Security Market Segment LS
Wednesday, 07 April 2021 10:18

SAP vulnerabilities being weaponised in less than 72 hours Featured

By
SAP vulnerabilities being weaponised in less than 72 hours Pixabay

A threat intelligence report from security provider Onapsis and business software vendor SAP claims that threat actors are actively exploiting unprotected mission-critical SAP applications.

Coming under attack were applications that handled enterprise resource planning, supply chain management, human capital management, product lifecycle management and customer relationship management, the 26-page report said.

This was important as 92% of the Forbes Global 2000 had standardised on SAP to power their operations. "With more than 400,000 organisations using SAP, 77% of the world’s transactional revenue touches an SAP system," the report said.

"These organisations include the vast majority of pharmaceutical, critical infrastructure and utility companies, food distributors, defence and many more. An orchestrated and successful attack on unprotected SAP systems could have far-reaching consequences."

The report claimed there was conclusive evidence that cyber attackers were actively targeting and exploiting unsecured SAP applications, through varied techniques, tools and procedures and there were clear indications of sophisticated knowledge of mission-critical applications.

It said the window for defenders was significantly smaller than previously thought, with examples of SAP vulnerabilities being weaponised in less than 72 hours since the release of patches, and new unprotected SAP applications provisioned in cloud (IaaS) environments being discovered and compromised in less than three hours.

Successful exploitation of a vulnerable SAP system would allow an attacker to perform several malicious activities, including:

  • Steal personally identifiable information from employees, customers and suppliers;
  • Read, modify or delete financial records;
  • Change banking details (account number, IBAN number, etc.);
  • Administer purchasing processes;
  • Disrupt critical business operations, such as supply chain management, by corrupting data, shutting down processes completely or deploying ransomware;
  • Perform unrestricted actions through operating system command execution; and
  • Delete or modify traces, logs and other files.

"Observed exploitation could lead in many cases to full control of the unsecured SAP application, bypassing common security and compliance controls, and enabling attackers to steal sensitive information, perform financial fraud or disrupt mission-critical business processes by deploying ransomware or stopping operations,"the report said.

"These threats may also have regulatory compliance implications for organisations that have not properly secured their SAP applications processing regulated data."

The data captured was claimed to represent clear evidence of malicious activity across different threat actors and levels of operational capability:

  • Threat actors possess the domain expertise to carry out sophisticated attacks specific to mission-critical SAP applications – directly targeting sensitive data and critical processes;
  • Over 300 successful exploitations were observed over the course of this study, targeting vulnerabilities specific to SAP systems;
  • Attackers attempted accessing SAP systems to modify configurations and users and exfiltrate business information;
  • Exploit attempts have been observed in as little as 72 hours from the release of a patch, proving diligent and rapid patch prioritisation is required or countermeasures applied if patches cannot be applied in a timely manner;
  • New unprotected SAP applications provisioned in cloud (IaaS) environments were discovered and attacked in less than three hours, stressing the need to “shift left” and ensure new mission-critical applications are provisioned securely from day one;
  • Regulatory compliance for financial (Sarbanes-Oxley), privacy (GDPR) and other mandates may be at risk as unpatched and misconfigured SAP systems present a deficiency in IT controls that would result in audit and compliance violations and penalties;
  • Multiple brute-force attempts were made by attackers targeting high-privilege SAP user accounts—this observation showed that maintaining secure system configurations and monitoring for drift is important and must go hand-in-hand with patch management to keep SAP systems protected;
  • Sophisticated threat actors have been observed chaining together multiple vulnerabilities to target specific SAP applications to maximise impact and potential damage;
  • Although Internet-exposed systems are more likely to be exploited and compromised, threats have been observed that were equipped to compromise SAP systems from the inside in the past (not in the scope of this report);
  • With remote access to SAP systems and mission-critical applications, the need for lateral movement is nearly eliminated, enabling attackers to reach and exfiltrate business-critical data more quickly.

Scott Caveza, research engineering manager at security shop Tenable, said: "A recent advisory from CISA warns that unpatched or misconfigured SAP systems are actively being targeted by threat actors. SAP software is used by organisations to manage critical business functions and often used to store sensitive data.

"By leveraging known unpatched vulnerabilities, attackers can disrupt critical processes, steal financial or otherwise sensitive data, or deploy malicious code which can lead to a major impact on affected organisations.

"Over the last year, we have continued to see reports from US Government agencies warning of the threat of unpatched software and known vulnerabilities being targeted by threat actors.

"Despite patches being available for months and even years, attackers are still finding and exploiting unpatched SAP systems. This serves as a reminder to administrators of sensitive data and applications that applying patches, mitigations, or workarounds are paramount to thwarting malicious actors looking to exploit well known vulnerabilities."

Read 849 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here

SONICWALL 2022 CYBER THREAT REPORT

The past year has seen a meteoric rise in ransomware incidents worldwide.

Over the past 12 months, SonicWall Capture Labs threat researchers have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vectors, including:

Ransomware
Cryptojacking
Encrypted threats
IoT malware
Zero-day attacks and more

These exclusive findings are now available via the 2022 SonicWall Cyber Threat Report, which ensures SMBs, government agencies, enterprises and other organizations have the actionable threat intelligence needed to combat the rising tide of cybercrime.

Click the button below to get the report.

GET REPORT!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Sam Varghese

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments