By Abdul Wasay ⏐ 2 months ago ⏐ Newspaper Icon Newspaper Icon 3 min read
Google Reports Rise In Extortion Emails Targeting Business Executives

Google has warned that a wave of extortion emails is targeting company executives, with attackers claiming they stole sensitive data from Oracle’s E-Business Suite and demanding payment to avoid public disclosure.

Google said the campaign appears large scale but that it does not yet have definitive proof the alleged data theft actually occurred.

What Google and Researchers Are Seeing

Security teams monitoring the activity report that the messages are being sent to executives across multiple industries and at times include screenshots or file listings presented as proof of compromise. Some analysts say the language and presentation resemble prior operations associated with the Cl0p ransomware brand, though attribution remains cautious because criminal groups and copycats often impersonate one another.

Multiple incident response firms have opened investigations after recipients reported demands that range into the millions and in at least one case exceeded tens of millions. Some recipients were provided sample files or screenshots to back up the attackers’ claims, while other targets reported crude, obviously fabricated notes. The mix of real and staged evidence is a hallmark of modern extortion campaigns that aim to maximize fear and produce quick payouts.

Hacker Campaign Has Everyone On Their Toes

The attackers namechecked Oracle’s E-Business Suite, an enterprise platform that commonly holds financial, supply chain, HR, and customer data. If accurate, an intrusion into those systems could expose material operational and regulatory risk for affected organizations, from contract fallout to regulated data disclosure obligations. Even unproven claims can cause reputational damage and force costly forensic responses. The mere suggestion of a breach in core enterprise systems raises immediate board level concern.

Whether or not data were actually exfiltrated, the emails are engineered to sow panic and prompt rushed decisions by executives who fear public embarrassment and customer fallout. Researchers note that actors tied to or impersonating Cl0p have previously combined data theft with public shaming and mass extortion, making the current claims plausible enough to merit urgent scrutiny.

Attribution, Evidence and the Risk of Copycats

Researchers emphasize that apparent Cl0p style indicators do not prove Cl0p’s involvement. The criminal ecosystem frequently borrows branding and tactics to amplify fear. Some security vendors have already observed impersonation attempts and opportunistic actors leveraging the Cl0p name to extort victims. That ambiguity complicates both technical attribution and public communications.

At the same time, analysts warn that the scale and the targeting pattern are consistent with organized extortion operations that have successfully pressured large enterprises into payouts in the past. Attackers often mix credible technical artifacts with fabricated materials to create plausible deniability while extracting payments from the most frightened victims.