This whitepaper contains research details an attack timeline, documents what vulnerability was exploited, and provide recommendations on how to avoid data breaches in SAP systems.
You can download it from the following link: https://packetstormsecurity.com/files/download/132705/Chinese_attack_on_USIS_using_SAP_vulnerability_Detailed_review_and_comments.pdf
Source: https://packetstormsecurity.com/files/132705/Chinese-Attack-On-USIS-Exploiting-SAP-Vulnerability.html

