Hacker Attacks Target ERP, SAP and Oracle Business Applications

Nearly two of three organizations using large enterprise resource planning platforms have been victimized by a security breach in the last 24 months, a recent survey of IT decision makers found.

According to the IDC-conducted survey of 430 IT decision makers, 191 of whose outfits are SAP or Oracle E-Business centric, information most often compromised includes sales, financial data and personally identifiable information (PII). Those targets suggests that the security breaks may come from insider trading, collusion and fraud, application security provider Onapsis, the study’s sponsor, said.

“The information compromised most often according to this research is the highest regulated in today’s business ecosystem,” Onapsis said. Still, 62 percent of the study’s participants said their ERP applications are vulnerable to cyber attacks.

Hacker Attacks Target These ERP Applications, Data

Among the 64 percent of enterprises that have experienced breaches of large ERP platforms in the last 24 months, information comprised includes sales data (50 percent), HR data (45 percent), customer PII (41 percent), intellectual property (36 percent) and financial data (34 percent).

  • 78 percent of respondents report that ERP application users are audited every 90 days or more.
  • 74 percent of SAP and Oracle EBS applications are connected to the internet.
  • 56 percent of C-level executives are concerned or very concerned about moving ERP applications to the cloud.
  • 62 percent believe that their ERP applications have critical vulnerabilities despite an attention to patching.

“Enterprise Resource Planning (ERP) applications such as Oracle E-Business Suite and SAP (ECC) can be foundational for businesses, ”said Frank Dickson, IDC cybersecurity products program vice president. “A breach of such critical ERP applications can lead to unexpected downtime, increased compliance risk, diminished brand confidence and project delays.”

A lack of cybersecurity focus on IT general controls can leave an organization especially vulnerable, said Sergio Abraham, an Onapsis security researcher. “It is very common to find a security administration section as part of [IT general controls],” Abraham wrote in a blog post. “However, they often refer to users’ ability to create other users, assign roles, modify authorizations, change password policy parameters, [and] assessing default accounts in the systems…Security vulnerabilities in critical IT assets can have much higher risks than the ones currently being mitigated by IT General Controls.”

Larry Harrington, former chairman of the global board of the Institute of Internal Auditors (IIA), said that the survey’s findings “should raise questions at the Board level about the adequacy of internal controls to prevent cyberattacks and the level of auditing taking place.”

Return Home



    Nutan Sah:

    I am all for change that is transformational and beneficial, and really believe that HR and HCM are prime areas that need new technology and thinking. People are and will remain central to any business. We have developed a platform based on this principle. The platform gives you all an end-to-end view of all that is related to your people in the form of analytics. Check it out – http://www.peoplehum.com/#bl

    Zarah B:

    If you’re running SolMan in your landscape, SolMan can act as a middleware for event monitoring between your SAP systems and Splunk. SolMan’s Monitoring and Alerting infrastructure (MAI) can connect directly to SAP logs and detect Indicators of Compromise (IOCs). Security alerts are generated by MAI and written to an external file that is periodically pushed to Splunk by OS command. This approach doesn’t require any additional hardware or software. You may visit: layersevensecurity.com

Leave a Reply

Your email address will not be published.