Oracle ratchets SAP 'grand-theft' allegations

Claims brass OKed 5TB heist


Oracle has turned up the heat in its already torrid legal attack on SAP, accusing high-ranking executives throughout the German company of knowingly approving a program that illegally downloaded five terabytes worth of Oracle software and support materials.

The allegations, which expand on accusations Oracle first aired 16 months ago, came in an amended complaint filed in San Francisco federal court Monday. They contrasted sharply with statements made by SAP asserting that while illegal copying may have taken place by SAP TN, a subsidiary that resulted from SAP's acquisition of a company called TomorrowNow, a "firewall" prevented executives from the mother ship from having access to the misappropriated information.

"Oracle now amends its claims because discovery in this case has revealed that the focus of its original claims - SAP's massive illegal downloading of software and support materials from Oracle's password-protected computer systems - is just one element of a larger scheme by SAP to steal and misuse Oracle's intellectual property," Oracle's amended complaint states. "In addition to the illegal downloads, SAP - with the knowledge of members of the SAP AG executive board of directors - made thousands of copies of Oracle's underlying software application on its computer systems."

The expanded allegations come several weeks after SAP said it's winding down the SAP TN subsidiary. It was filed a day before SAP is scheduled to release second-quarter financial results.

SAP representatives weren't available at time of writing. An SAP spokesman declined to comment on the allegations to the Associated Press.

Using a program tool dubbed "Titan," SAP spent years scraping Oracle's website for software applications, updates and instruction manuals, Oracle alleges. The program collected more than five terabytes of misappropriated data. One SAP server alone analyzed by Oracle investigators turned up almost 8 million downloaded pieces of data.

It was all part of a plan to boost an SAP initiative known as "Safe Passage," designed to help Oracle customers switch to SAP products. SAP employees compared updated Oracle products that were misappropriated against the previous versions to derive updates, which would then be delivered as fixes to SAP customers, the complaint claims. SAP employees also re-purposed Oracle instruction manuals, guides and other support materials into SAP documentation.

Members of SAP AG, in Germany, and SAP America, in the US, accessed the pilfered materials using a special link on SAP TN's website.

Oracle goes on to allege that SAP's top brass was in on the plan from the beginning. In January 2005, SAP CEO Henning Kagermann and board members Shai Agassi, Werner Brandt and Gerd Oswald received a confidential memo that "made clear that TomorrowNow did not operate legally" and "detailed how TomorrowNow relied on 'non-production' copies" of software from PeopleSoft, which Oracle would later go on to acquire.

Once SAP acquired TomorrowNow, executives conspired to cover up the scheme. Dubbed "Project Blue," the program was outlined in confidential internal presentations that, according to Oracle, were accompanied by instructions to "PLEASE DELETE AFTER READING." ®

Similar topics

Broader topics


Other stories you might like

  • Deepfake attacks can easily trick live facial recognition systems online
    Plus: Next PyTorch release will support Apple GPUs so devs can train neural networks on their own laptops

    In brief Miscreants can easily steal someone else's identity by tricking live facial recognition software using deepfakes, according to a new report.

    Sensity AI, a startup focused on tackling identity fraud, carried out a series of pretend attacks. Engineers scanned the image of someone from an ID card, and mapped their likeness onto another person's face. Sensity then tested whether they could breach live facial recognition systems by tricking them into believing the pretend attacker is a real user.

    So-called "liveness tests" try to authenticate identities in real-time, relying on images or video streams from cameras like face recognition used to unlock mobile phones, for example. Nine out of ten vendors failed Sensity's live deepfake attacks.

    Continue reading
  • Lonestar plans to put datacenters in the Moon's lava tubes
    How? Founder tells The Register 'Robots… lots of robots'

    Imagine a future where racks of computer servers hum quietly in darkness below the surface of the Moon.

    Here is where some of the most important data is stored, to be left untouched for as long as can be. The idea sounds like something from science-fiction, but one startup that recently emerged from stealth is trying to turn it into a reality. Lonestar Data Holdings has a unique mission unlike any other cloud provider: to build datacenters on the Moon backing up the world's data.

    "It's inconceivable to me that we are keeping our most precious assets, our knowledge and our data, on Earth, where we're setting off bombs and burning things," Christopher Stott, founder and CEO of Lonestar, told The Register. "We need to put our assets in place off our planet, where we can keep it safe."

    Continue reading
  • Conti: Russian-backed rulers of Costa Rican hacktocracy?
    Also, Chinese IT admin jailed for deleting database, and the NSA promises no more backdoors

    In brief The notorious Russian-aligned Conti ransomware gang has upped the ante in its attack against Costa Rica, threatening to overthrow the government if it doesn't pay a $20 million ransom. 

    Costa Rican president Rodrigo Chaves said that the country is effectively at war with the gang, who in April infiltrated the government's computer systems, gaining a foothold in 27 agencies at various government levels. The US State Department has offered a $15 million reward leading to the capture of Conti's leaders, who it said have made more than $150 million from 1,000+ victims.

    Conti claimed this week that it has insiders in the Costa Rican government, the AP reported, warning that "We are determined to overthrow the government by means of a cyber attack, we have already shown you all the strength and power, you have introduced an emergency." 

    Continue reading

Biting the hand that feeds IT © 1998–2022