No Comments

SAP report shows that attacks start 72h after each patch

 

A study by SAP and Onapsis, a security company specializing in SAP solutions, shows that in less than three hours, cybercriminals are discovering and compromising SAP applications that are still unprotected and provisioned in cloud environments (IaaS). According to the report, there are also a large number of companies being attacked on their systems within 72 hours after the publication of important security patches. In other words, the critical vulnerabilities announced in SAP patches have been turned into weapons against company customers in less than 72 hours.

Onapsis and SAP say in the report that they observed more than 300 successful exploitation attempts against their network of honeypots while studying the threat landscape. The findings point to the conclusion that attackers reverse engineer SAP patches as soon as they become available, to create proof-of-concept exploit code that they can use as a weapon.

According to the report, the attacks were not a one-time attempt, as they sometimes included a chain of vulnerabilities. In addition, the attackers used a proof-of-concept code to attack SAP systems, in addition to having made brute force attacks to take over user accounts with elevator privileges. The purpose of these attacks was to take complete control of an SAP installation to modify user accounts and settings and to filter out business information.

Onapsis said that while the scope of the report was local SAP systems exposed to the Internet, the company warns that many of these vulnerabilities can be exploited within corporate systems, to which attackers can gain access through other vectors.

With international news agencies

See the original post at: https://www.cisoadvisor.com.br/ataques-a-aplicativos-sap-comecam-menos-de-3h-apos-provisionamento/?rand=59039

You might also like
News, Tips
News, Tips

More Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.