Recently, Onapsis and SAP released research that provides conclusive evidence that the impact and probability of attacks on unprotected SAP applications is putting organizations at extremely high risk.
Onapsis and SAP are releasing a new threat intelligence alert and detailed report to help SAP customers protect themselves from active cyber threats seeking to specifically target, identify and compromise organizations running unprotected SAP applications, through a variety of cyberattack vectors.
This is part three of our blog series on the Dangers in SAP Transport Management. In part one, we give an intro to SAP Transports. In part two, we went over the starting point of this attack, the transaction SU24. In this third installment, we’re focused on the manipulation of job management and its associated risks to SAP Transports.
In coordination with Onapsis, the Americas SAP Users’ Group (ASUG) recently conducted a research project to better understand how SAP customers are thinking about major transformation and cloud migration projects, the decision-makers involved and how they are moving their businesses forward.
"60% of data breaches are caused by a failure to patch. If you correct that, you've eliminated 60% of breaches.” Ricardo Lafosse, CISO of Morningstar, at SecureWorld Chicago.
The first article of this series spoke about the global deactivation of authorization checks for single authorization objects per transport. A similar risk results from the possibility of deactivating authorization checks transaction-specifically. With this method, it is even more difficult to detect an attack, as the impact can be limited to one transaction.
The Onapsis Research Labs has identified a functional exploit affecting SAP which was published on GitHub, making it publicly available for malicious purposes. A successful attack exploiting this vulnerability would put an organization’s mission-critical SAP applications, business process and data at risk—impacting cybersecurity and regulatory compliance.