Trojan program steals log-in credentials, other sensitive data from SAP client applications

Attackers can also use the malware to remotely control infected workstations and access SAP servers, Microsoft researchers said

A recently discovered malicious program steals log-in passwords and other sensitive information from SAP client applications and allows cybercriminals to access SAP servers from infected workstations.

Researchers from ERPScan, a company that develops SAP security scanning products, revealed at the RSA Europe security conference in October that a new malware program scans infected computers for the presence of SAP applications, possibly in preparation for future attacks.

Researchers from Microsoft recently analyzed the same malware, which they named TrojanSpy:Win32/Gamker.A, and found that it does more than just basic reconnaissance.

"This is an attempted attack on SAP and not just a harmless data-gathering operation to determine if SAP is installed," Geoff McDonald, a researcher with the Microsoft Malware Protection Center (MMPC), said Wednesday in a blog post. "The attackers are using the execution of the SAP component 'saplogon.exe' to trigger recording of the command-line arguments passed into it, combined with a series of 10 screenshots to the C&C server."

Gamker has a keylogging component that logs all keystrokes entered into any application running on an infected computer. This component can capture log-in credentials like usernames and passwords, including those entered in SAP client applications.

The malware also maintains a large list of specific applications for which it also records command-line parameters and takes screen shots of their active windows.

The list includes saplogon.exe, but also finance-related programs, cryptography tools, VPN clients, Bitcoin wallets and more. The complete list is included in the MMPC blog post, but some examples are rclient.exe (remote administration client), translink.exe (a tool by Western Union), truecrypt.exe and bestcrypt.exe (two encryption applications), openvpn-gui (a graphical user interface for the OpenVPN client).

Gamker shares some code with Carberp, a Russian online banking Trojan program whose source code was leaked online earlier this year, McDonald said. The common part is the Virtual Network Computing (VNC) remote desktop functionality that can be used to remotely control an infected computer.

"It is unclear if there is a larger connection between Gamker and Carberp since the remainder of Gamkers code differs from Carberp's publicly leaked code," the Microsoft researcher said.

According to McDonald, the command-line arguments for the saplogon.exe process are unlikely to contain sensitive information, but the screen shots of its active window can reveal the SAP user name, server name and other confidential data.

That information, combined with the SAP password captured by the keylogging component and the VNC functionality, gives attackers everything they need to attack SAP servers directly from infected machines.

SAP software is used by enterprises to track and manage many business operations including manufacturing, human resources and sales. This means that SAP servers usually contain a lot of sensitive information like customer details, trade secrets, intellectual property or financial data, which can be valuable for attackers.

Depending on the permissions of the stolen SAP credentials, in addition to stealing data, attackers can set up rogue payments or disrupt business operations.

According to ERPScan, 86 percent of companies on the Forbes 500 list use SAP software.

To mitigate the damage caused by possible attacks on their SAP systems, companies should grant users the minimum access privilege level required to complete their job, should implement two-factor authentication, run anti-malware programs and network intrusion detection systems, train their employees to avoid malware infections and keep the software running on their workstations up to date, McDonald said.

"This trojans targeting of businesses, as opposed to individuals, is an alarming move and we will be monitoring this for further developments to protect and inform our customers," he said.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags Customer Relationship ManagementapplicationsMicrosoftBusiness Process Managementsecurityenterprise resource planningSAPsoftwarespywaremalwareERPScan

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?