Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

SAP Security Threats Surge Amid Attacks

April 18, 2024
Reading Time: 3 mins read
in Alerts
SAP Security Threats Surge Amid Attacks

A concerning trend has emerged as malicious hackers intensify their focus on compromising SAP applications, as revealed in a recent report by cybersecurity firms Onapsis and Flashpoint. The surge in attacks can be attributed to the growing adoption of SAP applications in cloud environments, coupled with the heightened ability of adversaries to exploit misconfigurations and security vulnerabilities across cloud and on-premises setups. Over the past three years, ransomware attacks against SAP systems have skyrocketed by 400%, mirroring the increased value brokers are willing to pay for exploits targeting SAP vulnerabilities, according to the report.
The report also sheds light on the alarming rise in discussions surrounding SAP flaws and exploits on hacker forums, with a staggering 490% increase in chatter related to SAP vulnerabilities. Notably, discussions concerning SAP-specific cloud and web services have surged by 220%, indicating a shift in attacker tactics to capitalize on vulnerabilities in modern SAP deployments. Threat actors of varying sophistication levels, including high-profile groups like APT10, FIN7, FIN13, and Cobalt Spider, have been observed exploiting SAP vulnerabilities to launch targeted attacks across diverse industry verticals.

The attractiveness of SAP applications as lucrative targets for cybercriminals is further underscored by the software giant’s extensive customer base, which includes over 400,000 organizations globally, including the majority of the world’s largest companies. With threat actors eyeing high-profile targets for potential data theft, financial fraud, and ransomware extortion, the stakes have never been higher for organizations relying on SAP solutions.

In response to the heightened threat landscape, exploit acquisition firms are offering substantial rewards for SAP vulnerabilities, with prices soaring for remote code execution (RCE) flaws and exploits. Additionally, dark web conversations reveal a concerning trend of threat actors discussing not only SAP vulnerabilities but also instances of successful compromises involving SAP products. The report emphasizes the critical importance of securing SAP applications comprehensively, urging organizations to prioritize not only operating system and endpoint security but also application-level defenses to mitigate the evolving threat posed by cybercriminals targeting SAP ecosystems.

Reference:
  • Surge in SAP Attacks Highlights Urgent Security Needs

Tags: April 2024Cyber AlertCyber Alerts 2024Cyber RiskCyber threatFlashpointOnapsisSAP applications
ADVERTISEMENT

Related Posts

Glibc Flaw Gives Linux Root Access Risk

Mozilla Urgent Firefox Patch Fixes RCE Flaws

May 19, 2025
Fileless Remcos RAT Delivery Via LNK Files

ModiLoader Malware Targets Windows Users

May 19, 2025
Glibc Flaw Gives Linux Root Access Risk

Glibc Flaw Gives Linux Root Access Risk

May 19, 2025
Fileless Remcos RAT Delivery Via LNK Files

APT28 RoundPress Webmail Hack Steals Emails

May 16, 2025
Fileless Remcos RAT Delivery Via LNK Files

FBI Warns of AI Voice Phishing Scams

May 16, 2025
Fileless Remcos RAT Delivery Via LNK Files

Fileless Remcos RAT Delivery Via LNK Files

May 16, 2025

Latest Alerts

Mozilla Urgent Firefox Patch Fixes RCE Flaws

ModiLoader Malware Targets Windows Users

Glibc Flaw Gives Linux Root Access Risk

Fileless Remcos RAT Delivery Via LNK Files

FBI Warns of AI Voice Phishing Scams

APT28 RoundPress Webmail Hack Steals Emails

Subscribe to our newsletter

    Latest Incidents

    Massive DDoS Hits Poland’s Civic Platform

    Arla Plant Cyberattack Halts Operations

    Georgia’s Harbin Clinic Hit by Data Breach

    Hackers Target Swiss Reserve Power Plant

    Coinbase Insider Attack Exposed User Data

    Cyberattack Hits J Batista Group

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial