Chinese hackers exploit SAP vulnerability in sophisticated global espionage operation
A critical SAP flaw is being actively exploited by Chinese state-linked hackers in targeted cyber-espionage attacks against major corporations worldwide.

A Chinese state-sponsored hacking group is actively exploiting a critical vulnerability in SAP enterprise software as part of a sophisticated global cyber-espionage campaign, cybersecurity researchers have revealed.
The operation, which targets businesses and government systems using unpatched SAP systems, is believed to be aimed at stealing sensitive data, including proprietary business information and internal communications.
Security analysts warn that the attackers are leveraging a known but severely under-patched SAP vulnerability, allowing unauthorized remote access to business-critical applications. Once inside, the threat actors reportedly move laterally within affected networks, exfiltrating data without immediately triggering detection systems.
According to reports, the Chinese hackers are part of an advanced persistent threat (APT) group known for its links to Beijing’s intelligence apparatus. The campaign appears to be highly targeted, affecting sectors such as defense, manufacturing, technology, and critical infrastructure across multiple continents.
SAP, the world’s leading provider of enterprise resource planning (ERP) software, released patches for the flaw in question earlier, but many organizations have reportedly failed to implement the updates, leaving their systems exposed.
Cybersecurity experts are urging global IT teams to immediately:
-
Audit SAP systems for suspicious activity
-
Apply all relevant security patches
-
Monitor for indicators of compromise linked to this espionage campaign
This latest revelation follows a pattern of state-aligned cyber operations leveraging enterprise software vulnerabilities to carry out covert surveillance and intellectual property theft.
Governments and cybersecurity firms have increased pressure on organizations to treat enterprise software risks as national security threats, especially when dealing with vendors that handle sensitive operational data.
Asaase Broadcasting Company airs on Asaase 99.5 Accra, Asaase 98.5 Kumasi, Asaase 99.7 Tamale, Asaase 100.3 Cape Coast, AsaasePa 107.3 (Accra).
Affiliates: Bawku FM 101.5, Bead FM 99.9 (Bimbilla), Mining City Radio 89.5 (Tarkwa), Nandom FM 101.9, Nyatefe Radio 94.5 (Dzodze), Sissala Radio 96.3 (Tumu), Somuaa FM 89.9 (Gushegu), Stone City 90.7 (Ho) and Wale FM 106.9 (Walewale).
Listen online: asaaseradio.com, Sound Garden and TuneIn.
Follow us:
X: @asaaseradio995, @Asaase985ksi, @Asaase997tamale, @asaase1003, asaasepa1073
Instagram: asaaseradio99.5, asaase985ksi, asaase100.3, asaase99.7tamale, asaasepa107.3
LinkedIn: company/asaaseradio995. TikTok: @asaaseradio99.5
Facebook: asaase99.5, asaase985ksi, Asaase100.3, asaase99.7, AsaasePa107.3.
YouTube: AsaaseRadioXtra.
Join the conversation. Accra: call 020 000 9951/054 888 8995, WhatsApp 020 000 0995. Kumasi: call 059 415 7985 or call/WhatsApp 020 631 5260. Tamale: call/WhatsApp/SMS 053 554 6468. Cape Coast: call/WhatsApp 059 388 2652.
#AsaaseRadio
#AsaasePa
#TheVoiceofOurLand