åæé®®æ¿åºã®æ¯æ´ãåããããã«ã¼ããChromeã®ã¼ããã¤èå¼±(ããããã)æ§ãCVE-2022-0609ããæªç¨ãã¦ãã¢ã¡ãªã«ãæ ç¹ã¨ãããã¥ã¼ã¹ã¡ãã£ã¢ãITãä»®æ³é貨ãéèãµã¼ãã¹ãªã©å¹ åºãæ¥çã§åãæ°ç¾äººã®ã³ã³ãã¥ã¼ã¿ã¼ã«ãã«ã¦ã§ã¢ãææããããã¨ããã¨ãGoogleãæ¨ææ¥ã«çºè¡¨ãã¾ããã Countering threats from North Korea https://blog.google/threat-analysis-group/countering-threats-north-korea/ North Korean hackers unleashed Chrome 0-day exploit on hundreds of US targets | Ars Technica https://arstechnica.com/information-technology
On February 10, Threat Analysis Group discovered two distinct North Korean government-backed attacker groups exploiting a remote code execution vulnerability in Chrome, CVE-2022-0609. These groups' activity has been publicly tracked as Operation Dream Job and Operation AppleJeus. We observed the campaigns targeting U.S. based organizations spanning news media, IT, cryptocurrency and fintech indust
Googleã®è å¨åæã°ã«ã¼ããæ°ãã«Chromeã§2種ãInternet Explorerã§1種ãWebKit(Safari)ã§1種ã®è¨4種ã®ã¼ããã¤èå¼±æ§ã«ã¤ãã¦è©³ç´°ãå ¬éãã¾ããããã®4種ã®ä¸ã§ãWebKitã®èå¼±æ§ã¯ããã·ã¢æ¿åºã®æ¯æ´ãåãã¦ããå¯è½æ§ã®ããããã«ã¼ãç¨ãããã¨ã®ãã¨ã§ãå ±éå社ã«ãã£ã¦ã²ã¨ãã大ããå ±ãããã¦ãã¾ãã How we protect users from 0-day attacks https://blog.google/threat-analysis-group/how-we-protect-users-0-day-attacks/ iOS zero-day let SolarWinds hackers compromise fully updated iPhones | Ars Technica https://arstechnica.com/g
In January, the Threat Analysis Group documented a hacking campaign, which we were able to attribute to a North Korean government-backed entity, targeting security researchers. On March 17th, the same actors behind those attacks set up a new website with associated social media profiles for a fake company called âSecuriElite.â The new website claims the company is an offensive security company loc
åæé®®æ¿åºã®æ¯æ´ãåããã¨ã¿ãããããã«ã¼éå£ããã»ãã¥ãªãã£ç 究è ãæ¨çã«æ»æãè¡ã£ã¦ãããã¨ã2021å¹´1æ25æ¥ã«Googleãå ±åãã¾ããããã®æ»æãã©ã®ããã«è¡ãããã®ãã«ã¤ãã¦Microsoftã調æ»ãè¡ããã¬ãã¼ããçºè¡¨ãã¦ãã¾ãã ZINC attacks against security researchers - Microsoft Security https://www.microsoft.com/security/blog/2021/01/28/zinc-attacks-against-security-researchers/ Microsoft: DPRK hackers 'likely' hit researchers with Chrome exploit https://www.bleepingcomputer.com/news/security/mic
Googleã¯ç±³å½æé1æ25æ¥ãåæé®®æ¿åºã®æ¯æ´ãåããããã«ã¼éå£ããèå¼±æ§èª¿æ»ã«é¢ãããµã¤ãã¼ã»ãã¥ãªãã£å°é家ããæ¨çã«ãã¦ãããã¨ãæããã«ããã æ»æã¯Googleã®è å¨åæã°ã«ã¼ãï¼TAGï¼ã«ãã£ã¦çºè¦ããããåã°ã«ã¼ãã¯æç¶çæ¨çåæ»æï¼APTï¼ã®æ¤åºãå°éã¨ããã»ãã¥ãªãã£ãã¼ã ã ã Googleã¯25æ¥ã«å ¬è¡¨ããTAGã®ã¬ãã¼ãã§ãåæé®®ã®ããã«ã¼ãã¯TwitterãLinkedInãTelegramãDiscordãKeybaseã¨ãã£ãå種ã½ã¼ã·ã£ã«ãããã¯ã¼ã¯ä¸ã§è¤æ°ã®ãããã£ã¼ã«ã使ç¨ããå½ã®äººç©ãè£ ã£ã¦ã»ãã¥ãªãã£ç 究è ãã«æ¥è§¦ããã¨è¿°ã¹ããæ¥è§¦ã«é»åã¡ã¼ã«ã使ãããä¾ããã£ãã¨ãã¦ããã TAGã®ã¬ãã¼ãã«ã¯ãåæé®®ã®ããã«ã¼ãæ å ±ã»ãã¥ãªãã£ã®å°é家ãããã³ãå¯ãã¦ã ã¾ãããã«ä½¿ç¨ããã½ã¼ã·ã£ã«ã¡ãã£ã¢ä¸ã®å½ãããã£ã¼ã«ã®ãªã³ã¯ä¸è¦§ãè¨è¼ããã¦ããã åæ
Over the past several months, the Threat Analysis Group has identified an ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations. The actors behind this campaign, which we attribute to a government-backed entity based in North Korea, have employed a number of means to target researchers which we will outline below.
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}