Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

SAP Security Threats Surge Amid Attacks

April 18, 2024
Reading Time: 3 mins read
in Alerts
SAP Security Threats Surge Amid Attacks

A concerning trend has emerged as malicious hackers intensify their focus on compromising SAP applications, as revealed in a recent report by cybersecurity firms Onapsis and Flashpoint. The surge in attacks can be attributed to the growing adoption of SAP applications in cloud environments, coupled with the heightened ability of adversaries to exploit misconfigurations and security vulnerabilities across cloud and on-premises setups. Over the past three years, ransomware attacks against SAP systems have skyrocketed by 400%, mirroring the increased value brokers are willing to pay for exploits targeting SAP vulnerabilities, according to the report.
The report also sheds light on the alarming rise in discussions surrounding SAP flaws and exploits on hacker forums, with a staggering 490% increase in chatter related to SAP vulnerabilities. Notably, discussions concerning SAP-specific cloud and web services have surged by 220%, indicating a shift in attacker tactics to capitalize on vulnerabilities in modern SAP deployments. Threat actors of varying sophistication levels, including high-profile groups like APT10, FIN7, FIN13, and Cobalt Spider, have been observed exploiting SAP vulnerabilities to launch targeted attacks across diverse industry verticals.

The attractiveness of SAP applications as lucrative targets for cybercriminals is further underscored by the software giant’s extensive customer base, which includes over 400,000 organizations globally, including the majority of the world’s largest companies. With threat actors eyeing high-profile targets for potential data theft, financial fraud, and ransomware extortion, the stakes have never been higher for organizations relying on SAP solutions.

In response to the heightened threat landscape, exploit acquisition firms are offering substantial rewards for SAP vulnerabilities, with prices soaring for remote code execution (RCE) flaws and exploits. Additionally, dark web conversations reveal a concerning trend of threat actors discussing not only SAP vulnerabilities but also instances of successful compromises involving SAP products. The report emphasizes the critical importance of securing SAP applications comprehensively, urging organizations to prioritize not only operating system and endpoint security but also application-level defenses to mitigate the evolving threat posed by cybercriminals targeting SAP ecosystems.

Reference:
  • Surge in SAP Attacks Highlights Urgent Security Needs

Tags: April 2024Cyber AlertCyber Alerts 2024Cyber RiskCyber threatFlashpointOnapsisSAP applications
ADVERTISEMENT

Related Posts

ShadowV2 Botnet Tests During AWS Outage

Bloody Wolf Widens Java RAT Campaign

November 28, 2025
ShadowV2 Botnet Tests During AWS Outage

Forge Library Patch Stops Signature Bypass

November 28, 2025
ShadowV2 Botnet Tests During AWS Outage

ShadowV2 Botnet Tests During AWS Outage

November 28, 2025
ASUS Flags Critical AiCloud Router Flaw

Toddycat Tools Steal Outlook And M365 Data

November 27, 2025
ASUS Flags Critical AiCloud Router Flaw

Hackers Use Blender Assets To Spread StealC

November 27, 2025
ASUS Flags Critical AiCloud Router Flaw

ASUS Flags Critical AiCloud Router Flaw

November 27, 2025

Latest Alerts

Bloody Wolf Widens Java RAT Campaign

Forge Library Patch Stops Signature Bypass

ShadowV2 Botnet Tests During AWS Outage

Toddycat Tools Steal Outlook And M365 Data

Hackers Use Blender Assets To Spread StealC

ASUS Flags Critical AiCloud Router Flaw

Subscribe to our newsletter

    Latest Incidents

    Mazda Reports No Impact From Oracle Hack

    Asahi Breach Hits Two Million Users

    Qilin Ransomware Hits Korean MSP

    Multiple London Councils Hit By Cyber Attacks

    Russian Hackers Target US Engineering Firm

    Situsamc Confirms Customer Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial