Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

SAP Security Threats Surge Amid Attacks

April 18, 2024
Reading Time: 3 mins read
in Alerts
SAP Security Threats Surge Amid Attacks

A concerning trend has emerged as malicious hackers intensify their focus on compromising SAP applications, as revealed in a recent report by cybersecurity firms Onapsis and Flashpoint. The surge in attacks can be attributed to the growing adoption of SAP applications in cloud environments, coupled with the heightened ability of adversaries to exploit misconfigurations and security vulnerabilities across cloud and on-premises setups. Over the past three years, ransomware attacks against SAP systems have skyrocketed by 400%, mirroring the increased value brokers are willing to pay for exploits targeting SAP vulnerabilities, according to the report.
The report also sheds light on the alarming rise in discussions surrounding SAP flaws and exploits on hacker forums, with a staggering 490% increase in chatter related to SAP vulnerabilities. Notably, discussions concerning SAP-specific cloud and web services have surged by 220%, indicating a shift in attacker tactics to capitalize on vulnerabilities in modern SAP deployments. Threat actors of varying sophistication levels, including high-profile groups like APT10, FIN7, FIN13, and Cobalt Spider, have been observed exploiting SAP vulnerabilities to launch targeted attacks across diverse industry verticals.

The attractiveness of SAP applications as lucrative targets for cybercriminals is further underscored by the software giant’s extensive customer base, which includes over 400,000 organizations globally, including the majority of the world’s largest companies. With threat actors eyeing high-profile targets for potential data theft, financial fraud, and ransomware extortion, the stakes have never been higher for organizations relying on SAP solutions.

In response to the heightened threat landscape, exploit acquisition firms are offering substantial rewards for SAP vulnerabilities, with prices soaring for remote code execution (RCE) flaws and exploits. Additionally, dark web conversations reveal a concerning trend of threat actors discussing not only SAP vulnerabilities but also instances of successful compromises involving SAP products. The report emphasizes the critical importance of securing SAP applications comprehensively, urging organizations to prioritize not only operating system and endpoint security but also application-level defenses to mitigate the evolving threat posed by cybercriminals targeting SAP ecosystems.

Reference:
  • Surge in SAP Attacks Highlights Urgent Security Needs

Tags: April 2024Cyber AlertCyber Alerts 2024Cyber RiskCyber threatFlashpointOnapsisSAP applications
ADVERTISEMENT

Related Posts

Water Curse Group Hits Developers Via GitHub

Water Curse Group Hits Developers Via GitHub

June 17, 2025
Water Curse Group Hits Developers Via GitHub

XDSpy Exploits Windows LNK Zero Day

June 17, 2025
Water Curse Group Hits Developers Via GitHub

CISA Warns Of Apple Zero Click Exploit

June 17, 2025
PyPI Malware Steals AWS, CI/CD, macOS Data

PyPI Malware Steals AWS, CI/CD, macOS Data

June 16, 2025
PyPI Malware Steals AWS, CI/CD, macOS Data

Image Hiding in DNS TXT Records

June 16, 2025
PyPI Malware Steals AWS, CI/CD, macOS Data

IBM Backup Service Flaw Allows Elevated Access

June 16, 2025

Latest Alerts

Water Curse Group Hits Developers Via GitHub

XDSpy Exploits Windows LNK Zero Day

CISA Warns Of Apple Zero Click Exploit

PyPI Malware Steals AWS, CI/CD, macOS Data

IBM Backup Service Flaw Allows Elevated Access

Image Hiding in DNS TXT Records

Subscribe to our newsletter

    Latest Incidents

    Zoomcar Data Breach Hits 8.4 Million Users

    Qilin Gang Leaks Asefa FC Barcelona Data

    Gunra Claims 45TB Hack On Colombia Justice

    Hackers Leak 10K VirtualMacOSX Customer Data

    Canada WestJet Airline Contains Cyberattack

    Washington Post Investigates Cyberattack on Emails

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial