Unraveling the Red Hat Intrusion
In early October 2025, Red Hat confirmed a serious breach after a hacker group known as Crimson Collective claimed responsibility for infiltrating one of its internal GitLab environments. The attackers allegedly exfiltrated 570 GB of data across 28,000 internal projects and targeted what it described as 800 Customer Engagement Records (CERs) containing potentially sensitive infrastructure or operational data. Red Hat quickly isolated the compromised environment and launched an investigation, but has not affirmed whether the claims about customer data exposure are fully substantiated.
The company insists its software supply chain remains secure, but the incident underscores how even a vendor embedded deep inside enterprise stacks can become a vector for broader exposure.
Oracle’s EBS Under Siege: Silence Breaks to Confirm Extortion Wave
While Red Hat also grapples with internal fallout, Oracle now faces a wave of extortion campaigns that purport to exploit its E-Business Suite (EBS) users. Beginning in late September 2025, executives at dozens of organisations began receiving emails from hackers claiming that their Oracle EBS instances had been breached and sensitive data stolen.
Google’s Threat Intelligence Group, together with Mandiant, traced the campaign to a threat actor claiming affiliation with the notorious Cl0p group. They assert the group exploited vulnerabilities addressed in Oracle’s July 2025 Critical Patch Update, and in some cases delivered “proofs of access” such as file lists and screenshots to pressure victims into paying.
In response, Oracle issued an advisory confirming that some customers had indeed received extortion demands and urging users to apply emergency patches to address a zero-day vulnerability (CVE-2025-61882) present in EBS versions 12.2.3 through 12.2.14. The flaw, which enables unauthenticated remote code execution via HTTP, was rated 9.8/10 in severity.
Anatomy of the Threat: Attack Vectors, Tactics, and Proof
The attack campaign appears to have been staged over months. According to Google and Mandiant, exploitation activity began as early as August 2025, before public awareness of the vulnerability, suggesting the use of a zero-day exploit. The hackers reportedly leveraged compromised third-party email accounts to send extortion emails, thereby bypassing conventional spam filters.
In some cases the extortion notes contained contact addresses previously linked to Cl0p’s data leak site (DLS), and demanded sums ranging from millions to as much as USD 50 million. Analysts caution, however, that the veracity of each claim remains under investigation and could include bluffing or mimicry.
Rather than relying solely on zero-day flaws, the attackers may have also abused default password-reset workflows or weak configurations on internet-exposed EBS portals to gain valid access.
Why the Breaches Matter: Software Trust, Vendor Risk, and Enterprise Exposure
These twin episodes highlight how deeply enterprise ecosystems are interconnected and illustrate the rising peril of trusting core infrastructure vendors without rigorous security oversight. A breach at Red Hat or Oracle carries ripple effects: clients, downstream integrators, and supply chains can all be exposed.
In organisations where Red Hat software is embedded, a successful intrusion could leak architectural schematics, credentials, or deployment playbooks. In Oracle’s case, EBS often houses finance, supply chain, HR, and customer datasets—meaning a compromise could leak some of the most sensitive operational records in a business.
The campaigns also underline a harsh reality in modern cybercrime: extortion can wield substantial power even without encryption. The threat of leaking proprietary or regulated data can force organisations into negotiation. For software vendors and their clients, this demands rethinking assumptions about “trusted” infrastructure.
Lessons and Imperatives: How Organisations and Vendors Must Evolve
First, patch discipline cannot be optional. The Oracle breach campaign relied on vulnerabilities addressed in a July CPU that many customers evidently had not fully applied. Organisations must maintain real-time visibility into patch status across every instance.
Second, hardening must accompany patching. Disabling or locking down default password resets, enforcing MFA on local logins, limiting administrative access to trusted networks, and minimizing internet exposure of ERP endpoints are all essential steps.
Third, vendor transparency and security hygiene are vital. Vendors like Red Hat must adopt zero-trust postures even internally, isolate development or consulting environments, and minimize access to customer-sensitive data. A software house’s internal breach can become every client’s problem.
Fourth, enterprises must conduct rigorous vendor risk assessments and enforce contractual security obligations, intrusion detection, forensics logging, and incident response requirements. Contracts should mandate cascade liability and timely disclosures.
Finally, organisations receiving extortion emails must assume legitimacy until proven otherwise. Preserve all artifacts, escalate to legal and cybersecurity teams, and engage external forensic teams. Reputational, regulatory, and operational consequences may hinge on timeliness and fidelity of response.
Outlook: A Turning Point in Enterprise Cyber Risk
The Red Hat and Oracle incidents rest at the intersection of vendor trust and enterprise exposure. Mass automation, cloud adoption, and deeper integration have created sprawling “attack surfaces” where the sanctity of vendor systems can become a vantage for adversaries.
Whether the Red Hat breach leads to verified customer data loss or the Oracle extortion campaign forces compliance from its targets, one lesson stands clear: no vendor is beyond scrutiny, and no enterprise environment is too secure to ignore continuous vigilance.
These episodes may mark a turning point for enterprise cybersecurity conversations: the next frontier is not just hunting external threats—it is hardening ecosystems assumed to be inherently safe.

