ZERO-DAY RCE STRIKES: GRACEFUL SPIDER Actively Exploiting Oracle EBS Flaw (CVE-2025-61882)
Disclosure: This is a threat intelligence briefing for security professionals. It contains affiliate links to relevant enterprise security solutions. Your support helps fund our independent research.
Chapter 1: The Hunters Emerge — A New Adversary Joins the Fray
Following our previous alerts on the **Oracle EBS zero-day (CVE-2025-61882)**, new threat intelligence confirms our fears. A specific, highly sophisticated cybercrime group has been identified as a primary actor weaponizing this flaw. We are tracking this group as **GRACEFUL SPIDER**. Their entry into this campaign elevates the threat level significantly. This is no longer just opportunistic scanning; it is a targeted, professional operation with a clear and dangerous objective.
Chapter 2: Threat Actor Profile — GRACEFUL SPIDER
- Designation: GRACEFUL SPIDER
- **Classification:** Financially Motivated Cybercrime (Initial Access Broker)
- **Assessed Origin:** Eastern Europe
- **Primary TTPs:** Exploitation of zero-day vulnerabilities in enterprise applications, rapid in-memory payload deployment, and swift escalation to Domain Administrator.
GRACEFUL SPIDER is not a ransomware group; they are a tier above. They are a specialist **Initial Access Broker (IAB)**. Their business model is to use their sophisticated skills to perform the difficult initial breach and then sell that high-quality, privileged access to the "buyers," who are typically the major ransomware gangs. A breach by this group is a direct precursor to a full-blown ransomware attack.
Chapter 3: The Kill Chain — From Zero-Day Exploit to Access Brokerage
The group's methodology is a masterclass in speed and efficiency.
- **Exploitation:** They use a private, refined version of the public exploit for CVE-2025-61882 to gain an initial shell on the target Oracle EBS server.
- **Payload Deployment:** They immediately deploy a custom, in-memory **Cobalt Strike beacon** for stealthy command and control. This avoids writing files to disk and evades traditional antivirus.
- **Reconnaissance & Privilege Escalation:** The operators' primary goal is to get off the EBS server and onto the domain controllers. They perform rapid reconnaissance using built-in tools (`net group "Domain Admins"`) and use credential dumping techniques to steal administrator credentials.
- **The 'Product':** Once they have achieved Domain Administrator privileges, their mission is complete. They package their access—the active Cobalt Strike beacon and the stolen DA credentials—and list it for sale on an exclusive dark web forum for a six- or seven-figure sum.
Chapter 4: The Defender's Playbook — Hunting for GRACEFUL SPIDER TTPs
Defending against this actor requires a focus on their specific, post-exploitation behaviors.
1. PATCH and CONTAIN
As detailed in our **previous alerts**, your first priority is to apply the patch from Oracle or, if you cannot, to take the EBS system offline by firewalling it from the internet.
2. Hunt for the Cobalt Strike Beacon
This is the most critical threat hunt. GRACEFUL SPIDER's primary TTP is to use the compromised Oracle process to inject their beacon into a legitimate Windows process. Your #1 EDR query is:
Event_Type:ProcessInjection AND SourceProcess IN ('ebs_process', 'ias_process', 'frmweb.exe') AND TargetProcess IN ('rundll32.exe', 'svchost.exe')
Also, hunt for anomalous network connections from these processes to unknown C2 servers, looking for the specific network indicators (malleable C2 profiles) of Cobalt Strike.
3. Monitor for Internal Reconnaissance
After the beacon is active, the attacker will perform recon. Monitor for an unusual spike in LDAP queries or Active Directory enumeration commands (`nltest`, `net group`) originating from your Oracle EBS server.
Get Elite Threat Actor Intelligence
Subscribe for real-time alerts, APT analysis, and strategic defense guides.
About the Author
CyberDudeBivash is a cybersecurity strategist with 15+ years in threat intelligence, APT tracking, and incident response, advising CISOs of Fortune 500 companies across APAC. [Last Updated: October 07, 2025]
#CyberDudeBivash #Oracle #EBS #ZeroDay #RCE #CVE #CyberSecurity #ThreatIntel #InfoSec #ThreatActor #Ransomware #GRACESPIDER

Comments
Post a Comment