æ»æè ã«ä¾µå ¥ãããçè·¡ãè¦ã¤ãã«è¡ãã 第1å
ã¯ããã«
æ¨ä»ããããã¯ã¼ã¯å¢çé²å¾¡ã¨ã¢ã³ãã¦ã¤ã«ã¹ãªã©ã«ä»£è¡¨ããããå¾æ¥ã®ã»ãã¥ãªãã£å¯¾çã§ã¯æ¤åºãããã¨ãé£ããè
å¨ãã¨ãªããããã®(以ä¸ãæ¬ã³ã©ã ã§ã¯è
å¨ã¨è¨è¼ãã¾ã)ã®ä¾µå
¥ã許ãäºä»¶ãçºçãã¦ãã¾ãã
ã²ã¨ãã³è
å¨ã®ä¾µå
¥ã許ãã¨ãæ»æè
ã¯ç®¡çè
ã«æ°ãä»ãããªãããæéãããã¦ç¶ç¶çã«æ»æãè¡ããããä¸ã«ã¯ã·ã¹ãã ã®ç®¡çè
ã2å¹´é以ä¸è
å¨ã®ä¾µå
¥ã«æ°ãä»ããªããããªå ´åãããã¾ãã
çµæã¨ãã¦ãã·ã¹ãã ã®ç®¡çè
ãæ°ä»ããªããã¡ã«è¢«å®³ãæ¡å¤§ããè
å¨ã®ä¾µå
¥ã«æ°ãä»ãããããã¯ã¤ã³ã·ãã³ãã®çºçãå
¬ã«ãªãé ã«ã¯äºæ¥ç¶ç¶ã«å½±é¿ãåã¼ãéè¦ãªæ
å ±ãçã¾ãã¦ããäºä»¶ããä¿¡é ¼å復ã«å¤å¤§ãªå´åã¨è²»ç¨ãå²ããªããã°ãªããªããããªäºä»¶ãããã¾ãã
ãã®ããã«ãå¾æ¥ã®ã»ãã¥ãªãã£å¯¾çã§æ¤åºãã¦ãã対å¦ãéå§ããã®ã§ã¯ã対å¿ã¨ãã¦ã¯é
ãå ´åãããã¾ãã
æ©æã«è
å¨ã®ä¾µå
¥ã«æ°ãä»ãããã«ã¯ãç¹å®ã®éä¿¡å
ã¸ã®ã¢ã¯ã»ã¹ãç¹å®ã®ãã¡ã¤ã«ã®è¨ç½®ãªã©è
å¨ãåãã¢ã¯ã·ã§ã³ã®æ
å ±ãèµ·ç¹ã«ãèªãè
å¨ä¾µå
¥æç¡ã®çè·¡ãæ¢ãåºãã«è¡ãå¿
è¦ãããã¾ãã
æ¬ã³ã©ã ã§ã¯å½ç¤¾ãæ§ã ãªçµç¹ã¨æè¦äº¤æãè¡ãæããã¨ãªã£ããè å¨ä¾µå ¥æç¡ã®çè·¡ãæ¢ãåºããã¨ã«ãã£ã¬ã³ã¸ããçµç¹ãè¦å´ãããã¤ã³ããã«ã¤ãã¦ç´¹ä»ãã¾ãã
第ä¸åç®ã¨ãªãä»åã¯ãè¦å´ãããã¤ã³ãã®ç´¹ä»ã«å ç«ã¡ãè å¨ä¾µå ¥æç¡ãæ¢ãåºãè¡çºã®å¹æã«ã¤ãã¦ãå®éã®æ å ±ã»ãã¥ãªãã£äºä»¶ã»äºæ (以ä¸ãã¤ã³ã·ãã³ã)ã®äºä¾ãåºã«è§£èª¬ãã¾ãã
è å¨ä¾µå ¥æç¡ãæ¢ãåºãè¡çºã¨ã¯
ä¸è¬çã«è å¨ä¾µå ¥æç¡ãæ¢ãåºãè¡çºã¯ãThreat Huntingãã¾ãã¯ãè å¨ãã³ãã£ã³ã°ãã¨å¼ã°ãã¦ãããSANS Instituteï¼1ã§ã¯ãThreat Huntingãã以ä¸ã®ããã«å®ç¾©ãã¦ãã¾ãã
Threat Hunting
A focused and iterative approach to searching out, identifying and understanding adversaries who have entered the defenderâs networks
çµç¹ã®ãããã¯ã¼ã¯ã«ä¾µå
¥ããè
å¨ãæ¢ãåºããç¹å®ããææ¡ããããã®å復çãªåãçµã¿ã
åºå
¸ï¼SANS 2018 Threat Hunting Survey Results
https://www.domaintools.com/content/sans_threat_hunting_2018_survey_report.pdf
æ¬ã³ã©ã ã§ã¯ããThreat Huntingãããå¾æ¥ã®ã»ãã¥ãªãã£å¯¾çã§ã¯æ¤åºã§ããªãæ½å¨çã§é«åº¦ãªè å¨ã®åå¨ãç¹å®ãã対å¿ãæ¤è¨ããåãçµã¿ãã¨å®ç¾©ãã¾ãã
Threat Huntingå®æ½ã®æµã
ç¶ãã¦ãThreat Huntingå®æ½ã®æµãã«ã¤ãã¦è§£èª¬ãã¾ãã
çµç¹ã«ããè¥å¹²ç°ãªãã¾ãããåºæ¬çã«ã¯ä»¥ä¸ã®æµãã§é²ãã¾ãã
â è å¨æ å ±ã®åéï¼ | ä¸éä¸è¬ã§æµè¡ãã¦ããæ»æææ³ãç¹å®ã®æ¥ç¨®ãçã£ãæ»æã示åããæ å ±ãªã©ãæ§ã ãªã½ã¼ã¹ãã調æ»å¯¾è±¡ã¨ããè å¨åè£ã®æ å ±ãåé |
---|---|
⡠調æ»ããè å¨ã®é¸å®ï¼ | â ã§åéããæ å ±ã®ä¸ãã調æ»å¯¾è±¡ã¨ããè å¨ãé¸å® |
⢠侵害ææ¨ã®æ´çï¼ | è
å¨ãä¾µå
¥ãã¦ãããã¨ãçºè¦ããããã®ãã¤ã³ããæ´ç ä¾ï¼æªæ§ãªéä¿¡å ãæªæ§ãªãã¡ã¤ã«ã®ããã·ã¥å¤ãªã© |
⣠調æ»å¯¾è±¡ã®æºåï¼ | â¢ã®ãã¤ã³ãã調æ»ããããã«å¿
è¦ãªãã¼ã¿ãæºå ä¾ï¼Proxyãã°ããã¡ã¤ã¢ã¦ã©ã¼ã«ãã°ããã¡ã¤ã«ä¸è¦§ãªã© |
⤠調æ»å®æ½ï¼ | â¢ã¨â£ã®æ
å ±ãç¨ãã¦ãè
å¨ã®ä¾µå
¥æç¡ãèª¿æ» è å¨ä¾µå ¥ã®çè·¡ãèªããããå ´åã¯ãã¤ã³ã·ãã³ãã¬ã¹ãã³ã¹ã¸ç§»è¡ |
⥠調æ»çµæãå ±åï¼ | 調æ»çµæãå ±åï¼èª¿æ»çµæãã¾ã¨ãã¦é¢ä¿é¨éã¸å ±å |
Threat Huntingã®å¹æ
æå¾ã«ãå®éã®ã¤ã³ã·ãã³ãäºä¾ãåºã«ãè å¨ä¾µå ¥æç¡ãæ¢ãåºãè¡çºã®å¹æã解説ãã¾ãã
â äºä¾
äºä¾ï¼ | 2019å¹´ã«çºçããä¸è±é»æ©æ ªå¼ä¼ç¤¾(以ä¸ãä¸è±é»æ©)ã¸ã®ä¸æ£ã¢ã¯ã»ã¹ï¼2 |
---|---|
æ¦è¦ï¼ | ä¸è±é»æ©ã®ä¸å½æ ç¹ã«ããã¦ã¦ã¤ã«ã¹å¯¾ç管çãµã¼ãã¼ã®èå¼±æ§ãæªç¨ããè
å¨ãä¾µå
¥ããæ¥æ¬å½å
æ ç¹ã«ã被害ãæ¡å¤§ããã çµæã¨ãã¦ãå¾æ¥å¡ã®å人æ å ±ã®ä»ãé²è¡çãªã©åå¼å çµç¹ã®æ©å¾®ãªæ å ±ãæµåºããå¯è½æ§ãããã¨ãã¦ããã |
æ»æã®æµãï¼
- â ã¦ã¤ã«ã¹å¯¾ç管çãµã¼ãã¼ã®èå¼±æ§ãæªç¨ãã¦ä¾µå ¥ãã
- â¡ã¦ã¤ã«ã¹å¯¾ç管çãµã¼ãã¼ã®æ©è½ãæªç¨ãã¦PCããã«ã¦ã§ã¢ã«ææããã
- â¢ã¦ã¤ã«ã¹å¯¾ç管çãµã¼ãã¼ã®èå¼±æ§ãæªç¨ãã¦ä¾µå ¥ãã
- â£ã¦ã¤ã«ã¹å¯¾ç管çãµã¼ãã¼ã®æ©è½ãæªç¨ãã¦PCããµã¼ãã¼ããã«ã¦ã§ã¢ã«ææããã
- â¤ææããPCããµã¼ãã¼ã«ä¿åããã¦ããæ å ±ããæ å ±éä¿¡ç¨ã®PCã«éç´ãã
- â¥æ å ±éä¿¡ç¨ã®PCããæ»æè ã¸æ å ±ãéä¿¡ãã
è å¨ä¾µå ¥ã¨æ¤åºã®ã¿ã¤ã ã©ã¤ã³ï¼
æ¥ä» | å 容 | æ»æã®æµã |
---|---|---|
2019/3/17以å | ä¸å½æ ç¹ãè¤æ°ã®æ»æè
ã°ã«ã¼ãããæ»æãåãã¦ãã ä¸ç¯ã«ã¯æ»æã¯2013å¹´é ããè¡ããã¦ããã¨ããã |
- |
2019/3/18 | ã¦ã¤ã«ã¹å¯¾ç管çãµã¼ãã¼ã§ä½¿ç¨ããã½ããã¦ã§ã¢ã®èå¼±æ§ãæªç¨ãããä¸å½æ ç¹ã§è å¨ã«ä¾µå ¥ããã | â ï½â¡ |
2019/4/3以é | ã»ã¦ã¤ã«ã¹å¯¾ç管çãµã¼ãã¼ã§ä½¿ç¨ããã½ããã¦ã§ã¢ã®èå¼±æ§ãæªç¨ãããä¸å½æ ç¹çµç±ã§æ¥æ¬å½å
æ ç¹ã«è
å¨ãä¾µå
¥ ã»æ å ±ãæ»æè ã®ãã¨ã«éä¿¡ããã |
â¢ï½â¥ |
2019/4/5 | ã¦ã¤ã«ã¹å¯¾ç管çãµã¼ãã¼ã§ä½¿ç¨ããã½ããã¦ã§ã¢ã®èå¼±æ§æ å ±ãå ¬éããã | - |
2019/6/28 | æ¥æ¬å½å æ ç¹ã«ããã¦ä¸å¯©ãªãã¡ã¤ã«ãæ¤åºããã | - |
2019/7/8 | æ¥æ¬å½å æ ç¹ã«ããã¦è å¨ä¾µå ¥ã®äºå®ãç¢ºèª | - |
è
å¨ä¾µå
¥ã®äºå®ã確èªã§ããã®ã¯ãä¸å½æ ç¹ã«ä¾µå
¥ããã¦ãã4ã«æãæ¥æ¬å½å
æ ç¹ã«ä¾µå
¥ããã¦ãã3ã«æãçµéããå¾ã®7æã§ãããããã¯æ»æè
ãæ
å ±ãçã¿åºãã«ã¯ååãããæéã§ãã
ã§ã¯ä»®ã«Threat Huntingãå®æ½ãã¦ããå ´åãã©ã®æç¹ã§ä¾µå
¥ã«æ°ãä»ããã¨ãã§ããã¾ãæ
å ±æ¼ããã¯é²ããã¨ãã§ããã®ãã«ã¤ãã¦ç¢ºèªãã¾ãã
ããã§ã¯äºã¤ã®Threat Huntingã®èª¿æ»æ¹æ³ãåãä¸ãã¾ãã
ä¸ã¤ç®ã¯æ»æè
ã«çç®ãã¦Threat Huntingãå®æ½ããæ¹æ³ã§ãã
æ¬ã±ã¼ã¹ã§ã¯ã調æ»ã®çµæãæ»æã®æå¦ã¯æããã§ã¯ããã¾ãããã2013å¹´é ããè¤æ°ã®æ»æè
ã°ã«ã¼ãããæ»æãåãã¦ããã¨ããã¦ãã¾ãã
æ»æè
ã°ã«ã¼ãã«ã¯ãä¾ãã°ãã°ã«ã¼ãAã¯ãã«ã¦ã§ã¢ã«DASERFã¨å¼ã°ããRATãç¨ããããã°ã«ã¼ãBã¯ã©ãã©ã«ã ã¼ãã¡ã³ãï¼3ã«Mimikatzã¨å¼ã°ãããã¼ã«ãç¨ãããã®ããã«ãã°ã«ã¼ãæ¯ã®æ»æææ³ã«ç¹å¾´ãè¦åºããã¨ãã§ããå ´åãããã¾ãã
ä»®ã«ã¤ã³ã·ãã³ãçºçå¾ã§ã¯ãªããæ¥å¸¸ã®ãã°åæã®éç¨ã§è¤æ°ã®æ»æè
ã°ã«ã¼ãããæ»æãåãã¦ãããã¨ãçªãæ¢ãããã¦ããå ´åãæ»æè
ã°ã«ã¼ãæ¯ã®æ»æææ³ã®ç¹å¾´ãæããã«ãThreat Huntingãããã¨ã§ãä¸å½æ ç¹ã«ä¾µå
¥ããã2019å¹´3æ18æ¥å½æ¥ã®æç¹ã§æ°ãä»ããã¨ãã§ããå¯è½æ§ãããã¾ãããã®å ´åãæ¥æ¬å½å
æ ç¹ã¸ã®ä¸æ£ä¾µå
¥ãé²ããæ
å ±æ¼ãããé²ããã¨ãã§ããå¯è½æ§ãé«ãã¨èãããã¾ãã
äºã¤ç®ã¯æ»æãã£ã³ãã¼ã³ãªã©æ»æã示åããæ
å ±ã«çç®ãã¦Threat Huntingãå®æ½ããæ¹æ³ã§ãããããããã¼ã¯ã¦ã§ããããã«ã¼ãã©ã¼ã©ã ãªã©ãæ»æè
ãæ
å ±å
±æãè¡ãå ´ã«ããã¦ãæ»æ対象ã¨ããçµç¹ãæ»æã«ç¨ããèå¼±æ§ãªã©ã®æ
å ±ãããåããã¦ããã±ã¼ã¹ãããã¾ãã2019å¹´3æ18æ¥ä»¥éã®ä»åã®äºä¾ã«ããã¦æ»æã示åããæ
å ±ãããåãããã¦ãããã¯å®ãã§ã¯ããã¾ããããä»®ã«ããåããããã¦ããå ´åããã®æ
å ±ããã¡æ©ãå
¥æãããã¨ã§ãæ»æãé²ãããã«åãããã¨ãã§ãã¾ããã
ã¾ããæ»æãæåããå¯è½æ§ãèæ
®ãã¦Threat Huntingãããã¨ã§ã2019å¹´4æ3æ¥ã®æç¹ã§æ¥æ¬å½å
æ ç¹ã¸ã®ä¾µå
¥ã«æ°ãä»ããã¨ãã§ããæ
å ±æ¼ããã¯é²ããã¨ãã§ããå¯è½æ§ãé«ãã¨èãããã¾ãã
çµè«ã¨ãã¦ãæ¬äºä¾ã«ããã¦ã¯Threat Huntingãå®æ½ãã¦ããå ´åãè å¨ã®ä¾µå ¥ã«æ°ãä»ãã¾ã§ã®æéãæ大ã§4ã«æååããã¨ãã§ããæ¥æ¬å½å æ ç¹ã¸ã®ä¾µå ¥ã¨æ å ±æ¼ãããé²ããã¨ãå¯è½ã§ãã£ãã¨èãããã¾ãã
ãã®æ§ã«ä½ã«çç®ãã¦Threat Huntingãå®æ½ãããã«ããå¹æã¯å¤ããã¾ããããããã«ãããæ»æè ã管çè ã«æ°ä»ãããªãããæéãããã¦æ»æãè¡ãå ´åã«ããã¦ãæ©æã«è å¨ã®ä¾µå ¥ã«æ°ãä»ãããã®æ段ã¨ãã¦Threat Huntingã¯æå¹ã§ããã¨èãããã¾ãã
ã¾ã¨ã
ã³ã©ã 第ä¸åç®ã¨ãªãä»åã¯ãThreat Huntingã®å¹æã¤ãã¦ãå®éã®ã¤ã³ã·ãã³ãã®äºä¾ãåºã«è§£èª¬ãã¾ããã
次åã¯ãå½ç¤¾ãæ§ã
ãªçµç¹ã¨æè¦äº¤æãè¡ãæããã¨ãªã£ããè
å¨ä¾µå
¥æç¡ã®çè·¡ãæ¢ãåºããã¨ã«ãã£ã¬ã³ã¸ããçµç¹ãè¦å´ãããã¤ã³ããã«ã¤ãã¦ãç´¹ä»ãã¾ãã
注é
-
ï¼1
SANS Institute
https://www.sans-japan.jp/about
æ¿åºãä¼æ¥ã»å£ä½éã«ãããç 究ãããã³ãããã«æå±ãã人ã ã®ITã»ãã¥çæè²ãç®çã«è¨ç«ãããçµç¹ -
ï¼2
ä¸è±é»æ©ï¼ä¸æ£ã¢ã¯ã»ã¹ã«ããå人æ
å ±ã¨ä¼æ¥æ©å¯ã®æµåºå¯è½æ§ã«ã¤ãã¦ï¼ç¬¬3å ±ï¼
https://www.mitsubishielectric.co.jp/news/2020/0212-b.pdf -
ï¼3
ã©ãã©ã«ã ã¼ãã¡ã³ã
çµç¹ã®ã¤ã³ãã©ãããå ã«ãããæ»æ/ææã®æ¡å¤§ã®åããæãã¾ãã