Numbers, Email addresses, Other personal information, Internal Documents, Customer Details, Physical addresses, Employee Records, credit and debit numbers, Names, Usernames, Addresses, Personal Identifiers and Telephone number.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 1.4M.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Potential lawsuits (e.g., against Oracle for delayed patching), .
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Public disclosure strategies must balance transparency with investigative integrity.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was International cooperation for cross-border cybercrime investigations., Enhanced vulnerability scanning and threat hunting capabilities., Regular employee training on phishing and social engineering., Immediate patching of critical vulnerabilities (e.g., CVE-2025-61882)., Proactive dark web monitoring for leaked data., Investment in AI-driven anomaly detection systems., Network segmentation to limit lateral movement., Collaboration with vendors (e.g., Oracle) for out-of-band patches. and Adoption of zero-trust architectures and multi-factor authentication (MFA)..
Most Recent Source: The most recent source of information about an incident are IBM Cost of a Data Breach Report, Maine Attorney General’s Office (Breach Notification), CISA Alerts, SecurityWeek, Massachusetts Office of Consumer Affairs and Business Regulation, TechRadar, Bloomberg Law, The Hacker News and BleepingComputer.
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://www.bleepingcomputer.com, https://www.securityweek.com, https://thehackernews.com, https://www.techradar.com, https://news.bloomberglaw.com, https://www.cisa.gov, https://www.ibm.com/reports/data-breach .
Current Status of Most Recent Investigation: The current status of the most recent investigation is Confirmed (insider incident).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Notification letters to affected individuals, Public statements via regulatory filings, .
Most Recent Customer Advisory: The most recent customer advisory issued were an No customer data compromised and Free credit monitoring offered to affected parties.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Zero-day exploit (CVE-2025-61882) in Oracle E-Business Suite.
Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was Potentially since July 2025 (part of broader Cl0p campaign).
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Insider threat (unauthorized screenshot sharing), Unpatched zero-day vulnerability (CVE-2025-61882) in Oracle E-Business Suite.Delayed detection (weeks between intrusion and discovery).Lack of proactive threat hunting for ERP-specific attacks.Potential gaps in network segmentation or access controls..
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Applied Oracle’s emergency patch (2025-10-04).Enhanced monitoring for ERP systems.Review of third-party software patching policies.Potential restructuring of incident response protocols to reduce detection lag..
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.