{"id":425,"date":"2018-02-26T08:00:30","date_gmt":"2018-02-26T07:00:30","guid":{"rendered":"http:\/\/akquinet-security-en.blog\/?p=425"},"modified":"2020-07-07T11:51:31","modified_gmt":"2020-07-07T09:51:31","slug":"is-wannacry-possible-for-sap-systems","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2018\/02\/26\/is-wannacry-possible-for-sap-systems\/","title":{"rendered":"Is WannaCry possible for SAP systems?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-413 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/02\/shutterstock_157006316_akqw-e1517509869961.jpg\" alt=\"shutterstock_157006316_akqw\" width=\"300\" height=\"225\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/02\/shutterstock_157006316_akqw-e1517509869961.jpg 599w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/02\/shutterstock_157006316_akqw-e1517509869961-300x225.jpg 300w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><span style=\"color: #626161;\"><strong>Last year, WannaCry brought some companies to the edge of absolute ruin. While the most common entry vectors are known, companies are still making it much too easy for hackers.<\/strong><\/span><\/p>\n<p><span style=\"color: #626161;\">Officially, emails were to blame for the largest-scale cyberattack in recent years. If users clicked on the mail attachment, WannaCry implanted malware into the computers, propagated itself, and encrypted accessible data in the blink of an eye. In an alternative scenario, hackers had infiltrated the manufacturer of a subsystem and built the malware code into a software patch. <\/span><br \/>\n<span style=\"color: #626161;\">While unfamiliar emails can simply be deleted, the deployment of such a patch can undermine the in-house security system with breathtaking speed.<\/span><\/p>\n<p><span style=\"color: #626161;\"><!--more--><strong>Four out of five companies hacked in the space of 60 minutes<br \/>\n&#8220;<\/strong>Time and again, our penetration tests for SAP systems show that security vulnerabilities in companies are routine. In over 80% of companies tested, we successfully broke into SAP and connected systems within one hour. What\u2019s more, only six percent of those affected actually noticed we had done so. Over three-quarters of businesses do not secure their systems adequately and offer hackers quick and easy paths to getting their hands on personnel and customer data, engineering plans, formulations, and lists of salaries.\u201d,\u00a0concludes Bodo Kahl, Managing Director &#8220;SAST&#8221; at AKQUINET.<\/span><\/p>\n<p><span style=\"color: #626161;\"><strong>Bitkom, Ernst &amp; Young: At least two-thirds of companies affected by IT security incidents<\/strong><\/span><br \/>\n<span style=\"color: #626161;\">This internal survey is also confirmed by independent external analysts. According to market researchers from IT association Bitkom, two-thirds (67%) of all firms have now been affected by \u2018IT incidents\u2019. And the \u2018Global Information Security Survey 2017\/2018\u2019 from consulting services group Ernst &amp; Young also makes a plea for urgent action: A mere 4% of the security experts interviewed worldwide believed that the implementation of their security strategy was comprehensive enough to be able to detect and effectively counter relevant threats. Mr. Kahl has noticed this, too: \u201cMany companies don\u2019t even notice when their secret plans are being copied and their knowledge is leaking.\u201d<\/span><\/p>\n<p><span style=\"color: #626161;\">As a rule, whether or not a data theft is ever detected is typically only thanks to employee alertness and internal audits \u2013 or just a lucky chance. According to Bitkom\u2019s findings, security systems simply fail 99% of the time. On the positive side, companies are planning to increase their spending on security technology (45%), to conduct regular requirements analyses for IT security (36%), and hire additional staff in this area (31%). But is all of this enough? It would, of course, be better to detect unauthorized access to in-house data immediately.<\/span><\/p>\n<p><span style=\"color: #626161;\"><strong>Job applicant and supplier portals often used as a point of entry<\/strong><\/span><br \/>\n<span style=\"color: #626161;\">Our experience has shown us that companies often lack an integrated security policy. Firewalls have long been inadequate as the only means of protection for database, networks, interfaces, and portals. Evidence has shown that hackers have a penchant for infiltrating company systems via applicant and supplier portals. With SAP customers, it was also clear just how frequently SAP Solution Manager was left unprotected. \u201cIt\u2019s no good if production data has excellent protection but SAP Solution Manager is left wide open,\u201d Mr. Kahl explains.<\/span><\/p>\n<p><span style=\"color: #626161;\"><strong>Analyze systems first \u2013 then harden<\/strong><\/span><br \/>\n<span style=\"color: #626161;\">A security and compliance audit often marks the starting-point for developing a suitable security policy for a business. The procedure is as follows:<\/span><\/p>\n<p><span style=\"color: #626161;\">1) A comprehensive<strong> assessment<\/strong> of SAP security at the customer enables a <strong>detailed analysis<\/strong> that states the most important individual vulnerabilities and establishes priorities. Since hackers like to bypass SAP systems, a key point of focus here is on databases, networks, and operating systems. While SAP does publish guidelines giving precise instructions for SAP system pre-installation and parameterization, these are very detailed and (as experience has shown) almost impossible to handle manually.<\/span><\/p>\n<p><span style=\"color: #626161;\">2) To ensure good \u2018data leakage prevention\u2019 practice, only a <strong>select group of individuals<\/strong> <strong>should have authorization<\/strong> to download sensitive data from the SAP system. Mr. Kahl: \u201cA good security system should be capable of showing at the press of a button if someone has too many rights.\u201d<\/span><\/p>\n<p><span style=\"color: #626161;\">3) Detection systems are used to sense \u2013 ideally in <strong>real time<\/strong> \u2013 if unauthorized persons have penetrated into systems and trigger an alarm. A dashboard is used to present an <strong>at-a-glance view<\/strong> of information such as critical staff authorizations, critical system parameters, and security incidents.<\/span><\/p>\n<p><span style=\"color: #626161;\"><strong>Establishing system security and setting up real-time monitoring with a preconfigured security suite<\/strong><\/span><br \/>\n<span style=\"color: #626161;\">The challenge in large companies and corporations consists of mastering the complexity of discrete system architectures. To achieve this, AKQUINET developed its SAST SUITE \u2013 a software package that includes all of the key building blocks needed to secure SAP systems \u2013 from \u2018Platform Security\u2019 and \u2018Identity and User Access Management\u2019 to 360\u00b0 real-time analyses. While larger-scale SAP environments require, for example, protection for hundreds of interfaces, customers still need just a few weeks for real-time monitoring to be established. One reason for this is the fact that, unlike other security tools, the SAST SUITE preconfigures a very large number of rulesets \u2013 thereby avoiding the need for this time-consuming task from the outset. <\/span><br \/>\n<span style=\"color: #626161;\"> \u201cWe typically quote a few days for the analysis and hardening of a single system, including modifications to centralized access rights,\u201d explains Mr. Kahl. In this context, AKQUINET also handle real-time analysis work for customers where needed as a managed service.<\/span><\/p>\n<p><span style=\"color: #626161;\"><strong><a href=\"https:\/\/sast-solutions.de\/Managed-Services\/Managed-Services\/index-2.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">Managed service security<\/a>: packaged Expertise<\/strong><\/span><br \/>\n<span style=\"color: #626161;\">Managed services are a particularly hot topic with companies at the moment. Often, the necessary technical expertise is lacking \u2013 not only for the in-house configuration and parameterization of the complex systems and the targeted deployment of monitoring and security tools, and especially for correctly interpreting the results that are later shown on the dashboard. Yet time is of the essence if an attack is actually detected. Service level agreements can be used to specify response times depending on the severity of an incident, while regular reports ensure the security managers in the companies remain fully informed of the security status at any time.<\/span><\/p>\n<p><span style=\"color: #626161;\"><strong>Understanding attack scenarios: think like a hacker<\/strong><\/span><br \/>\n<span style=\"color: #626161;\">\u201cBecause we are continuously confronted with the latest IT security incidents, we get the opportunity to analyze one new attack scenario after another,\u201d explains Mr. Kahl. The goal is to make it as difficult as possible for hackers to break into corporate networks. \u201cAs we know from our penetration testing, 90% of attacks focus on interfaces, attached documents, supplier and job applicant portals or the SAP Solution Manager. Anyone who closes these loopholes has effectively won the battle.\u201d<\/span><\/p>\n<p><span style=\"color: #626161;\">Companies still prefer to focus long-term spending on productivity, efficiency and innovation rather than in security. That could soon change; however, after May 2018, when the transition period for the EU\u2019s General Data Protection Regulation (GDPR) expires, potential losses resulting from IT security oversights will become exponentially higher. Companies who leak customer data in the future will not merely damage their reputation. They will also be fined up to 4% of their earnings by the data protection regulators.<\/span><\/p>\n<h6><span style=\"color: #626161;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-426\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/02\/abb_bodokahl_akquinet.jpg\" alt=\"Abb_BodoKahl_akquinet\" width=\"132\" height=\"92\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/02\/abb_bodokahl_akquinet.jpg 640w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/02\/abb_bodokahl_akquinet-300x210.jpg 300w\" sizes=\"auto, (max-width: 132px) 100vw, 132px\" \/><\/span><br \/>\n<span style=\"color: #626161;\">Bodo Kahl<\/span><br \/>\n<span style=\"color: #626161;\">Managing Director SAST SOLUTIONS\u00a0 at AKQUINET<\/span><\/h6>\n<p><span style=\"color: #626161;\"><a href=\"https:\/\/sast-solutions.de\/en\/news\/events-webinars\/index.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">Attend one of our webinars<\/a>: These are a time-saving way to find out more about these and other current topics in SAP security and compliance \u2013 live and designed to provide answers to your questions.<\/span><\/p>\n<h6><span style=\"color: #626161;\">The article can also be found in the print edition &#8220;IT-SICHERHEIT Best Practice 1\/2018&#8221;.<\/span><\/h6>\n","protected":false},"excerpt":{"rendered":"<p>Last year, WannaCry brought some companies to the edge of absolute ruin. While the most common entry vectors are known, companies are still making it much too easy for hackers.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[25,156,58],"class_list":["post-425","post","type-post","status-publish","format-standard","hentry","category-sap-managed-services","tag-cyber-attack","tag-cyber-security","tag-real-time-monitoring"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Is WannaCry possible for SAP systems?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2018\/02\/26\/is-wannacry-possible-for-sap-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is WannaCry possible for SAP systems?\" \/>\n<meta property=\"og:description\" content=\"Last year, WannaCry brought some companies to the edge of absolute ruin. While the most common entry vectors are known, companies are still making it much too easy for hackers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2018\/02\/26\/is-wannacry-possible-for-sap-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-26T07:00:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-07T09:51:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/02\/shutterstock_157006316_akqw-e1517509869961.jpg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/02\\\/26\\\/is-wannacry-possible-for-sap-systems\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/02\\\/26\\\/is-wannacry-possible-for-sap-systems\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Is WannaCry possible for SAP systems?\",\"datePublished\":\"2018-02-26T07:00:30+00:00\",\"dateModified\":\"2020-07-07T09:51:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/02\\\/26\\\/is-wannacry-possible-for-sap-systems\\\/\"},\"wordCount\":1193,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/02\\\/26\\\/is-wannacry-possible-for-sap-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/shutterstock_157006316_akqw-e1517509869961.jpg\",\"keywords\":[\"Cyber Attack\",\"Cyber Security\",\"Real-time monitoring\"],\"articleSection\":[\"SAP Managed Services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/02\\\/26\\\/is-wannacry-possible-for-sap-systems\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/02\\\/26\\\/is-wannacry-possible-for-sap-systems\\\/\",\"name\":\"Is WannaCry possible for SAP systems?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/02\\\/26\\\/is-wannacry-possible-for-sap-systems\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/02\\\/26\\\/is-wannacry-possible-for-sap-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/shutterstock_157006316_akqw-e1517509869961.jpg\",\"datePublished\":\"2018-02-26T07:00:30+00:00\",\"dateModified\":\"2020-07-07T09:51:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/02\\\/26\\\/is-wannacry-possible-for-sap-systems\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/02\\\/26\\\/is-wannacry-possible-for-sap-systems\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/02\\\/26\\\/is-wannacry-possible-for-sap-systems\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/shutterstock_157006316_akqw-e1517509869961.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/shutterstock_157006316_akqw-e1517509869961.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/02\\\/26\\\/is-wannacry-possible-for-sap-systems\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is WannaCry possible for SAP systems?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is WannaCry possible for SAP systems?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2018\/02\/26\/is-wannacry-possible-for-sap-systems\/","og_locale":"en_US","og_type":"article","og_title":"Is WannaCry possible for SAP systems?","og_description":"Last year, WannaCry brought some companies to the edge of absolute ruin. While the most common entry vectors are known, companies are still making it much too easy for hackers.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2018\/02\/26\/is-wannacry-possible-for-sap-systems\/","og_site_name":"SAST BLOG","article_published_time":"2018-02-26T07:00:30+00:00","article_modified_time":"2020-07-07T09:51:31+00:00","og_image":[{"url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/02\/shutterstock_157006316_akqw-e1517509869961.jpg","type":"","width":"","height":""}],"author":"securityblog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"securityblog","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/02\/26\/is-wannacry-possible-for-sap-systems\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/02\/26\/is-wannacry-possible-for-sap-systems\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Is WannaCry possible for SAP systems?","datePublished":"2018-02-26T07:00:30+00:00","dateModified":"2020-07-07T09:51:31+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/02\/26\/is-wannacry-possible-for-sap-systems\/"},"wordCount":1193,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/02\/26\/is-wannacry-possible-for-sap-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/02\/shutterstock_157006316_akqw-e1517509869961.jpg","keywords":["Cyber Attack","Cyber Security","Real-time monitoring"],"articleSection":["SAP Managed Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/02\/26\/is-wannacry-possible-for-sap-systems\/","url":"https:\/\/sast-solutions.com\/blog-en\/2018\/02\/26\/is-wannacry-possible-for-sap-systems\/","name":"Is WannaCry possible for SAP systems?","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/02\/26\/is-wannacry-possible-for-sap-systems\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/02\/26\/is-wannacry-possible-for-sap-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/02\/shutterstock_157006316_akqw-e1517509869961.jpg","datePublished":"2018-02-26T07:00:30+00:00","dateModified":"2020-07-07T09:51:31+00:00","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/02\/26\/is-wannacry-possible-for-sap-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2018\/02\/26\/is-wannacry-possible-for-sap-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/02\/26\/is-wannacry-possible-for-sap-systems\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/02\/shutterstock_157006316_akqw-e1517509869961.jpg","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/02\/shutterstock_157006316_akqw-e1517509869961.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/02\/26\/is-wannacry-possible-for-sap-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Is WannaCry possible for SAP systems?"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/425","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=425"}],"version-history":[{"count":3,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/425\/revisions"}],"predecessor-version":[{"id":1287,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/425\/revisions\/1287"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=425"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=425"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}