Study warns of rising hacker threats to SAP, Oracle
business management software
Send a link to a friend
[July 25, 2018]
By Eric Auchard
LONDON (Reuters) - At least a dozen
companies and government agencies have been targeted and thousands more
organizations are exposed to data breaches by hackers exploiting old
security flaws in management software, two cyber security firms told
Reuters.
The U.S. Department of Homeland Security is preparing on Wednesday to
issue an alert based on the report about the risks posed to thousands of
unpatched business systems from software makers Oracle and SAP, which
can enable hackers to steal corporate secrets, the researchers said.
Homeland Security declined to comment and Reuters could not immediately
confirm the warning from independent sources.
Systems at two government agencies and at firms in the media, energy and
finance sectors have been hit after failing to install patches or take
other security measures advised by Oracle or SAP, experts at security
firms Onapsis and Digital Shadows said.
The security alert from the Homeland Security's Computer Emergency
Response Team (US-CERT) includes steps that organizations can take to
identify vulnerable systems and close long-standing security gaps, the
companies told Reuters.
The threat is alarming because businesses store highly sensitive data –
including financial results, manufacturing secrets and credit card
numbers – in the vulnerable products, known as enterprise resource
planning (ERP) software and in related applications for managing
customers, employees and suppliers.
Many of these issues date back a decade or more, but the new study shows
rapidly rising interest by hacker activists, cyber criminals and
government spy agencies in capitalizing on these issues, Onapsis Chief
Executive Mariano Nunez told Reuters.
"These attackers are ready to exploit years-old risks that give them
full access to SAP and Oracle systems without being detected," he said.
"The urgency level among chief security officers and CEOs should be far
higher."
SAP and Oracle declined to comment immediately.
The new alert, if issued, would expand on a 2016 Homeland Security
department warning to SAP customers after Onapsis uncovered plans by
Chinese hackers to exploit out-date software used by dozens of
companies, Nunez said. (https://reut.rs/2JKJvCI)
[to top of second column] |
SAP logo is seen at SAP company offices in Woodmead, Johannesburg,
South Africa, March 26, 2018. REUTERS/Siphiwe Sibeko
Organizations sometimes delay security fixes to ERP software for months or even
years out of concern that doing so could disrupt the critical functions the
programs support, including manufacturing, sales and finance, Nunez said.
Risks also arise from technical installation mistakes or growing moves to hook
up traditionally back-office business systems to the cloud in order to reach
mobile or online users.
In its latest research, Onapsis, together with web monitoring firm Digital
Shadows, identified some 17,000 SAP and Oracle software installations exposed to
the internet at more than 3,000 top companies, government agencies and
universities.
At least 10,000 servers are running incorrectly configured software that could
subject them to direct attack using known SAP or Oracle exploits, the report's
authors warned.
More than 4,000 known bugs in SAP and 5,000 in Oracle software pose security
threats, especially in older systems that operators may consider uneconomical to
fix, according to the report from Onapsis and Digital Shadows due out on
Wednesday.
Digital Shadows combed through Google searches, social media chatter and the
dark web where they found discussions in Chinese and Russian hacker forums
regarding how to use specific SAP and Oracle vulnerabilities.
The ERP study by Onapsis and Digital Shadows is available for download at
https://goo.gl/pWbz3Q
(Reporting by Eric Auchard; editing by Jim Finkle and Jason Neely)
[© 2018 Thomson Reuters. All rights
reserved.] Copyright 2018 Reuters. All rights reserved. This material may not be published,
broadcast, rewritten or redistributed.
Thompson Reuters is solely responsible for this content. |