Cloud Migration Service Providers

  • BIG Data & Analytics
  • CLOUD
  • Data Center
  • IOT
  • Machine Learning & AI
  • SECURITY
  • Server
  • BlockChain
  • Virtualization
You are here: Home / SECURITY / Unpatched SAP applications are target-rich ground for hackers

Unpatched SAP applications are target-rich ground for hackers

April 7, 2021 by cbn Leave a Comment

Hackers are targeting unpatched vulnerabilities in SAP applications, according to a report issued by SAP and cyber threat research company Onapsis.

The report detailed more than 300 successful exploitations of critical vulnerabilities previously patched by SAP through 1,500 attack attempts between June 2020 and March 2021.

It also highlighted that the time window for defenders to act was significantly smaller than previously thought, “with examples of SAP vulnerabilities being weaponised in less than 72 hours” after the release of patches and “new unprotected SAP applications provisioned in cloud (IaaS) environments being discovered and compromised in less than three hours”.

The report noted that 18 of the world’s 20 major vaccine producers run their production on SAP, 19 of 28 Nato countries run SAP, and 77% of the world’s transaction revenue touches an SAP system.

A spokesperson for Onapsis said this was the first time SAP had issued an official press release about cyber threats affecting its customers. Onapsis is a security and compliance monitoring software company as well as a security research firm.

The release said both companies had “worked in close partnership with the US Department of Homeland Security (DHS), the Cybersecurity and Infrastructure Security Agency (CISA) and Germany’s Federal Cybersecurity Authority (BSI), advising organisations to take immediate action to apply long-available SAP patches and secure configurations, and perform compromise assessments on critical environments”. 

The two declared themselves “unaware of known customer breaches directly related to this research”. The report also did not describe any new vulnerabilities in SAP cloud software as a service or SAP’s own corporate IT infrastructure. Both companies, however, noted that many organisations still had not applied relevant mitigations that have long been provided by SAP.

“We’re releasing the research Onapsis has shared with SAP as part of our commitment to helping our customers ensure their mission-critical applications are protected”
Tim McKnight, SAP

“We’re releasing the research Onapsis has shared with SAP as part of our commitment to helping our customers ensure their mission-critical applications are protected,” said Tim McKnight, chief security officer at SAP. “This includes applying available patches, thoroughly reviewing the security configuration of their SAP environments and proactively assessing them for signs of compromise.”

Onapsis CEO and co-founder Mariano Nunez said the critical findings noted in its report described attacks on vulnerabilities for which patches and secure configuration guidelines had been available for months or even years.

“Unfortunately, too many organisations still operate with a major governance gap in terms of the cyber security and compliance of their mission-critical applications, allowing external and internal threat actors to access, exfiltrate and gain full control of their most sensitive and regulated information and processes,” he said. “Companies that have not prioritised rapid mitigation for these known risks should consider their systems compromised and take immediate and appropriate action.”

In the report’s foreword, Nunez said: “The evidence captured in this report clearly shows that threat actors have the motivation, means and expertise to identify and exploit unprotected mission-critical SAP applications, and are actively doing so. They are directly targeting these applications, including, but not limited to, enterprise resource planning (ERP), supply chain management (SCM), human capital management (HCM), product lifecycle management (PLM), customer relationship management (CRM) and others.”

Business applications have been known for some time to be the soft underbelly of many corporate organisations, beyond perimeter security. Nunez, in the foreword, also said: “Cloud and internet-exposed mission-critical applications that help foster new processes and business opportunities also increase the attack surface that cyber actors are now targeting.”

The release stated that none of the vulnerabilities were present in cloud solutions maintained by SAP.

The DHS CISA has also issued an alert about the potential targeting of critical SAP applications.

Share on FacebookShare on TwitterShare on LinkedinShare on Pinterest

Filed Under: SECURITY

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • March 2016
  • October 2014

Recent Posts

  • Water-authority network upgrade spots problems faster
  • AWS Offers Course on Basics of Machine Learning
  • Time to Modernize Your Data Integration Framework
  • Siemens and Google Cloud join forces on factory automation
  • Misconfigurations Continue to Plague Cloud Security, New Reports Say

Recent Comments

  • Purefit Keto Reviews on Are PDUs Your Best Platform for DCIM Instrumentation?
  • https://gemcr.org/ on 10 Things You Should Know About Deep Learning

Categories

  • BIG Data & Analytics
  • BlockChain
  • CLOUD
  • Data Center
  • IOT
  • Machine Learning & AI
  • SECURITY
  • Uncategorized
  • Virtualization

Categories

  • BIG Data & Analytics (1,071)
  • BlockChain (349)
  • CLOUD (2,271)
  • Data Center (597)
  • IOT (1,396)
  • Machine Learning & AI (76)
  • SECURITY (1,054)
  • Uncategorized (2,008)
  • Virtualization (316)

Subscribe Our Newsletter

 Subscribing I accept the privacy rules of this site

Copyright © 2021 · News Pro Theme on Genesis Framework · WordPress · Log in