CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◉ Threat Intelligence Apr 21, 2026

'Everest Group' Extorts Global Orgs via SAP's HR Tool - Dark Reading

Dark Reading Archived Apr 21, 2026 ✓ Full text saved

'Everest Group' Extorts Global Orgs via SAP's HR Tool Dark Reading

Full text archived locally
✦ AI Summary · Claude Sonnet


    TechTarget and Informa Tech’s Digital Business Combine. Dark Reading Resource Library Black Hat News Omdia Cybersecurity Advertise NEWSLETTER SIGN-UP Cybersecurity Topics World The Edge DR Technology Events Resources CYBERATTACKS & DATA BREACHES THREAT INTELLIGENCE СLOUD SECURITY CYBER RISK NEWS Breaking cybersecurity news, news analysis, commentary, and other content from around the world, with an initial focus on the Middle East & Africa and the Asia Pacific 'Everest Group' Extorts Global Orgs via SAP's HR Tool In addition to Coca-Cola, entities in Abu Dhabi, Jordan, Namibia, South Africa, and Switzerland are experiencing extortion attacks, all involving stolen SAP SuccessFactor data. Nate Nelson,Contributing Writer May 30, 2025 4 Min Read SOURCE: MAURITIUS IMAGES GMBH VIA ALAMY STOCK PHOTO Extortionist-cum-information broker "Everest Group" has pulled off a swath of attacks against large organizations in the Middle East, Africa, Europe, and North America, and is now extorting victims over records stolen from their human resources departments. This May, the long-overlooked threat actor advertised nine new cyberattacks. Victims ranged from healthcare organizations to construction and facilities management companies. But its biggest win came against Coca-Cola, from which it stole records associated with hundreds of employees, including their personally identifying information (PII) like names and addresses, salary records, and scans of passports and visas. In each of these leaks, researchers from VenariX found files relating to SAP SuccessFactors, SAP's cloud-based HR management platform. The researchers believe the attacks to be legitimate and estimate that initial access in each case likely occurred through a third-party SAP service provider called "INK IT Solutions." Related:Chinese APT Targets Indian Banks, Korean Policy Circles Everest's String of Success Besides Coca-Cola, Everest's most notable May victims have been the Mediclinic Group — a multibillion-dollar hospital group managing locations in Namibia, South Africa, Switzerland, and the United Arab Emirates (UAE) — and the Department of Tourism and Culture in Abu Dhabi (DCTA). It has also struck smaller outfits, like the Brooklyn-based medical imaging company PDI Health and a small bank based in Jordan called Jordan Kuwait Bank. In each case, Everest Group has highlighted stolen data pertaining to company employees. With DCTA, for instance, it claims to be in possession of 12GB of "internal company data, most notably around 1,500 records with sensitive information about employees: passports and visas, birth and marriage certificates, university diplomas, and more. Identity cards, employee usernames, email addresses, protected health information (PHI), and other confidential business data might also have been compromised. DCTA's website was briefly down following the initial incident. Everest Group has posted a countdown clock on its leak site, set to expire June 1 if DCTA doesn't comply with its demands. Data featured in the leaks suggests that these attacks are correlated with SAP SuccessFactors. Found among DCTA's trove: a SuccessFactors employee profile, a listing of other SuccessFactor profiles that seem to belong to current or former DCTA employees, and payroll details that also appear to have come from a SuccessFactors profile. Data stolen from the construction company Kaefer includes a CSV export of SuccessFactors' user directory. Coca-Cola's leak data includes 959 SuccessFactors employee profiles in PDF format. Related:6-Year Ransomware Campaign Targets Turkish Homes & SMBs The connecting thread appears to go deeper still. In one form or another, VenariX connected at least five of the victimized companies with INK IT Solutions, a SAP integrator based in Melbourne, Australia. Dark Reading has reached out to SAP and INK IT Solutions to confirm what they know of the attacks. This story will be updated should either company provide comment. The Elusive Everest Group The Everest Group was first spotted in December 2020, but it's never attracted so much attention. One reason for this may be its slow but steady rate of attack. Venarix has attributed 148 known cyber incidents to the group, averaging only a few per month since its inception. The attacks appear to be opportunistic, affecting organizations of a variety of sizes across multiple geographic locations and industries. Its most notable targets have been AT&T, a US District Court in Illinois, the government of the State of Rio Grande do Sul in Brazil, and Collins Aerospace, a partner to NASA. Another reason Everest may be escaping attention is because it's hard to pin down. Case in point: While the DCTA and Coca-Cola incidents were extortion attacks, Illinois, Brazil, and Collins Aerospace were all instances in which Everest Group sold its initial access to other threat actors on the Dark Web. Related:Fraud Rockets Higher in Mobile-First Latin America "They are kind of weird in a way, because they started off selling data, and then they moved on to ransomware, and then they moved on to selling initial access, and now they're back selling compromised data," notes one Searchlight Cyber analyst who chose to be anonymous for this story. "I don't know of any other example of a hacking group that's gone on a continuous transition between different modus operandi," he adds. "It might be the case that they had affiliates who joined the group, did what they knew best, and then they left the group. So they were left with other affiliates who knew a different thing, and they worked with the skill sets that they then had within the team," he guesses. All of this shape-shifting also helps to explain why the group's tactics, techniques, and procedures (TTPs) have been elusive. "If they were stagnant in terms of what tactics they used, maybe it was easier to research them over time. But because they're changing so often, I can't really pinpoint a certain tool they're consistently using or a certain attack method they're always applying." Don't miss the latest Dark Reading Confidential podcast, The Day I Found an APT Group in the Most Unlikely Place, where threat hunters Ismael Valenzuela and Vitor Ventura share stories about the tricks they used to track down advanced persistent threats and the surprises they discovered along the way. Listen now! Read more about: DR Global Middle East & Africa About the Author Nate Nelson Contributing Writer Nate Nelson is a journalist and scriptwriter. He writes for "Darknet Diaries" — the most popular podcast in cybersecurity — and co-created the former Top 20 tech podcast "Malicious Life." Before joining Dark Reading, he was a reporter at Threatpost. Want more Dark Reading stories in your Google search results? ADD US NOW More Insights Industry Reports CISO Survey 2026: The State of Incident Response Readiness AI SOC for MDR: The Structural Evolution of Managed Detection and Response How Enterprises Are Developing Secure Applications KuppingerCole Business Application Risk Management Leadership Compass 2026 CISO AI Risk Report Access More Research Webinars Defending Against AI-Powered Attacks: The Evolution of Adversarial Machine Learning Tips for Managing Cloud Security in a Hybrid Environment? Zero Trust Architecture for Cloud environments: Implementation Roadmap Security in the AI Age Identity Maturity Under Pressure: 2026 Findings and How to Catch Up More Webinars You May Also Like CYBERATTACKS & DATA BREACHES Critical Fortinet Flaws Under Active Attack by Jai Vijayan, Contributing Writer DEC 17, 2025 CYBERSECURITY ANALYTICS In Cybersecurity, Claude Leaves Other LLMs in the Dust by Nate Nelson, Contributing Writer DEC 17, 2025 APPLICATION SECURITY Self-Replicating 'Shai-hulud' Worm Targets NPM Packages by Alexander Culafi SEP 16, 2025 CYBERSECURITY OPERATIONS Women Who 'Hacked the Status Quo' Aim to Inspire Security Careers by Elizabeth Montalbano, Contributing Writer JUL 16, 2025 Editor's Choice VULNERABILITIES & THREATS EDR-Killer Ecosystem Expansion Requires Stronger BYOVD Defenses byRob Wright APR 14, 2026 8 MIN READ СLOUD SECURITY CSA: CISOs Should Prepare for Post-Mythos Exploit Storm byAlexander Culafi APR 13, 2026 6 MIN READ СLOUD SECURITY Navigating the Unique Security Risks of Asia's Digital Supply Chain byAlexander Culafi APR 15, 2026 3 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Defending Against AI-Powered Attacks: The Evolution of Adversarial Machine Learning MON, MAY 11, 2026 AT 1:00PM ET Tips for Managing Cloud Security in a Hybrid Environment? THURS, MAY 7, 2026 AT 1PM EST Zero Trust Architecture for Cloud environments: Implementation Roadmap TUES, MAY 12, 2026 AT 1PM EST Security in the AI Age TUES, APRIL 28, 2026 AT 1PM EST Identity Maturity Under Pressure: 2026 Findings and How to Catch Up WED, MAY 6,2026 AT 1PM EST More Webinars White Papers How Sunrun Transformed Security Operations with AiStrike Autonomous Pentesting at Machine Speed, Without False Positives Best practices for incident response planning Building a Robust SOC in a Post-AI World Industry Report: AI, SOC, and Modernizing Cybersecurity Explore More White Papers BLACK HAT ASIA | MARINA BAY SANDS, SINGAPORE Experience cutting-edge cybersecurity insights in this four-day event featuring expert Briefings on the latest research, Arsenal tool demos, a vibrant Business Hall, networking opportunities, and more. Use code DARKREADING for a Free Business Pass or $200 off a Briefings Pass. GET YOUR PASS GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE Discover More Black Hat Omdia Working With Us About Us Advertise Reprints Join Us NEWSLETTER SIGN-UP Follow Us Copyright © 2026 TechTarget, Inc. d/b/a Informa TechTarget. This website is owned and operated by Informa TechTarget, part of a global network that informs, influences and connects the world’s technology buyers and sellers. All copyright resides with them. Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. TechTarget, Inc.’s registered office is 275 Grove St. Newton, MA 02466. Home| Cookie Policy| Privacy| Terms of Use Your Privacy Choices
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◉ Threat Intelligence
    Published
    Apr 21, 2026
    Archived
    Apr 21, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗