
<p><span style=”font-weight: 400;”>Alphabet’s Google has raised a warning about hackers sending extortion emails to company executives. The messages claim that sensitive data has been stolen from Oracle business applications. The hackers, linking themselves to the cl0p ransomware gang, have contacted executives at multiple organisations. Google stressed that it does not have enough evidence yet to confirm if these claims are true or if any data was actually taken. </span></p>
<p><span style=”font-weight: 400;”>Organisations using Oracle E-Business Suite are being advised to stay alert, review security protocols carefully, and be prepared for potential phishing attempts.</span></p>
<h2><span style=”color: #ba372a;”><strong>What The Emails Say</strong></span></h2>
<p><span style=”font-weight: 400;”>According to Google, the emails target executives at companies using Oracle systems. The attackers claim they have obtained sensitive data and demand action, though Google said it cannot verify the claims. </span></p>
<p><span style=”font-weight: 400;”>No specific organisations have been publicly identified as targets. The company also noted that attempts to contact Cl0p and Oracle for comments were not returned. </span></p>
<p><span style=”font-weight: 400;”>While alarming, these emails are part of a growing trend where ransomware-linked groups use extortion tactics, sometimes without actually accessing data. </span></p>
<p><span style=”font-weight: 400;”>Cybersecurity experts warn that even the threat of leaked data can cause disruption, reputational damage, or panic internally. Google is continuing to monitor the situation closely and advising companies to remain vigilant in checking all email communications.</span></p>
<h2><span style=”color: #ba372a;”><strong>Expert Advice And Precautions</strong></span></h2>
<p><span style=”font-weight: 400;”>Google has advised organisations and recipients of such emails to remain cautious. Standard cybersecurity measures, like not responding to suspicious emails, verifying the sender, and reporting incidents internally, are recommended. </span></p>
<p><span style=”font-weight: 400;”>This alert serves as a reminder that even widely used business applications like Oracle can be a focus for cybercriminals, regardless of whether actual breaches occur. </span></p>
<p><span style=”font-weight: 400;”>Companies should strengthen their defences, educate employees about phishing and ransomware tactics, and implement threat detection measures to avoid potential losses. </span></p>
<p><span style=”font-weight: 400;”>Regularly updating systems, using multi-factor authentication, reviewing access controls, and having incident response plans in place can also reduce risks. </span><span style=”font-weight: 400;”>Vigilance is key in responding to these growing cyber threats effectively.</span></p>