Ch4tter: Threat Actors Attacking SAP for Profit

New Intelligence to Protect SAP from Ransomware and Data Breaches

Featured in

CH4TTER Report


Onapsis and Flashpoint have joined forces to level the playfield, revealing how threat actors are attacking SAP applications. This report covers:

  • Since 2021, research demonstrates a 400% increase in ransomware incidents that involved compromising SAP systems and data at victim’s organizations.
  • Active threat community posts incorporating SAP-specific cloud and web services have increased 220% from 2021- 2023.
  • Conversations on SAP vulnerabilities and exploits have increased 490% across open, deep, and dark web from 2021-2023.


Ch4tter Report

On Demand Webinar

Threat Actors Attacking SAP for Profit



Over the past few years, the threat landscape around SAP applications has evolved significantly. What has driven this change? Threat actors are increasingly seeing the profit derived from SAP applications, associated data they hold, and taking advantage of vulnerabilities. 

Pulling from Onapsis’ expertise in SAP cybersecurity and Flashpoint’s depth of threat intelligence, this webinar covers:

  • The current SAP threat landscape
  • Open Deep and Dark Web references to SAP vulnerabilities
  • Threat actor groups that commonly target SAP applications
  • SAP vulnerabilities and exploits

Speakers

JP Perez-Etchegoyen
CTO & Co-founder | Onapsis

Christian Rencken

Christian Rencken
Senior Strategic Advisor | Flashpoint

Ch4tter Infographic

New Intelligence from Flashpoint & Onapsis
Helps Enterprises to Protect SAP from Ransomware and Data Breaches


Gain crucial insights into the evolving landscape of cybersecurity threats with our latest infographic and discover how sophisticated threat actors not only encrypt an organization’s data for ransom but also engage in data exfiltration, subsequently selling it on illicit markets. Download now to stay informed and protect your organization against these growing threats.

Would you like to hear from Onapsis Research Labs one-on-one to learn more about their findings?


Request a 1-2-1 briefing with our team.

Frequently Asked Questions

What is the nature of this threat report? Why are you publishing this?

The Onapsis Research Labs (ORL) has extensive knowledge and expertise around ERP threats and vulnerabilities, working hand in hand with SAP to remediate the vulnerabilities that we continuously report to the SAP Product Security Response Team. 

Since the beginning of the year, the Onapsis Research Labs combined their knowledge with the experience and technology provided by Flashpoint, in order to access threat intelligence sources that are typically restricted and temporal by nature. This allowed us to get a deeper understanding of how the threats to SAP applications have been evolving over the past 4 years. 

We are publishing this report together with Flashpoint to help defenders protect their mission-critical SAP applications, warning organizations and raising awareness around the risks and threats of ransomware targeting SAP applications and data; new, highly sophisticated threat actor groups; and the observed increase in attempts to monetize SAP exploits and compromised data.

Who should read this report? To whom is this relevant?

The goal of this report is to protect SAP applications, bringing awareness of the increased threat activity and growing risk to SAP applications. To that end, the threat intelligence and insights contained therein are relevant to teams responsible for SAP security, SAP administrators, Information Security and SOC operators/analysts, and other cybersecurity defenders. All of these groups bear some responsibility for the overall security, integrity, and risk reduction of an organization’s SAP application landscape. 

Are attackers targeting SAP systems with ransomware?

Short answer: YES. However, this is not necessarily a new revelation. Longer answer: Threat actors have been targeting SAP systems for years now in ransomware campaigns because that’s generally where the most critical data to an organization lives. SAP, Onapsis, and CISA have been warning organizations of this risk for several years now. What is worrisome from this new research is the aggressive trendline in ransomware attacks concerning SAP applications and data. 

Onapsis Research Labs analyzed activity on sites where ransomware gangs publicize their compromises. We charted a 400% increase in the number of ransomware incidents concerning SAP. Equally concerning, we’ve seen a number of well-funded and prolific ransomware, state-sponsored, and cyber criminal groups all “enter the market” – such as APT10 (responsible for the US Office of Personnel Management breach) and FIN13 (responsible for the theft of tens of millions of dollars in funds from organizations). These sophisticated threat actor groups will not only hold an organization’s data for ransom, but they will also exfiltrate that same data and offer it up for sale on the criminal market – effectively reaping double the criminal funds. Additionally, we see evidence of modified ransomware payloads that are more “SAP-aware”, allowing for more efficient identification, encryption, and data extraction than previous versions. All of this speaks to a very real, growing threat to global organizations running SAP.

Are there new vulnerabilities being discussed in the report?

The results of this research do not introduce or highlight any new vulnerability or zero-day. In fact, what’s most striking about this research is that all of the CVEs mentioned in this report were previously patched by SAP, at the bare minimum, over one year ago. In most instances, the vulnerabilities were actually patched multiple years ago. This speaks to the lack of proper governance at organizations and common challenges of patching complex critical SAP environments. 

What known vulnerabilities are highlighted in the report?

In the appendix of this report, we’ve included a comprehensive list of CVEs that were identified during the research as actively being exploited and/or leveraged by threat actors or mentioned as CVEs of interest. 

While we’ve identified a large number of vulnerabilities that are actively being exploited by threat actors, It is important to stress that this is not an all-inclusive list – i.e., attackers could target any one of thousands of known SAP vulnerabilities that may be unpatched in an organization’s environment. Therefore, even though yes – it is important to immediately address those unique, identified vulnerabilities, it is also critical for you and your team to prioritize and address patching or mitigating SAP vulnerabilities as you would with any other existing production application. Arguably, even more so, considering the wealth of confidential and critical data that flows through these systems.

What is the risk to my business?

Naturally, the immediate risk is if your organization has any of these actively-exploited vulnerabilities unpatched in your SAP environment. It’s imperative that your teams work to audit and patch your SAP systems for these vulnerabilities as soon as possible. 

It’s important to note that for organizations where SAP is critical for the day-to-day operations of the business, any instance where SAP systems are taken offline and/or encrypted can have a significant financial and operational impact. Many organizations quantify this risk in the order of millions of dollars per hour or day, in consideration of unplanned downtime and disrupted business-critical processes across manufacturing, shipping, supply chain, sales, payroll, financial reporting, and more. 

Additionally, the US Securities and Exchange Commission (SEC) introduced a set of new cybersecurity regulations on “material impact” in 2023. These rules further increased the regulatory, reputational and financial risks for SAP ransomware attacks. Beyond the ransomware risk itself, the additional risk for organizations lies in the additional transparency mandated by the SEC for “material cybersecurity incidents” (of which an SAP ransomware attack qualifies). The rule requires timely disclosure to the public within four days of determining materiality via SEC Form 8-K.  Therefore, risk analysts now have to consider that broader public effect of security transparency (e.g., stock price changes, brand issues, executive and board responsibility) in their risk quantification calculations for the enterprise.  

Ultimately, not being aware of the risks is no longer viable for organizations. Organizations must ensure the right level of governance around cyber risks that could affect ERP (not just SAP) applications. Start with a clear understanding of their Internet-facing ERP applications and then ensure this asset, gap, and threat visibility is accessible to all those responsible for securing critical systems. Follow this up with more proactive assessment of potential vulnerabilities and risk management for ERP applications.

What does “threat actor” mean?

Threat actors are entities that are responsible for a campaign or an incident that impacts the security of an organization or its data. Throughout the development of this report, the team was exposed to evidence of diverse threat actors that are actively targeting and successfully exploiting SAP applications. 

My ERP applications are behind a firewall, so why should I worry?

There is a common misconception among many SAP customers that having SAP applications “behind the firewall” will protect them from external threats. While we wish security was this easy, reality is sadly very different. Even if there are no Internet-facing SAP components , there is still a large number of threats that target SAP applications behind the firewall. The following article provides additional insights into the topic: 8 Reasons Perimeter Security Alone Won’t Protect Your Crown Jewels 

If I’m running my SAP application in the cloud, am I safe?

The cloud provides many advantages and efficiencies, and, in certain use cases, security can be one of them. However, in most cases, we have found the opposite to be true. Many SAP customers believe that by moving to the cloud they are secured (or, at least, free of responsibility for security). As a result, we have frequently seen a relaxation of security controls, processes, access, and certain protections. 

In all cases with the cloud, there is a shared security model where both the cloud provider and the cloud customer bear responsibility for various security controls in a cloud environment. For example, a cloud provider could be responsible for ensuring that their cloud platform is encrypted and its servers are monitored for security incidents. SAP does a great job in protecting the underlying cloud infrastructure used by customers. However, the cloud customer bears responsibility for application authentication, authorization, configuration, interfaces, custom code, and many other areas in the cloud, as well as monitoring the applications and malicious usage of the cloud application and data.

Moving your SAP applications to the cloud will not transfer security responsibility and accountability away from your organization. You are still responsible for the data hosted and processed by those applications. 

How can Onapsis help?

If you are an Onapsis customer of Assess and Defend, the Onapsis Platform has been protecting you already. If you subscribe to our Threat Intel Center, you have one-click access to this threat intelligence and a consolidated view of all affected assets in your landscape. If you are not a Threat Intel Center subscriber, reach out to your account executive and ask about a free trial. 

Finally, if you have never analyzed the cybersecurity aspect of your SAP applications – whether due to overall complexity or a lack of SAP knowledge in your security team – the first logical step is to get an understanding of your current situation regarding the potential business risks to your critical SAP systems. This can sometimes be a daunting task, but we’re here to help. Please contact us at [email protected].

Further Reading

Want a more in-depth exploration? Start with these related pieces, then visit our Resources page for more.

Stay Ahead of CH4TTER Vulnerabilities with Onapsis Research Labs

Cybersecurity demands proactive measures, and protecting your SAP systems from the vulnerabilities being exploited is a critical endeavor. Don’t hesitate—reach out to us today to start strengthening your SAP environment’s security. Together, we can ensure your systems remain resilient and safeguarded against evolving threats.