Skip to content

SAP and Onapsis take initiatory measures to inform clients and bolster security around essential business applications amidst ongoing cyber threats

Unified insights provided by SAP and Onapsis, in conjunction with the U.S. Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) and Germany's Federal Cybersecurity Authority (BSI), reveal tactics employed by cybercriminals to infiltrate and possibly misuse...

Cyber threats targeting essential applications are identified and customers are alerted, with...
Cyber threats targeting essential applications are identified and customers are alerted, with assistance provided by SAP and Onapsis to bolster protective measures.

SAP and Onapsis take initiatory measures to inform clients and bolster security around essential business applications amidst ongoing cyber threats

In a recent joint cyber threat intelligence report, SAP and Onapsis have highlighted potential vulnerabilities in unsecured SAP applications that could enable attackers to gain full control, bypassing common security and compliance controls.

The report advises organizations to take immediate action, as external and internal threat actors can access, exfiltrate, and manipulate sensitive and regulated information and processes in organizations that have not prioritized rapid mitigation for known risks.

The vulnerabilities identified in the research are limited to customer deployments of SAP products within data centers, managed colocation environments, or customer-maintained cloud infrastructures. However, it's important to note that none of these vulnerabilities are present in cloud solutions maintained by SAP.

Tim McKnight, chief security officer at SAP, states that the research is released to help customers protect their mission-critical applications. Mariano Nunez, CEO and co-founder of Onapsis, emphasizes that many organizations still operate with a major governance gap in terms of the cybersecurity and compliance of their mission-critical applications.

The critical findings in the Onapsis report describe attacks on vulnerabilities with patches and secure configuration guidelines available for months and even years. Active threats targeting unprotected SAP applications have been observed, potentially enabling attackers to steal sensitive data, commit financial fraud, or disrupt business processes. Attackers could also deploy ransomware or halt operations through these threats.

Moreover, these threats may have regulatory compliance implications. The intelligence gathered by Onapsis and SAP shows various cyberattack vectors being used against organizations running unprotected SAP applications.

In response, SAP and Onapsis have jointly released the cyber threat intelligence report, and Onapsis offers a 3-month free subscription to the Onapsis Platform for Cybersecurity and Compliance, an SAP-endorsed app accessible through SAP Store, to support customers requiring investigation, threat remediation, and additional post-compromise security monitoring.

It's crucial for organizations to apply SAP patches, secure configurations, and conduct compromise assessments on critical environments to mitigate these risks. Companies that have not prioritized rapid mitigation for these known risks should consider their systems compromised and take immediate and appropriate action.

The organizations affected by the cyber vulnerabilities exploiting unprotected SAP applications, as mentioned in the joint cyber flaw report, include various companies that use SAP systems, particularly those in sectors heavily reliant on SAP software. However, the specific organizations or sectors are not detailed in the provided search results.

Despite these findings, Mariano Nunez also highlights the improvements SAP has made in developing secure software and patching critical vulnerabilities. The report does not detail any new vulnerabilities in SAP cloud software as a service or SAP's own corporate IT infrastructure.

In conclusion, the joint report serves as a reminder for organizations to prioritize the security and compliance of their mission-critical SAP applications to protect their business and sensitive data from potential cyber threats.

Read also: