The global and independent platform for the SAP community.

ERP Threat Report

A report by Onapsis and Flashpoint shows growing cybercriminal interest in ERP vulnerabilities and their exploitation for ransomware attacks and data breaches.
E3 Magazine
June 24, 2024
avatar
This text has been automatically translated from German to English.

A recent study by Flashpoint and Onapsis found that business-critical SAP applications are increasingly becoming the focus of cybercriminals. The report shows a significant increase in the number of threat actors targeting SAP vulnerabilities and provides organizations with valuable information to protect their business-critical SAP applications from these threats. The Onapsis Research Labs report highlights the evolution of the SAP threat landscape over the past four years. It shows the growing maturity of this cybercriminal market and the challenges facing the defense side.


2023 was a critical point: cyberattacks on SAP applications have reached a new high and interest from established threat actors and state-sponsored cyber espionage groups has increased significantly. However, all SAP vulnerabilities observed in the report were patched by SAP several years ago. In addition, the ERP company immediately provided its customers with the relevant security advisories. The high level of cyber activity nevertheless indicates that threat actors are still targeting companies with weak SAP cybersecurity governance. The problem is becoming more acute as more and more customers migrate SAP applications to the cloud. This makes them even more exposed to the threat. Research by Onapsis and Flashpoint shows that established professional threat actors and state-sponsored groups are targeting SAP applications more and more aggressively. Their aim is espionage, sabotage or the generation of financial gain. Since 2021, research has shown a 400% increase in ransomware incidents in which SAP systems and data have been compromised at victim companies. As demonstrated by Onapsis Research Labs and CISA, the US Federal Cybersecurity and Infrastructure Security Agency, ransomware campaigns exploit unpatched SAP vulnerabilities, among other things.
Cybercrime on the rise

Ransomware groups have repeatedly modified their malware software in recent years in order to better identify SAP applications and collect or encrypt targeted data. In the period between 2021 and 2023, conversations and exchanges about SAP vulnerabilities on the deep and dark web increased almost fivefold (an increase of 490 percent). Interest in SAP vulnerabilities in cybercriminal forums is increasing significantly. Between 2021 and 2023, discussions in cybercriminal forums about SAP-specific cloud and web services also increased significantly and more than doubled (220 percent). This makes critical SAP applications more accessible to a wider audience of criminal threat actors.
Some companies are falling behind when it comes to ERP cyber security. There is often a lack of information about threat actors in this area, which many information security teams perceive as complex and opaque. That's why SAP and Onapsis have been proactively warning about the increased risk of malicious cyber activity and ransomware threats specifically targeting SAP applications for years. Companies must act and protect themselves. "Threat actors are constantly evolving their tactics and targets to maximize their profits. With the type of data that ERP applications contain, it is no surprise that we have uncovered clear evidence and trends of increasing momentum in online forums and channels. This should be a wake-up call for all of us, not just in the threat intelligence space, but in the cybersecurity space as a whole," said Christian Rencken, Senior Strategic Advisor at Flashpoint.

"The collaboration with Flashpoint provides a wealth of threat intelligence that is important for both security and SAP teams," said Juan Pablo Perez-Etchegoyen, CTO at Onapsis. "By showing how these applications are targeted and how frequently they are attacked, we hope to help CIOs, CISOs and their teams manage the risk of large-scale attacks."

onapsis.com

Write a comment

Working on the SAP basis is crucial for successful S/4 conversion. 

This gives the Competence Center strategic importance for existing SAP customers. Regardless of the S/4 Hana operating model, topics such as Automation, Monitoring, Security, Application Lifecycle Management and Data Management the basis for S/4 operations.

For the second time, E3 magazine is organizing a summit for the SAP community in Salzburg to provide comprehensive information on all aspects of S/4 Hana groundwork. All information about the event can be found here:

SAP Competence Center Summit 2024

Venue

Event Room, FourSide Hotel Salzburg,
At the exhibition center 2,
A-5020 Salzburg

Event date

June 5 and 6, 2024

Regular ticket:

€ 590 excl. VAT

Venue

Event Room, Hotel Hilton Heidelberg,
Kurfürstenanlage 1,
69115 Heidelberg

Event date

28 and 29 February 2024

Tickets

Regular ticket
EUR 590 excl. VAT
The organizer is the E3 magazine of the publishing house B4Bmedia.net AG. The presentations will be accompanied by an exhibition of selected SAP partners. The ticket price includes the attendance of all lectures of the Steampunk and BTP Summit 2024, the visit of the exhibition area, the participation in the evening event as well as the catering during the official program. The lecture program and the list of exhibitors and sponsors (SAP partners) will be published on this website in due time.