EMCã¸ã£ãã³ï¼RSAäºæ¥æ¬é¨ï¼ã¯24æ¥ããRSA Security Findings:ãã£ãã·ã³ã°ã®ãã¬ã³ãã¨ãããã¤ã®æ¨é¦¬æ»æã®èå°è£ããå ¬éããã ãRSA Security Findingsãã¯ãã»ãã¥ãªãã£é¢é£ãããã¯ã«ã¤ãã¦ãå社主å¬ã»ããã¼ãæ¥æ¥ããRSA社å¡ã«ããææ°æ å ±ãã¾ã¨ãããã¦å ¬éãã¦ããã¬ãã¼ãã ãä»åã¯ã9æä¸æ¬ã«æ¥æ¥ããã¢ã³ã»ã¸ã§ã³ã½ã³æ°ï¼ãªã³ã©ã¤ã³è å¨å¯¾ç製åé¨éã®ãã¤ã¹ãã¬ã¸ãã³ãï¼ãã¨ã¿ã¤ã»ããªæ°ï¼ããã¤ã®æ¨é¦¬ãå°éã«æ±ãTrojan Research Labsã®ããã¼ã¸ã£ï¼ã«ããå ±åãã¾ã¨ãããã®ã¨ãªã£ã¦ããã ã¾ãã¢ã³ã»ã¸ã§ã³ã½ã³æ°ã¯ããªã³ã©ã¤ã³ç¯ç½ªå¸å ´ã«ããã5ã¤ã®ãã¬ã³ãã¨ãã¦ããã¢ã«ã¦ã³ãã®ä¹ã£åããããã£ãã·ã³ã°æ»æã®æ´ç·´åº¦åä¸ããè©æ¬ºå¸«ãã¡ã®âæ°å¤§é¸ï¼ã¢ãã¤ã«ï¼âããéå£éã®é£æºããä»ç®çã®ããã®æè¡ã®è»¢ç¨ããããã¦ããã ã¾ãæ°åã示ãã
ãAPT36ï¼å¥ç§°ï¼Earth Karkaddanï¼ãã¯ãæ¿æ²»çãªåæ©ã«ããæ¨çåãµã¤ãã¼æ»æãè¡ãç¯ç½ªè ã°ã«ã¼ãã§ããããã¬ã³ããã¤ã¯ãã¯ä»¥åã«ãåã°ã«ã¼ããã¤ã³ãè»é«å®ãå¨å¤å ¬é¤¨ãã¿ã¼ã²ããã«ãã¦ãããã¨ã観測ããæ¬ããã°ã§è§£èª¬ãã¾ããããã®ã°ã«ã¼ãï¼C-Majorä½æ¦ãProjectMãMythic LeopardãTransparent Tribeã¨ãå¼ç§°ãããï¼ã¯ãã½ã¼ã·ã£ã«ã¨ã³ã¸ãã¢ãªã³ã°ã®ææ³ããã£ãã·ã³ã°ã¡ã¼ã«ãä»ããèªå°æå£ãã¨ã³ããªãã¤ã³ãï¼ä¾µå ¥å£ï¼ã¨ãã¦ç¨ãããã¨ã§ç¥ããã¦ãããä¾µå ¥å¾ãææ端æ«å ã«ãCrimson Remote Access Trojanï¼RATï¼ããå±éãã¦æ å ±ãçªåãã¾ãã ãã¬ã³ããã¤ã¯ãã¯2021å¹´å¾åã«ãEarth Karkaddanã°ã«ã¼ãã好ãã§ç¨ããWindows端æ«ç¨ãã«ã¦ã§ã¢ãCrimson RATãã¨è¨è¨ãé ·ä¼¼ãã¦ããAndro
表ç´ï½ï¼.ï¼.ã¾ã§ï¼PDF639kbï¼ è¡¨ç´ ç®æ¬¡ ï¼ï¼å ±åæ¸ã®æ¦è¦ ï¼.ï¼. ã¯ããã« ï¼.ï¼. 調æ»æ¹æ³ã¨å ±åæ¸ã®æ§æ ï¼ï¼ãã£ãã·ã³ã°ã®ç¾ç¶ ï¼.ï¼. ãã£ãã·ã³ã°ã¨ã¯ ï¼.ï¼. æµ·å¤ã®è¢«å®³ç¶æ³ ï¼.ï¼. å½å ã®è¢«å®³ç¶æ³ ï¼.ï¼. è¦å¯ã«ãããæ¤æç¶æ³ç ï¼.ï¼. JPCERT/CC ã«ããã対å¿ç¶æ³ ï¼.ï¼. ä»å¾ã®åå ï¼ï¼ç±³å½ã®åçµç¹ã®æ¦è¦ ï¼.ï¼. Department of Justice (DoJ) ï¼.ï¼. Federal Bureau of Investigation (FBI) ï¼.ï¼. U.S. Department of Homeland Security (DHS) ï¼.ï¼. U.S. Secret Service (USSS) ï¼.ï¼. National Cyber-Forensics and Training Alliance (NCFTA) ï¼.ï¼. B
ï½ ãã£ãã·ã³ã°ã¨ã¯å®å¨ããçµç¹ãé¨ã£ã¦ãã¦ã¼ã¶ãã¼ã ããã¹ã¯ã¼ããã¢ã«ã¦ã³ãIDãATMã®æ証çªå·ãã¯ã¬ã¸ããã«ã¼ãçªå·ã¨ãã£ãå人æ å ±ãè©åããè¡çºã§ã ï½
å½å æ³äººåãã«ã¡ã¼ã«ãµã¼ãã¹ãã¯ããã¨ããã³ãã¥ãã±ã¼ã·ã§ã³ãµã¼ãã¹ãæä¾ãããµã¤ãã¼ã½ãªã¥ã¼ã·ã§ã³ãºã®ã¦ã§ããµã¤ãã§ããã¯ã©ã¦ãã¡ã¼ã«ãµã¼ãã¹ãMicrosoft365ãGoogle Workspaceã¨ãé£æºã容æãªã»ãã¥ãªãã£ãµã¼ãã¹ãªã©è±å¯ãªã©ã¤ã³ãããã§ä¼æ¥ã®å®å¿ãæ¯æ´ãã¾ãã
ãã£ãã·ã³ã°ã¬ãã¼ã 2012 â æ°ããªè å¨ã®ååã¨ããã«åãã対çã¨èª²é¡ â å¹³æ 24 å¹´ 6 æ ãã£ãã·ã³ã°å¯¾çåè°ä¼ ã¬ã¤ãã©ã¤ã³çå®ã¯ã¼ãã³ã°ã°ã«ã¼ã ç®æ¬¡ 1. ãã£ãã·ã³ã°ã®åå .........................................................................................................................................1 1.1. å½å ã®ç¶æ³ ....................................................................................................................................................1 1
ãã£ãã·ã³ã°ã¬ãã¼ã 2013 â ãã£ãã·ã³ã°è¢«å®³ã®ç¤¾ä¼åé¡å â å¹³æ 25 å¹´ 6 æ ãã£ãã·ã³ã°å¯¾çåè°ä¼ ã¬ã¤ãã©ã¤ã³çå®ã¯ã¼ãã³ã°ã°ã«ã¼ã ç®æ¬¡ 1. ãã£ãã·ã³ã°ã®åå .........................................................................................................................................1 1.1. å½å ã®ç¶æ³ ....................................................................................................................................................1 1.2. æµ·å¤
æ¬ã¤ãã³ãã¯çµäºãããã¾ããã è¬æ¼è³æã®PDFãããã°ã©ã å ã«æ²è¼ãã¦ããã¾ããï¼ãæ¿è«¾ããã ããè³æã®ã¿ã¨ãªãã¾ãï¼ ãã£ãã·ã³ã° (Phishing) ã¨ã¯ãéèæ©é¢ããªã³ã©ã¤ã³ã·ã§ãããªã©ãè£ ã£ã"ãªããã¾ãã¡ã¼ã«"ãéããä½æãæ°åãéè¡å£åº§çªå·ãã¯ã¬ã¸ããã«ã¼ãçªå·ãªã©ã®å人æ å ±ãè©åããè¡çºã§ãç±³å½ãä¸å¿ã«å¤§ããªè¢«å®³ãçãã§ããè©æ¬ºã®æ¹æ³ã§ãã è¿å¹´ã¯æ¥æ¬ã®éèæ©é¢ã§ãå®éã®è¢«å®³ãçºçãã¦ãããããã«ãªã³ã©ã¤ã³ã²ã¼ã ãISPãªã©ã«ã被害ãæ¡å¤§ãè¤éåãå·§å¦åãã¦ãã¾ããåãµã¼ãã¹äºæ¥è ã¯ã顧客ä¿è·ã®è¦³ç¹ãããèªç¤¾ã®é¡§å®¢ã«å¯¾ãããã£ãã·ã³ã°è¡çºãè¡ããã¦ããªãããããä¸å±¤ã®æ³¨æãå¿ è¦ã«ãªã£ã¦ãã¦ãã¾ãã ãã£ãã·ã³ã°å¯¾çåè°ä¼ã§ã¯æ¥æ¬å½å ã«ããããã£ãã·ã³ã°è©æ¬ºè¢«å®³ã®æå¶ãç®çã¨ãã¦ãããã£ãã·ã³ã°å¯¾çã»ããã¼ 2012ããéå¬ãããã¾ããæ¬ã»ããã¼ã§ã¯ãã£ãã·ã³ã°è©æ¬ºã«ã¤ãã¦
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}