{"id":3189,"date":"2025-05-06T15:42:23","date_gmt":"2025-05-06T14:42:23","guid":{"rendered":"https:\/\/aegislens.com\/home\/?p=3189"},"modified":"2025-05-11T17:50:56","modified_gmt":"2025-05-11T16:50:56","slug":"latest-cybersecurity-alert-sap-netweaver-faces-second-attack-wave-following-zero-day-breach","status":"publish","type":"post","link":"https:\/\/aegislens.com\/home\/latest-cybersecurity-alert-sap-netweaver-faces-second-attack-wave-following-zero-day-breach\/","title":{"rendered":"Latest Cybersecurity Alert: SAP NetWeaver Faces Second Attack Wave Following Zero-Day Breach"},"content":{"rendered":"<p><body><br \/>\n<main><\/p>\n<article>\n<h1 style=\"font-weight:bold; text-align:center;\">Second Wave of Attacks Hitting SAP NetWeaver After Zero-Day Compromise<\/h1>\n<p>SAP NetWeaver, a technical foundation which supports all SAP applications, has once again become the target of threat actors.<\/p>\n<p>The popular platform is experiencing a resurgence in cyber attacks, exploiting the webshells deployed during a recent zero-day vulnerability incident.<\/p>\n<h2>Attack Overview<\/h2>\n<p>SAP NetWeaver first came under fire when a zero-day vulnerability, CVE-2020-6287, also known as &#8216;RECON&#8217; (Remotely Exploitable Code On Netweaver), was discovered.<\/p>\n<p>This vulnerability allowed unauthenticated attackers full access to affected SAP applications.<\/p>\n<p>Now, a second wave of attacks has been detected, having been launched from the webshells established during the initial zero-day exploit.<\/p>\n<p>In this second round of malicious activity, the cyber criminals are sharing and selling access to compromised SAP servers on the darknet, suggesting this may evolve into a cascading network of threats.<\/p>\n<h2>Threat Details<\/h2>\n<p>Unlike the initial attack, which had a broad range of targets, the second wave appears focused on certain industries, including governmental, manufacturing and insurance sectors.<\/p>\n<p>Although the reason behind this targeted approach is not known, it further magnifies the seriousness of the issue.<\/p>\n<h2>Advice and Measures<\/h2>\n<p>SAP NetWeaver companies must act swiftly and decisively to mitigate these risks.<\/p>\n<p>Immediate patching of the RECON vulnerability is of prime importance, followed by a thorough investigation to identify and remove any installed webshells.<\/p>\n<p>Crimes must be reported to the relevant authorities and prompt notification of the security breach is necessary to all relevant stakeholders.<\/p>\n<p>The increasing trend and sophistication of these attacks serve as a stark reminder for companies to routinely inspect their digital assets, patch vulnerabilities promptly, and employ robust cybersecurity defenses.<\/p>\n<p>Awareness and vigilance can go a long way in combating these threats.<\/p>\n<h2>Follow-Up Reading<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.csoonline.com\/article\/3396305\/the-5-cybersecurity-rules-of-trust.html\">The 5 Cybersecurity Rules of Trust<\/a><\/li>\n<li><a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/new-study-details-business-tactics-of-cybercriminals\/a\/d-id\/1335219\">New Study Details Business Tactics of Cybercriminals<\/a><\/li>\n<li><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/90-of-data-breaches-involve-a-phishing\/\">90% of Data Breaches Involve Phishing<\/a><\/li>\n<\/ul>\n<\/article>\n<p><\/main><br \/>\n<\/body><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Second Wave of Attacks Hitting SAP NetWeaver After Zero-Day Compromise SAP NetWeaver, a technical foundation<\/p>\n","protected":false},"author":1,"featured_media":3221,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pmpro_default_level":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2,5],"tags":[],"class_list":["post-3189","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-news","pmpro-has-access"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/3189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/comments?post=3189"}],"version-history":[{"count":3,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/3189\/revisions"}],"predecessor-version":[{"id":3223,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/3189\/revisions\/3223"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/media\/3221"}],"wp:attachment":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/media?parent=3189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/categories?post=3189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/tags?post=3189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}