{"id":117672,"date":"2021-03-17T03:00:50","date_gmt":"2021-03-17T10:00:50","guid":{"rendered":"https:\/\/unit42.paloaltonetworks.com\/?p=117672"},"modified":"2021-03-17T23:51:05","modified_gmt":"2021-03-18T06:51:05","slug":"ransomware-threat-assessments","status":"publish","type":"post","link":"https:\/\/unit42.paloaltonetworks.com\/ja\/ransomware-threat-assessments\/","title":{"rendered":"\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u8105\u5a01\u8a55\u4fa1:\u300e2021 Unit 42\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u30ec\u30dd\u30fc\u30c8\u300f\u306e\u624b\u5f15\u304d"},"content":{"rendered":"<p>\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u653b\u6483\u306e\u30b9\u30b3\u30fc\u30d7\u3092\u8a55\u4fa1\u3057\u3001\u30ea\u30b9\u30af\u3092\u8efd\u6e1b\u3059\u308b\u5b9f\u884c\u53ef\u80fd\u306a\u624b\u9806\u3092\u63d0\u4f9b\u3059\u308b\u305f\u3081\u3001Unit 42\u3068Crypsis\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u30ec\u30b9\u30dd\u30f3\u30b9\u30c1\u30fc\u30e0\u306f\u5354\u529b\u3057\u30662020\u5e74\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u306e\u72b6\u6cc1\u3092\u5206\u6790\u3057\u307e\u3057\u305f\u3002Unit 42\u306e\u3082\u3064\u30b0\u30ed\u30fc\u30d0\u30eb\u30c7\u30fc\u30bf\u3068Crypsis\u306e\u7c73\u56fd\u3001\u30ab\u30ca\u30c0\u3001\u30e8\u30fc\u30ed\u30c3\u30d1\u3067\u306e\u30c7\u30fc\u30bf\u3092\u3075\u304f\u3080<a href=\"https:\/\/start.paloaltonetworks.com\/unit-42-ransomware-threat-report?utm_source=social&amp;utm_medium=blog\">2021 Unit 42\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u30ec\u30dd\u30fc\u30c8<\/a>\u306b\u306f\u3001\u6b21\u306e\u3088\u3046\u306a\u4e3b\u8981\u306a\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u50be\u5411\u3001\u4e9c\u7a2e\u3001\u4e88\u6e2c\u306e\u8a73\u7d30\u306a\u3069\u304c\u89e3\u8aac\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<ul>\n<li>\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u304cCOVID-19\u306e\u30d1\u30f3\u30c7\u30df\u30c3\u30af\u3092\u3069\u306e\u3088\u3046\u306b\u5229\u7528\u3057\u3088\u3046\u3068\u3057\u305f\u304b\u3001\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306e\u30a2\u30d7\u30ed\u30fc\u30c1\u306e\u5909\u5316\u3001\u30bf\u30fc\u30b2\u30c3\u30c8\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306b\u95a2\u3059\u308b\u60c5\u5831\u306a\u3069\u30012020\u5e74\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u72b6\u6cc1\u306e\u89b3\u6e2c\u3002<\/li>\n<li>\u7c73\u56fd\u3001\u30ab\u30ca\u30c0\u3001\u30e8\u30fc\u30ed\u30c3\u30d1\u306e\u7d44\u7e54\u304b\u3089\u306e\u5e73\u5747\u7684\u306a\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u652f\u6255\u3044\u984d\u3002<\/li>\n<li>\u4e9c\u7a2e\u306e\u4f7f\u7528\u304c\u3069\u306e\u3088\u3046\u306b\u5897\u52a0\u3059\u308b\u304b\u3001\u8eab\u4ee3\u91d1\u306e\u8981\u6c42\u984d\u304c\u3069\u306e\u3088\u3046\u306b\u9ad8\u307e\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u304b\u306a\u3069\u306e\u8003\u3048\u3092\u542b\u3080\u3001\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u5c06\u6765\u306e\u4e88\u6e2c\u3002\u3055\u3089\u306b\u306f\u3001\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u304c\u30b5\u30fc\u30d3\u30b9\u3068\u3057\u3066\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30e2\u30c7\u30eb\uff08RaaS\uff09\u3092\u3069\u306e\u3088\u3046\u306b\u6d3b\u7528\u3059\u308b\u304b\u306b\u3064\u3044\u3066\u306e\u8a73\u3057\u3044\u8aac\u660e\u3002<\/li>\n<li>\u30ea\u30b9\u30af\u3092\u6700\u5c0f\u9650\u306b\u6291\u3048\u3001\u7d44\u7e54\u3092\u653b\u6483\u304b\u3089\u4fdd\u8b77\u3059\u308b\u65b9\u6cd5\u306b\u95a2\u3059\u308b\u5b9f\u7528\u7684\u306a\u30ac\u30a4\u30c0\u30f3\u30b9\u3002<\/li>\n<\/ul>\n<p>\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u73fe\u5728\u306e\u72b6\u614b\u3068\u7d44\u7e54\u3092\u5b89\u5168\u306b\u4fdd\u3064\u65b9\u6cd5\u306e\u8a73\u7d30\u306b\u3064\u3044\u3066\u306f\u3001<a href=\"https:\/\/start.paloaltonetworks.com\/unit-42-ransomware-threat-report?utm_source=social&amp;utm_medium=blog\">2021 Unit 42\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u30ec\u30dd\u30fc\u30c8<\/a>\u3092\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3001<a href=\"https:\/\/register.paloaltonetworks.com\/2021unit42ransomwarethreatrep?utm_source=social&amp;utm_medium=blog\">4\u670827\u65e5\u958b\u50ac\u306e\u30a6\u30a7\u30d6\u30ad\u30e3\u30b9\u30c8\u306b\u53c2\u52a0<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n<p>\u4e3b\u8981\u306a\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u306e\u8a73\u7d30\u306b\u3064\u3044\u3066\u306f\u3001\u4ee5\u524d\u306b\u516c\u958b\u3055\u308c\u305f<a href=\"https:\/\/unit42.paloaltonetworks.jp\/threat-brief-maze-ransomware-activities\/\">Maze<\/a>\u3001<a href=\"https:\/\/unit42.paloaltonetworks.jp\/ryuk-ransomware\/\">Ryuk<\/a>\u3001<a href=\"https:\/\/unit42.paloaltonetworks.jp\/wastedlocker\/\">WastedLocker<\/a>\u3001<a href=\"https:\/\/unit42.paloaltonetworks.jp\/egregor-ransomware-courses-of-action\/\">Egregor<\/a>\u306e\u5404\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u8a55\u4fa1\u3092\u53c2\u7167\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n<p>\u4ee5\u4e0b\u306e\u30da\u30fc\u30b8\u304b\u3089\u306f\u3001\u672c\u30ec\u30dd\u30fc\u30c8\u3067\u53d6\u308a\u4e0a\u3052\u3089\u308c\u305f\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u306e\u8a73\u7d30\u306a\u8105\u5a01\u8a55\u4fa1\u3092\u3054\u78ba\u8a8d\u3044\u305f\u3060\u3051\u307e\u3059\u3002<\/p>\n<ul>\n<li><a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/2\">NetWalker<\/a>.<\/li>\n<li><a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/3\">Zeppelin<\/a>.<\/li>\n<li><a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/4\">DoppelPaymer<\/a>.<\/li>\n<li><a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/5\">Phobos<\/a>.<\/li>\n<li><a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/6\">Dharma<\/a>.<\/li>\n<li><a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/7\">GandCrab and REvil<\/a>.<\/li>\n<li><a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/8\">Defray777<\/a>.<\/li>\n<\/ul>\n<p><strong><em>\u7d9a\u304d\u3092\u8aad\u3080: <a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/2\">NetWalker<\/a><\/em><\/strong><\/p>\n<p><strong><em><a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/\">\u30c8\u30c3\u30d7\u306b\u623b\u308b<\/a><\/em><\/strong><\/p>\n<p><!--nextpage--><\/p>\n<h2><a id=\"post-117552-_sq10ue8paaer\"><\/a><em>\u8105\u5a01\u306e\u8a55\u4fa1: NetWalker\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2<\/em><\/h2>\n<h3><a id=\"post-117552-_befun67poyt9\"><\/a>\u6982\u8981<\/h3>\n<p>NetWalker\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u304c\u6700\u521d\u306b\u89b3\u6e2c\u3055\u308c\u305f\u306e\u306f<a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/take-a-netwalk-on-the-wild-side\/\">2019\u5e748\u6708<\/a>\u3067\u3059\u3002\u6697\u53f7\u5316\u3055\u308c\u305f\u30d5\u30a1\u30a4\u30eb\u304c.mailto\u3068\u3044\u3046\u62e1\u5f35\u5b50\u306b\u5909\u66f4\u3055\u308c\u305f\u3053\u3068\u304b\u3089\u3001\u5143\u3005\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u306f\u3053\u308c\u3092Mailto\u3068\u547c\u3093\u3067\u3044\u307e\u3057\u305f\u3002\u8eab\u4ee3\u91d1\u306e\u652f\u6255\u3044\u5f8c\u306b\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u958b\u767a\u8005\u304c\u63d0\u4f9b\u3057\u305f\u5fa9\u53f7\u30c4\u30fc\u30eb\u3092\u5206\u6790\u3057\u305f\u3055\u3044\u3001\u305d\u306e\u958b\u767a\u8005\u304c\u4e0e\u3048\u305f\u672c\u5f53\u306e\u540d\u524d\u306fNetWalker\u3067\u3042\u308b\u3053\u3068\u304c\u308f\u304b\u308a\u307e\u3057\u305f\u3002\u5f53\u6642\u306e\u305d\u308c\u306f\u5546\u7528\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3067\u3001\u88ab\u5bb3\u8005\u304c\u8ab0\u3067\u3042\u308d\u3046\u304c\u304a\u304b\u307e\u3044\u306a\u3057\u306b\u3001\u5927\u91cf\u306e\u30b9\u30d1\u30e0\u30ad\u30e3\u30f3\u30da\u30fc\u30f3\u3092\u4ecb\u3057\u3066\u914d\u5e03\u3055\u308c\u3066\u3044\u307e\u3057\u305f\u3002<\/p>\n<p>\u3053\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3092\u4f5c\u6210\u3057\u305f\u306e\u306f\u30ed\u30b7\u30a2\u306b\u30eb\u30fc\u30c4\u304c\u3042\u308b\u3068\u3055\u308c\u308b<a href=\"https:\/\/heimdalsecurity.com\/blog\/netwalker-ransomware-explained\/\">Circus Spider<\/a>\u3068\u3044\u3046\u30b5\u30a4\u30d0\u30fc\u72af\u7f6a\u30b0\u30eb\u30fc\u30d7\u3067\u3059\u3002<\/p>\n<p>NetWalker\u306f\u305f\u3060\u30c7\u30fc\u30bf\u3092\u6697\u53f7\u5316\u3059\u308b\u3060\u3051\u3067\u306a\u304f\u3001\u7a83\u53d6\u3057\u305f\u30c7\u30fc\u30bf\u306e\u6697\u53f7\u5316\u4e2d\u306b\u6a5f\u5fae\u30c7\u30fc\u30bf\u3092\u516c\u958b\u3059\u308b\u3068\u8105\u8feb\u3082\u3059\u308b\u3053\u3068\u304b\u3089\u3001\u4f01\u696d\u88ab\u5bb3\u8005\u306b\u3068\u3063\u3066\u5927\u304d\u306a\u8105\u5a01\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\n<h3><a id=\"post-117552-_u9mma6qbaqm\"><\/a>NetWalker\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u6982\u8981<\/h3>\n<p><img  class=\"alignnone size-full wp-image-117638 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2021\/03\/Ransomware-series-21-illustration__NetWalker.png\" alt=\"Conceptual image representing NetWalker ransomware as part of the ransomware threat assessments companion to the 2021 Unit 42 Ransomware Threat Report. \" width=\"1587\" height=\"850\" \/><\/p>\n<p>2020\u5e743\u6708\u3001NetWalker\u306f\u30b5\u30fc\u30d3\u30b9\u3068\u3057\u3066\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\uff08RaaS\uff09\u30e2\u30c7\u30eb\u306b\u79fb\u884c\u3057\u3001Circus Spider\u30b0\u30eb\u30fc\u30d7\u306f\u30de\u30eb\u30a6\u30a7\u30a2\u3092\u5e83\u3081\u308b\u305f\u3081\u306e\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u3092\u63a2\u3057\u59cb\u3081\u307e\u3057\u305f\u3002\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u306e\u653b\u6483\u8005\u306f\u30de\u30eb\u30a6\u30a7\u30a2\u4f1d\u64ad\u3092\u8acb\u3051\u8ca0\u3044\u3001\u305d\u306e\u898b\u8fd4\u308a\u306b\u5dfb\u304d\u4e0a\u3052\u305f\u8eab\u4ee3\u91d1\u304b\u3089\u4e00\u5b9a\u306e\u5272\u5408\u3092\u53d7\u3051\u53d6\u308a\u307e\u3059\u3002Circus Spider\u306f\u3001\u4ee5\u4e0b\u306e<a href=\"https:\/\/www.advanced-intel.com\/post\/netwalker-ransomware-group-enters-advanced-targeting-game\">\u8981\u4ef6<\/a>\u306b\u3042\u3046\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u3092\u63a2\u3057\u307e\u3057\u305f\u3002<\/p>\n<ul>\n<li>\u30ed\u30b7\u30a2\u8a9e\u3092\u8a71\u3059\u3053\u3068<\/li>\n<li>\u30ec\u30c3\u30c9\u30c1\u30fc\u30e0\u30b9\u30ad\u30eb\u30fb\u7d4c\u9a13\u304c\u3042\u308b\u3053\u3068<\/li>\n<li>\u81ea\u8eab\u306e\u7d4c\u9a13\u3092\u8a3c\u660e\u3067\u304d\u308b\u3053\u3068<\/li>\n<\/ul>\n<p>Circus Spider\u306f\u3001\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u306e\u30e1\u30f3\u30d0\u30fc\u306b\u3001\u81ea\u5206\u305f\u3061\u306e\u30de\u30eb\u30a6\u30a7\u30a2\u3092\u4f7f\u3063\u3066\u3001\u3088\u308a\u5927\u898f\u6a21\u3067\u91d1\u96e2\u308c\u306e\u3088\u3044\u88ab\u5bb3\u8005\u306b\u7d5e\u3063\u305f\u30a2\u30d7\u30ed\u30fc\u30c1\u3092\u53d6\u3063\u3066\u3082\u3089\u3046\u3053\u3068\u3092\u306e\u305e\u3093\u3067\u3044\u307e\u3057\u305f\u3002\u88ab\u5bb3\u8005\u306b\u306f\u3001\u75c5\u9662\u3001\u6559\u80b2\u6a5f\u95a2\u3001\u5730\u65b9\u81ea\u6cbb\u4f53\u304c\u542b\u307e\u308c\u308b\u3053\u3068\u304c\u5831\u544a\u3055\u308c\u3066\u3044\u307e\u3059\u3002NetWalker\u306f\u304a\u3068\u308a\u306b\u6642\u4e8b\u554f\u984c\u3092\u5229\u7528\u3059\u308b\u3053\u3068\u304c\u3088\u304f\u3042\u308a\u307e\u3059\u30022020\u5e74\u306e\u521d\u3081\u304b\u3089\u3001NetWalker\u3092\u6d3b\u7528\u3059\u308b\u3044\u304f\u3064\u304b\u306e\u30b0\u30eb\u30fc\u30d7\u304c\u3001COVID-19\u3092\u30c6\u30fc\u30de\u306b\u3057\u305f\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30e1\u30fc\u30eb\u3092\u4f7f\u3044\u3001\u591a\u304f\u306e\u75c5\u9662\u306b\u304f\u308f\u3048\u533b\u5b66\u7814\u7a76\u3092\u5c02\u9580\u3068\u3057\u3066\u3044\u308b<a href=\"https:\/\/threatpost.com\/ucsf-pays-1-14m-after-netwalker-ransomware-attack\/157015\/\">\u5927\u5b66<\/a>\u3092\u6a19\u7684\u3068\u3057\u3066\u4fb5\u5bb3\u3057\u307e\u3057\u305f\u3002<\/p>\n<figure id=\"attachment_117581\" aria-describedby=\"caption-attachment-117581\" style=\"width: 840px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-117582 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2021\/03\/word-image-73.png\" alt=\"\u56f31 NetWalker\u306e\u8eab\u4ee3\u91d1\u30e1\u30e2\uff08\u51fa\u5178: Any.Run\uff09\" width=\"840\" height=\"440\" \/><figcaption id=\"caption-attachment-117581\" class=\"wp-caption-text\">\u56f31 NetWalker\u306e\u8eab\u4ee3\u91d1\u30e1\u30e2\uff08\u51fa\u5178: Any.Run\uff09<\/figcaption><\/figure>\n<p>\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u306fRaaS\u306e\u4e00\u90e8\u3068\u3057\u3066\u3044\u304f\u3064\u304b\u306e\u7570\u306a\u308b\u65b9\u6cd5\u306e1\u3064\u3092\u4f7f\u3063\u3066\u88ab\u5bb3\u8005\u3092\u30bf\u30fc\u30b2\u30c3\u30c8\u306b\u3057\u307e\u3059\u3002\u6b21\u306e\u65b9\u6cd5\u304c\u6700\u3082\u4e00\u822c\u7684\u306b\u89b3\u6e2c\u3055\u308c\u308b\u3082\u306e\u3067\u3059\u3002<\/p>\n<ul>\n<li>VBScript\u3084PowerShell\u306a\u3069\u306e\u60aa\u610f\u306e\u3042\u308b\u30d5\u30a1\u30a4\u30eb\u304c\u6dfb\u4ed8\u3055\u308c\u305f\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30e1\u30fc\u30eb<\/li>\n<li>\u516c\u958b\u6e08\u307f\u306a\u3044\u3057\u8106\u5f31\u6027\u306e\u3042\u308b\u30ea\u30e2\u30fc\u30c8\u30c7\u30b9\u30af\u30c8\u30c3\u30d7\u30d7\u30ed\u30c8\u30b3\u30eb\uff08RDP\uff09\u30b5\u30fc\u30d3\u30b9<\/li>\n<li>Windows\u5b9f\u884c\u30d5\u30a1\u30a4\u30eb\uff08EXE\uff09<\/li>\n<\/ul>\n<p>\u88ab\u5bb3\u8005\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306b\u5165\u308a\u3053\u3093\u3060\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u306f\u3001\u500b\u4eba\u3092\u7279\u5b9a\u3067\u304d\u308b\u60c5\u5831\uff08PII\uff09\u3084\u4f01\u696d\u56fa\u6709\u306e\u30c7\u30fc\u30bf\u306a\u3069\u3001\u4fa1\u5024\u306e\u9ad8\u3044\u30c7\u30fc\u30bf\u3092\u6a19\u7684\u306b\u3057\u3066\u53ce\u96c6\u3059\u308b\u3053\u3068\u304c\u3088\u304f\u3042\u308a\u307e\u3059\u3002\u6b21\u306b\u3053\u306e\u30c7\u30fc\u30bf\u306f\u6697\u53f7\u5316\u524d\u306b\u30b3\u30d4\u30fc\u3057\u3066\u6f0f\u51fa\u3055\u308c\u307e\u3059\u3002\u56f31\u306f\u3001NetWalker\u306e\u8eab\u4ee3\u91d1\u30e1\u30e2\u306e\u30b5\u30f3\u30d7\u30eb\u3092\u793a\u3057\u3066\u3044\u307e\u3059\u3002NetWalker\u306e\u80cc\u5f8c\u306b\u3044\u308b\u30a2\u30af\u30bf\u30fc\u306f\u3001\u8cc7\u683c\u60c5\u5831\u3092\u30c0\u30f3\u30d7\u3057\u3066\u4ed6\u306e\u30db\u30b9\u30c8\u306b\u6a2a\u5c55\u958b\u3057\u3001\u8ffd\u52a0\u306e\u88ab\u5bb3\u8005\u3092\u4fb5\u5bb3\u3057\u3088\u3046\u3068\u3059\u308b\u3053\u3068\u304c\u5c11\u306a\u304f\u3042\u308a\u307e\u305b\u3093\u3002<\/p>\n<p>\u7a83\u53d6\u3055\u308c\u305f\u30c7\u30fc\u30bf\u306f\u3001NetWalker\u306e\u30aa\u30da\u30ec\u30fc\u30bf\u304c\u7ba1\u7406\u3059\u308b\u7279\u5b9a\u306e\u30ea\u30fc\u30af\u30b5\u30a4\u30c8\u306b\u6295\u7a3f\u3055\u308c\u307e\u3059\u3002\u3053\u3053\u306f\u591a\u304f\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30aa\u30da\u30ec\u30fc\u30bf\u304c\u4f7f\u7528\u3059\u308b\u30a2\u30d7\u30ed\u30fc\u30c1\u3068\u540c\u69d8\u3067\u3059\u3002\u305d\u306e\u5f8c\u88ab\u5bb3\u8005\u306b\u5bfe\u3057\u3066\u8eab\u4ee3\u91d1\u652f\u6255\u3044\u671f\u9650\u306e\u30ab\u30a6\u30f3\u30c8\u30c0\u30a6\u30f3\u3092\u884c\u3044\u3001\u30ab\u30a6\u30f3\u30c8\u6e1b\u5c11\u306b\u3064\u308c\u3066\u8981\u6c42\u984d\u3092\u4e0a\u6607\u3055\u305b\u307e\u3059\u3002<\/p>\n<figure id=\"attachment_117583\" aria-describedby=\"caption-attachment-117583\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-117584 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2021\/03\/word-image-74.png\" alt=\"\u56f32 NetWalker\u306e\u30ea\u30fc\u30af\u30b5\u30a4\u30c8\uff08\u51fa\u5178: ZDNet\uff09\" width=\"900\" height=\"487\" \/><figcaption id=\"caption-attachment-117583\" class=\"wp-caption-text\">\u56f32 NetWalker\u306e\u30ea\u30fc\u30af\u30b5\u30a4\u30c8\uff08\u51fa\u5178: ZDNet\uff09<\/figcaption><\/figure>\n<p>2020\u5e74\u3001\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u3067\u306f\u3001\u653f\u5e9c\u3001\u533b\u7642\u3001\u88fd\u9020\u3001\u8f38\u9001\u3001\u30ed\u30b8\u30b9\u30c6\u30a3\u30af\u30b9\u3001\u30a8\u30cd\u30eb\u30ae\u30fc\u90e8\u9580\u3067Netwalker\u306b\u3088\u308b\u88ab\u5bb3\u8005\u3092\u89b3\u6e2c\u3057\u307e\u3057\u305f\u3002\u88ab\u5bb3\u8005\u306e\u6240\u5728\u5730\u306f\u3001\u7c73\u56fd\u3001\u30ab\u30ca\u30c0\u3001\u30b5\u30a6\u30b8\u30a2\u30e9\u30d3\u30a2\u3001\u30d5\u30e9\u30f3\u30b9\u3001\u30c9\u30a4\u30c4\u3001\u30aa\u30fc\u30b9\u30c8\u30e9\u30ea\u30a2\u3001\u30cb\u30e5\u30fc\u30b8\u30fc\u30e9\u30f3\u30c9\u3001\u30b9\u30a6\u30a7\u30fc\u30c7\u30f3\u3001\u30d1\u30ad\u30b9\u30bf\u30f3\u3001\u30a4\u30f3\u30c9\u3001\u30bf\u30a4\u3001\u82f1\u56fd\u3001\u30a2\u30e9\u30d6\u9996\u9577\u56fd\u9023\u90a6\u3001\u30b3\u30ed\u30f3\u30d3\u30a2\u3001\u5357\u30a2\u30d5\u30ea\u30ab\u306a\u3069\u3001\u307b\u307c\u3059\u3079\u3066\u306e\u5927\u9678\u306b\u307e\u305f\u304c\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>2021\u5e74\u521d\u982d\u3001\u5f53\u5c40\u306fNetWalker\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u30c6\u30a4\u30af\u30c0\u30a6\u30f3\u3092<a href=\"https:\/\/www.justice.gov\/opa\/pr\/department-justice-launches-global-action-against-netwalker-ransomware\">\u8a66\u307f\u307e\u3057\u305f<\/a>\u3002\u3053\u306e\u30c6\u30a4\u30af\u30c0\u30a6\u30f3\u3067\u306f\u3001\u902e\u6355\u3001\u8cc7\u91d1\u62bc\u53ce\u3001\u5b8c\u5168\u306a\u516c\u958b\u3092\u5f85\u3064\u88ab\u5bb3\u8005\u30c7\u30fc\u30bf\u304c\u30a2\u30c3\u30d7\u30ed\u30fc\u30c9\u3055\u308c\u305fNetWalker\u30ea\u30fc\u30af\u7528\uff08\u56f32\u53c2\u7167\uff09Web\u30b5\u30a4\u30c8\u306e\u5dee\u3057\u62bc\u3055\u3048\u304c\u884c\u308f\u308c\u307e\u3057\u305f\u3002\u3053\u308c\u3089\u306e\u6cd5\u57f7\u884c\u63aa\u7f6e\u304cCircus Spider\u958b\u767a\u8005\u306e\u963b\u6b62\u306b\u3069\u308c\u307b\u3069\u52b9\u679c\u304c\u3042\u308b\u304b\u306f\u307e\u3060\u5206\u304b\u308a\u307e\u305b\u3093\u304c\u3001\u3053\u308c\u306f\u540c\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u95a2\u4fc2\u8005\u306e\u884c\u304f\u624b\u3092\u963b\u307f\u3001\u3042\u308b\u3044\u306f\u8d77\u8a34\u3078\u3068\u5411\u304b\u308f\u305b\u308b\u305f\u3081\u306e\u671b\u307e\u3057\u3044\u7b2c\u4e00\u6b69\u3067\u306f\u3042\u308a\u307e\u3059\u3002<\/p>\n<p>NetWalker\u306e\u88ab\u5bb3\u8005\u5b66\u306e\u8a73\u7d30\u306b\u3064\u3044\u3066\u306f\u3001<a href=\"https:\/\/start.paloaltonetworks.com\/unit-42-ransomware-threat-report\">2021 Unit 42\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u30ec\u30dd\u30fc\u30c8<\/a>\u3092\u53c2\u7167\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n<h3><a id=\"post-117552-_xuuyvhe4jxle\"><\/a>\u884c\u52d5\u65b9\u91dd<\/h3>\n<p>\u3053\u306e\u30bb\u30af\u30b7\u30e7\u30f3\u3067\u306f\u3001NetWalker\u306e\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u306b\u95a2\u9023\u3059\u308b\u6226\u8853\u3068\u624b\u6cd5\u3092\u6587\u66f8\u5316\u3057\u3001\u305d\u308c\u3089\u3092\u5f0a\u793e\u88fd\u54c1\u30fb\u30b5\u30fc\u30d3\u30b9\u306b\u76f4\u63a5\u30de\u30c3\u30d4\u30f3\u30b0\u3057\u307e\u3059\u3002\u307e\u305f\u3001\u304a\u5ba2\u69d8\u306b\u3066\u30c7\u30d0\u30a4\u30b9\u306e\u69cb\u6210\u304c\u6b63\u3057\u304f\u884c\u308f\u308c\u3066\u3044\u308b\u304b\u3069\u3046\u304b\u3092\u78ba\u8a8d\u3059\u308b\u65b9\u6cd5\u306b\u3064\u3044\u3066\u3082\u3054\u8aac\u660e\u3057\u307e\u3059\u3002<\/p>\n<table style=\"width: 100%; height: 1378px;\">\n<tbody>\n<tr style=\"height: 21px;\">\n<td style=\"width: 12.9894%; height: 21px;\"><strong>\u88fd\u54c1\/\u30b5\u30fc\u30d3\u30b9<\/strong><\/td>\n<td style=\"width: 86.6377%; height: 21px;\"><strong>\u884c\u52d5\u65b9\u91dd<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"text-align: center; width: 99.6271%; height: 21px;\" colspan=\"2\"><strong>\u521d\u671f\u30a2\u30af\u30bb\u30b9\u3001\u5b9f\u884c\u3001\u30b3\u30de\u30f3\u30c9&amp;\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\u3001\u6a2a\u5c55\u958b\u3001\u9632\u5fa1\u56de\u907f\u3001\u6c38\u7d9a\u6027\u3001\u7279\u6a29\u6607\u683c\u3001\u8cc7\u683c\u60c5\u5831\u30a2\u30af\u30bb\u30b9\u3001\u53ce\u96c6\u3001\u63a2\u7d22<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 114px;\">\n<td style=\"text-align: center; width: 99.6271%; height: 114px;\" colspan=\"2\">\u4ee5\u4e0b\u306e\u4e00\u9023\u306e\u30a2\u30af\u30b7\u30e7\u30f3\u306f\u3001\u6b21\u306e\u30c6\u30af\u30cb\u30c3\u30af\u3092\u7de9\u548c\u3057\u307e\u3059\u3002<strong><br \/>\nExploit Public-Facing Application [T1190]\uff08\u516c\u958b\u6e08\u307f\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\uff09\u3001<br \/>\nWindows Management Instrumentation [T1047]\uff08Windows Management Instrumentation: WMI\uff09\u3001<br \/>\nIngress Tool Transfer [T1105]\uff08\u5185\u90e8\u3078\u306e\u30c4\u30fc\u30eb\u8ee2\u9001\uff09\u3001<br \/>\nSpearphishing Attachment [T1566.001]\uff08\u6dfb\u4ed8\u30d5\u30a1\u30a4\u30eb\u578b\u30b9\u30d4\u30a2\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\uff09\u3001<br \/>\nValid Accounts [T1078]\uff08\u6709\u52b9\u306a\u30a2\u30ab\u30a6\u30f3\u30c8\uff09\u3001<br \/>\nLateral Tool Transfer [T1570]\uff08\u6a2a\u65b9\u5411\u306e\u30c4\u30fc\u30eb \u8ee2\u9001\uff09\u3001<br \/>\nPowerShell [T1059.001]\uff08PowerShell\uff09\u3001<br \/>\nVisual Basic [T1059.005]\uff08Visual Basic\uff09\u3001<br \/>\nObfuscated Files or Information [T1027]\uff08\u96e3\u8aad\u5316\u3055\u308c\u305f\u30d5\u30a1\u30a4\u30eb\u307e\u305f\u306f\u60c5\u5831\uff09\u3001<br \/>\nDeobfuscate\/Decode Files or Information [T1140]\uff08\u30d5\u30a1\u30a4\u30eb\u307e\u305f\u306f\u60c5\u5831\u306e\u96e3\u8aad\u5316\u89e3\u9664\/\u5fa9\u53f7\uff09\u3001<br \/>\nService Execution [T1569.002]\uff08\u30b5\u30fc\u30d3\u30b9\u5b9f\u884c\uff09\u3001<br \/>\nWindows Command Shell [T1059.003]\uff08Windows\u30b3\u30de\u30f3\u30c9\u30b7\u30a7\u30eb\uff09\u3001<br \/>\nRegistry Run Keys \/ Startup Folder [T1547.001]\uff08\u30ec\u30b8\u30b9\u30c8\u30eaRun Keys\/\u30b9\u30bf\u30fc\u30c8\u30a2\u30c3\u30d7\u30d5\u30a9\u30eb\u30c0\u30fc\uff09\u3001<br \/>\nDynamic-link Library Injection [T1055.001]\uff08\u30c0\u30a4\u30ca\u30df\u30c3\u30af\u30ea\u30f3\u30af\u30e9\u30a4\u30d6\u30e9\u30ea\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\uff09\u3001<br \/>\nOS Credential Dumping [T1003]\uff08OS\u8cc7\u683c\u60c5\u5831\u306e\u30c0\u30f3\u30d7\uff09\u3001<br \/>\nData from Local System [T1005]\uff08\u30ed\u30fc\u30ab\u30eb\u30b7\u30b9\u30c6\u30e0\u304b\u3089\u306e\u30c7\u30fc\u30bf\uff09\u3001<br \/>\nModify Registry [T1112]\uff08\u30ec\u30b8\u30b9\u30c8\u30ea\u306e\u5909\u66f4\uff09\u3001<br \/>\nFile and Directory Discovery [T1083]\uff08\u30d5\u30a1\u30a4\u30eb\u3068\u30c7\u30a3\u30ec\u30af\u30c8\u30ea\u306e\u63a2\u7d22\uff09<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 12.9894%; height: 273px;\" rowspan=\"13\">NGFW<\/td>\n<td style=\"width: 86.6377%; height: 21px;\">untrust\u30be\u30fc\u30f3\u304b\u3089\u3088\u308a\u4fe1\u983c\u3067\u304d\u308btrust\u30be\u30fc\u30f3\u3078\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u5834\u5408\u306f\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u304c\u5b58\u5728\u3059\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3067\u30b5\u30fc\u30d3\u30b9\u306b\u300cany\u300d\u304c\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3082\u306e\u304c\u306a\u3044\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">\u4fe1\u983c\u3055\u308c\u305f\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u30bd\u30fc\u30b9\u306eIP\u30a2\u30c9\u30ec\u30b9\u3068\u306e\u9593\u306e\u3059\u3079\u3066\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u62d2\u5426\u3059\u308b\u300c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u300d\u304c\u5b58\u5728\u3059\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">\u30d5\u30a1\u30a4\u30eb\u30d6\u30ed\u30c3\u30af\u3092\u8a2d\u5b9a\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">User-ID\u304c\u5185\u90e8\u306e\u4fe1\u983c\u3067\u304d\u308b\u30a4\u30f3\u30bf\u30fc\u30d5\u30a7\u30fc\u30b9\u306b\u5bfe\u3057\u3066\u306e\u307f\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">User-ID\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u5834\u5408\u306f\u300c\u8a31\u53ef\/\u9664\u5916\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u300d\u304c\u4f7f\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">User-ID\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u5834\u5408\u306fUser-ID\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306b\u6700\u5c0f\u9650\u306e\u6a29\u9650\u3092\u8a2d\u5b9a\u3057\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">User-ID\u30b5\u30fc\u30d3\u30b9\u30a2\u30ab\u30a6\u30f3\u30c8\u306b\u5bfe\u8a71\u578b\u30ed\u30b0\u30aa\u30f3\u6a29\u9650\u304c\u306a\u3044\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">User-ID\u30b5\u30fc\u30d3\u30b9\u30a2\u30ab\u30a6\u30f3\u30c8\u306e\u30ea\u30e2\u30fc\u30c8\u30a2\u30af\u30bb\u30b9\u6a5f\u80fd\u304c\u7981\u6b62\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">User-ID\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u304cuntrust\u30be\u30fc\u30f3\u306b\u5165\u308b\u306e\u3092\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3067\u5236\u9650\u3057\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u5b9b\u3066\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u306e [SSL\u30d5\u30a9\u30ef\u30fc\u30c9 \u30d7\u30ed\u30ad\u30b7] \u30dd\u30ea\u30b7\u30fc\u304c\u69cb\u6210\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">SSL\u307e\u305f\u306fTLS\u3092\u4f7f\u7528\u3059\u308b\u30b5\u30fc\u30d0\u30fc\u5b9b\u3066\u306e\u3059\u3079\u3066\u306e\u4fe1\u983c\u3067\u304d\u306a\u3044\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u306b\u5bfe\u3057\u3066 [SSL\u30a4\u30f3\u30d0\u30a6\u30f3\u30c9 \u30a4\u30f3\u30b9\u30da\u30af\u30b7\u30e7\u30f3] \u304c\u8981\u6c42\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">\u5fa9\u53f7\u7528\u306e\u8a3c\u660e\u66f8\u304c\u4fe1\u983c\u3067\u304d\u308b\u3082\u306e\u3067\u3042\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 12.9894%; height: 189px;\" rowspan=\"9\">\u8105\u5a01\u9632\u5fa1<em>\u2020<\/em><\/td>\n<td style=\"width: 86.6377%; height: 21px;\">\u8106\u5f31\u6027\u9632\u5fa1\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u91cd\u5927\u5ea6\u300cCritical\uff08\u91cd\u5927\uff09\u300d\u304a\u3088\u3073\u300cHigh\uff08\u9ad8\uff09\u300d\u306e\u8106\u5f31\u6027\u306b\u5bfe\u3059\u308b\u653b\u6483\u304c\u300cBlock\uff08\u30d6\u30ed\u30c3\u30af\uff09\u300d\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3001\u91cd\u5927\u5ea6\u300cMedium\uff08\u4e2d\uff09\u300d\u3001\u300cLow\uff08\u4f4e\uff09\u300d\u3001\u300cInformational\uff08\u60c5\u5831\uff09\u300d\u306e\u8106\u5f31\u6027\u304c\u300cDefault\uff08\u30c7\u30d5\u30a9\u30eb\u30c8\uff09\u300d\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30eb\u30fc\u30eb\u306b\u30bb\u30ad\u30e5\u30a2\u306a\u8106\u5f31\u6027\u9632\u5fa1\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u9069\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">imap\u3001pop3\u3092\u9664\u304f\u3059\u3079\u3066\u306e\u30c7\u30b3\u30fc\u30c0\u3067\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u30d6\u30ed\u30c3\u30af\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">\u30bb\u30ad\u30e5\u30a2\u306a\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u95a2\u9023\u3059\u308b\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u306b\u9069\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">\u30a2\u30f3\u30c1\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u3001\u3059\u3079\u3066\u306e\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u306e\u91cd\u5927\u5ea6\u30ec\u30d9\u30eb\u3001\u30ab\u30c6\u30b4\u30ea\u3001\u304a\u3088\u3073\u8105\u5a01\u3092\u30d6\u30ed\u30c3\u30af\u3059\u308b\u3088\u3046\u306b\u69cb\u6210\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">\u4f7f\u7528\u4e2d\u306e\u3059\u3079\u3066\u306e\u30a2\u30f3\u30c1\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3067DNS\u30b7\u30f3\u30af\u30db\u30fc\u30eb\u304c\u69cb\u6210\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">\u4f7f\u7528\u4e2d\u306e\u3059\u3079\u3066\u306e\u30a2\u30f3\u30c1\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3067\u30d1\u30c3\u30b7\u30d6DNS\u306e\u76e3\u8996\u304c\u6709\u52b9\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u3078\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u306b\u3001\u5b89\u5168\u306a\u30a2\u30f3\u30c1\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u9069\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">\u3059\u3079\u3066\u306e\u30be\u30fc\u30f3\u306b\u3001\u5075\u5bdf\u884c\u70ba\u9632\u5fa1\u8a2d\u5b9a\u3092\u3059\u3079\u3066\u6709\u52b9\u5316\u3057\u3001\u8abf\u6574\u3057\u3001\u9069\u5207\u306a\u51e6\u7406\u3092\u8a2d\u5b9a\u3057\u305f\u30be\u30fc\u30f3\u30d7\u30ed\u30c6\u30af\u30b7\u30e7\u30f3\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u3042\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 12.9894%; height: 105px;\" rowspan=\"5\">URL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0<em>\u2020<\/em><\/td>\n<td style=\"width: 86.6377%; height: 21px;\">PAN-DB URL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0\u304c\u4f7f\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">URL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0\u304c&lt;enterprise approved value&gt;\u306eURL\u30ab\u30c6\u30b4\u30ea\u306b\u300c\u30d6\u30ed\u30c3\u30af\u300d\u307e\u305f\u306f\u300c\u30aa\u30fc\u30d0\u30fc\u30e9\u30a4\u30c9\u300d\u306e\u30a2\u30af\u30b7\u30e7\u30f3\u3092\u4f7f\u7528\u3057\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">\u3059\u3079\u3066\u306eURL\u3078\u306e\u30a2\u30af\u30bb\u30b9\u304c\u30ed\u30b0\u306b\u8a18\u9332\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">\u3059\u3079\u3066\u306eHTTP\u30d8\u30c3\u30c0\u30fc\u30ed\u30b0\u30aa\u30d7\u30b7\u30e7\u30f3\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u3078\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30dd\u30ea\u30b7\u30fc\u306b\u5bfe\u3057\u3066\u30bb\u30ad\u30e5\u30a2\u306aURL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0\u3092\u6709\u52b9\u306b\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 12.9894%; height: 147px;\" rowspan=\"7\">WildFire<em>\u2020<\/em><\/td>\n<td style=\"width: 86.6377%; height: 21px;\">WildFire\u30d5\u30a1\u30a4\u30eb\u30b5\u30a4\u30ba\u306e\u30a2\u30c3\u30d7\u30ed\u30fc\u30c9\u5236\u9650\u304c\u6700\u5927\u5316\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">WildFire\u30d5\u30a1\u30a4\u30eb\u30d6\u30ed\u30c3\u30af\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u306e\u3059\u3079\u3066\u306e\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3001\u30d5\u30a1\u30a4\u30eb\u30bf\u30a4\u30d7\u306b\u3064\u3044\u3066\u3001\u8ee2\u9001\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3067WildFire\u5206\u6790\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">\u5fa9\u53f7\u3057\u305f\u30b3\u30f3\u30c6\u30f3\u30c4\u306eWildFire\u3078\u306e\u8ee2\u9001\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">\u3059\u3079\u3066\u306eWildFire\u30bb\u30c3\u30b7\u30e7\u30f3\u60c5\u5831\u8a2d\u5b9a\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">WildFire\u306b\u3088\u3063\u3066\u691c\u51fa\u3055\u308c\u305f\u60aa\u610f\u306e\u3042\u308b\u30d5\u30a1\u30a4\u30eb\u306b\u5bfe\u3059\u308b\u30a2\u30e9\u30fc\u30c8\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">\u300cWildFire\u306e\u66f4\u65b0\u30b9\u30b1\u30b8\u30e5\u30fc\u30eb\u300d\u304c\u6bce\u5206\u3054\u3068\u306b\u66f4\u65b0\u3092\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3066\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b\u3088\u3046\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 12.9894%; height: 189px;\" rowspan=\"9\">Cortex XSOAR<\/td>\n<td style=\"width: 86.6377%; height: 21px;\">XSOAR \u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 Cortex XDR \u2013 Isolate Endpoint<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Block IP<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Block URL<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Hunting and Threat Detection Playbook<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 PAN-OS Query Logs for Indicators<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">XSOAR \u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u30c7\u30d7\u30ed\u30a4 \u2013 Phishing Investigation - Generic V2<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">XSOAR \u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u30c7\u30d7\u30ed\u30a4 \u2013 Endpoint Malware Investigation<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Access Investigation Playbook<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Impossible Traveler<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 12.9894%; height: 105px;\" rowspan=\"5\">Cortex XDR<\/td>\n<td style=\"width: 86.6377%; height: 21px;\">\u30a2\u30f3\u30c1\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u30d7\u30ed\u30c6\u30af\u30b7\u30e7\u30f3\u3092\u6709\u52b9\u306b\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">\u30a2\u30f3\u30c1\u30de\u30eb\u30a6\u30a7\u30a2\u30d7\u30ed\u30c6\u30af\u30b7\u30e7\u30f3\u3092\u6709\u52b9\u306b\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">\u30de\u30eb\u30a6\u30a7\u30a2\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3067Behavioral Threat Protection\uff08BTP\uff09\u3092\u8a2d\u5b9a\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">Restriction\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3092\u69cb\u6210\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">\u30de\u30eb\u30a6\u30a7\u30a2 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3092\u69cb\u6210\u3059\u308b<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 99.6271%; height: 21px; text-align: center;\" colspan=\"2\"><strong>\u8cc7\u683c\u60c5\u5831\u3078\u306e\u30a2\u30af\u30bb\u30b9<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 44px;\">\n<td style=\"width: 99.6271%; height: 44px; text-align: center;\" colspan=\"2\">\u4ee5\u4e0b\u306e\u4e00\u9023\u306e\u30a2\u30af\u30b7\u30e7\u30f3\u306f\u3001\u6b21\u306e\u30c6\u30af\u30cb\u30c3\u30af\u3092\u7de9\u548c\u3057\u307e\u3059\u3002<strong><br \/>\nBrute Force [T1110]\uff08\u30d6\u30eb\u30fc\u30c8\u30d5\u30a9\u30fc\u30b9\uff09<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 12.9894%; height: 21px;\">NGFW<\/td>\n<td style=\"width: 86.6377%; height: 21px;\">\u30d6\u30eb\u30fc\u30c8\u30d5\u30a9\u30fc\u30b9\u30b7\u30b0\u30cd\u30c1\u30e3\u306e\u30a2\u30af\u30b7\u30e7\u30f3\u3068\u30c8\u30ea\u30ac\u30fc\u6761\u4ef6\u3092\u30ab\u30b9\u30bf\u30de\u30a4\u30ba\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 12.9894%; height: 21px;\">Cortex XSOAR<\/td>\n<td style=\"width: 86.6377%; height: 21px;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Brute Force Investigation Playbook<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 99.6271%; height: 21px; text-align: center;\" colspan=\"2\"><strong>\u5f71\u97ff<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 44px;\">\n<td style=\"width: 99.6271%; height: 44px; text-align: center;\" colspan=\"2\">\u4ee5\u4e0b\u306e\u4e00\u9023\u306e\u30a2\u30af\u30b7\u30e7\u30f3\u306f\u3001\u6b21\u306e\u30c6\u30af\u30cb\u30c3\u30af\u3092\u7de9\u548c\u3057\u307e\u3059\u3002<strong><br \/>\nData Encrypted for Impact [T1486]\uff08\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u305f\u3081\u306e\u30c7\u30fc\u30bf\u6697\u53f7\u5316\uff09\u3001<br \/>\nInhibit System Recovery [T1490]\uff08\u30b7\u30b9\u30c6\u30e0\u306e\u5fa9\u5143\u7981\u6b62\uff09<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 12.9894%; height: 42px;\" rowspan=\"2\">Cortex XSOAR<\/td>\n<td style=\"width: 86.6377%; height: 21px;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Ransomware Manual for incident response<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 86.6377%; height: 21px;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Palo Alto Networks Endpoint Malware Investigation<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: center;\"><span style=\"font-size: 12pt;\"><sup><span style=\"color: #999999;\"><em>\u88681 Netwalker\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u884c\u52d5\u65b9\u91dd<br \/>\n<\/em><\/span><\/sup><\/span><span style=\"font-size: 12pt;\"><sup><span style=\"color: #999999;\"><em>\u2020\u3053\u308c\u3089\u306e\u6a5f\u80fd\u306f\u3001NGFW\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30d6\u30b9\u30af\u30ea\u30d7\u30b7\u30e7\u30f3\u30b5\u30fc\u30d3\u30b9\u306e\u4e00\u90e8\u3067\u3059<\/em><\/span><\/sup><\/span><\/p>\n<h3><a id=\"post-117552-_izbcty4abm8w\"><\/a>\u7d50\u8ad6<\/h3>\n<p>\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u30d7\u30ed\u30b0\u30e9\u30e0\u3092\u5229\u7528\u3059\u308b\u653b\u6483\u8005\u3068\u3044\u3046\u6982\u5ff5\u306f\u65b0\u3057\u3044\u3082\u306e\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u304c\u3001NetWalker\u306e\u80cc\u5f8c\u306b\u3044\u308b\u30a2\u30af\u30bf\u30fc\u306f\u3001\u65b0\u3057\u3044\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u3092\u53d7\u3051\u5165\u308c\u308b\u524d\u306b\u4e00\u5b9a\u30ec\u30d9\u30eb\u306e\u8abf\u67fb\u3092\u5b9f\u884c\u3057\u3066\u304a\u308a\u3001\u4ed6\u306e\u30b0\u30eb\u30fc\u30d7\u3084\u30a2\u30af\u30bf\u30fc\u3067\u89b3\u6e2c\u3055\u308c\u308b\u3088\u308a\u3082\u9ad8\u3044\u30ec\u30d9\u30eb\u306e\u52aa\u529b\u3092\u793a\u3057\u3066\u3044\u307e\u3059\u3002\u305d\u306e\u7279\u5b9a\u8981\u4ef6\u304c\u300c\u88ab\u5bb3\u8005\u3092\u653b\u6483\u3057\u3001\u9996\u5c3e\u3088\u304f\u4fb5\u5bb3\u3067\u304d\u308b\u30ec\u30c3\u30c9\u30c1\u30fc\u30e0\u30b9\u30ad\u30eb\u3092\u8a3c\u660e\u3067\u304d\u308b\u30ed\u30b7\u30a2\u8a9e\u3092\u8a71\u8005\u306e\u5019\u88dc\u8005\u300d\u3067\u3042\u308b\u3053\u3068\u304b\u3089\u3053\u308c\u3089\u306e\u30a2\u30af\u30bf\u30fc\u304c\u6bd4\u8f03\u7684\u6d17\u7df4\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u304c\u3046\u304b\u304c\u308f\u308c\u307e\u3059\u3002\u719f\u7df4\u3057\u305f\u500b\u4eba\u3092\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u3068\u3057\u3066\u63a1\u7528\u3059\u308b\u3053\u3068\u306b\u3067\u3001\u30a2\u30af\u30bf\u30fc\u306f\u88ab\u5bb3\u8005\u7d44\u7e54\u306b\u5bfe\u3059\u308b\u7684\u3092\u7d5e\u3063\u305f\u30ad\u30e3\u30f3\u30da\u30fc\u30f3\u3092\u884c\u3044\u3001\u5927\u898f\u6a21\u306a\u8eab\u4ee3\u91d1\u652f\u6255\u3044\u3092\u6c42\u3081\u3066\u3044\u308b\u3088\u3046\u306b\u898b\u3048\u307e\u3059\u3002<\/p>\n<p>NetWalker\u306e\u80cc\u5f8c\u306b\u3044\u308b\u30a2\u30af\u30bf\u30fc\u3060\u3051\u304c\u3001\u8eab\u4ee3\u91d1\u306e\u652f\u6255\u3044\u306e\u53ef\u80fd\u6027\u304c\u9ad8\u3044\u5927\u898f\u6a21\u306a\u7d44\u7e54\u3092\u30bf\u30fc\u30b2\u30c3\u30c8\u306b\u3059\u308b\u3053\u3068\u3092\u76ee\u7684\u3068\u3057\u3066\u3001\u3088\u308a\u30b9\u30ad\u30eb\u306e\u9ad8\u3044\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u3092\u898b\u3064\u3051\u3088\u3046\u3068\u3057\u3066\u3044\u308b\u30b0\u30eb\u30fc\u30d7\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u3053\u308c\u306b\u7167\u3089\u3057\u3066\u3001\u4f01\u696d\u306f\u81ea\u793e\u306e\u74b0\u5883\u3067\u5805\u7262\u306a\u9632\u5fa1\u30c6\u30af\u30ce\u30ed\u30b8\u3068\u6709\u80fd\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5c02\u9580\u77e5\u8b58\u306e\u4e21\u65b9\u3092\u3082\u3064\u3053\u3068\u304c\u91cd\u8981\u3067\u3059\u3002<\/p>\n<p>\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306fNetWalker\u3092\u6b21\u306e\u65b9\u6cd5\u3067\u691c\u51fa\/\u9632\u6b62\u3057\u307e\u3059\u3002<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/products\/secure-the-network\/wildfire\">WildFire<\/a>: \u65e2\u77e5\u306e\u30b5\u30f3\u30d7\u30eb\u306f\u3059\u3079\u3066\u30de\u30eb\u30a6\u30a7\u30a2\u3068\u3057\u3066\u8b58\u5225\u3055\u308c\u307e\u3059\u3002<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/cortex\/cortex-xdr\">Cortex XDR<\/a>:\n<ul>\n<li>NetWalker\u306e\u30a4\u30f3\u30b8\u30b1\u30fc\u30bf\u3092\u542b\u307f\u307e\u3059\u3002<\/li>\n<li>\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u5bfe\u7b56\u30e2\u30b8\u30e5\u30fc\u30eb\u3067NetWalker\u306e\u6697\u53f7\u5316\u306e\u632f\u308b\u821e\u3044\u3092\u691c\u51fa\u3057\u307e\u3059\u3002<\/li>\n<li>\u30ed\u30fc\u30ab\u30eb\u5206\u6790\u30fb\u691c\u51fa\u6a5f\u80fd\u306b\u3088\u308aNetWalker\u30d0\u30a4\u30ca\u30ea\u3092\u691c\u51fa\u3057\u307e\u3059\u3002<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/network-security\/next-generation-firewall\">\u6b21\u4e16\u4ee3\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb<\/a>: DNS\u30b7\u30b0\u30cd\u30c1\u30e3\u304c\u65e2\u77e5\u306eNetWalker\u30b3\u30de\u30f3\u30c9&amp;\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\uff08C2\uff09\u30c9\u30e1\u30a4\u30f3\u3092\u691c\u51fa\u3057\u3001<a href=\"https:\/\/www.paloaltonetworks.jp\/products\/threat-detection-and-prevention\/web-security\">URL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0<\/a>\u3067\u540c\u30c9\u30e1\u30a4\u30f3\u3092\u30de\u30eb\u30a6\u30a7\u30a2\u3068\u3057\u3066\u5206\u985e\u3057\u307e\u3059\u3002<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/cortex\/autofocus\">AutoFocus<\/a>: \u95a2\u9023\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u3092 <a href=\"https:\/\/autofocus.paloaltonetworks.com\/#\/tag\/Unit42.Mailto\">NetWalker<\/a>\u30bf\u30b0\u3067\u8ffd\u8de1\u3057\u307e\u3059(\u4ee5\u524d\u306e\u547c\u79f0\u306f Mailto\uff09<\/li>\n<\/ul>\n<p>NetWalker \u306b\u95a2\u9023\u3059\u308b\u6307\u6a19\u306f\u3001\u3053\u3061\u3089\u306e<a href=\"https:\/\/github.com\/pan-unit42\/iocs\/blob\/master\/DoppelPaymer\">GitHub<\/a>\u304b\u3089\u5229\u7528\u53ef\u80fd\u3067\u3059\u3002Unit 42\u306eTAXII<a href=\"https:\/\/github.com\/pan-unit42\/iocs\/tree\/master\/stix2-reports\/report_json\">\u30d5\u30a3\u30fc\u30c9<\/a>\u306b\u3082\u516c\u958b\u6e08\u307f\u3067\u3059\u3002<\/p>\n<h3><a id=\"post-117552-_12qddq6aicy6\"><\/a>\u8ffd\u52a0\u8cc7\u6599<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.justice.gov\/opa\/pr\/department-justice-launches-global-action-against-netwalker-ransomware\">Department of Justice Launches Global Action Against NetWalker Ransomware<\/a><\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/heres-a-list-of-all-the-ransomware-gangs-who-will-steal-and-leak-your-data-if-you-dont-pay\/\">Here's a list of all the ransomware gangs who will steal and leak your data if you don't pay<\/a><\/li>\n<li><a href=\"https:\/\/www.advanced-intel.com\/post\/netwalker-ransomware-group-enters-advanced-targeting-game\">NetWalker Ransomware Group Enters Advanced Targeting \"Game\"<\/a><\/li>\n<li><a href=\"https:\/\/heimdalsecurity.com\/blog\/netwalker-ransomware-explained\/\">Netwalker Ransomware Explained: What You Need to Know [Updated]<\/a><\/li>\n<li><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/take-a-netwalk-on-the-wild-side\/\">Take a \"NetWalk\" on the Wild Side<\/a><\/li>\n<\/ul>\n<p><strong><em>\u7d9a\u304d\u3092\u8aad\u3080: <a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/3\">Zeppelin<\/a><\/em><\/strong><\/p>\n<p><strong><em><a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/\">\u30c8\u30c3\u30d7\u306b\u623b\u308b<\/a><\/em><\/strong><\/p>\n<p><!--nextpage--><\/p>\n<h2><a id=\"post-117552-_vjil2a35ucq5\"><\/a><em>\u8105\u5a01\u306e\u8a55\u4fa1: Zeppelin\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2<\/em><\/h2>\n<h3><a id=\"post-117552-_nu8av4o4v8c\"><\/a>\u6982\u8981<\/h3>\n<p>Zeppelin\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u306f\u30012019\u5e74\u306b<a href=\"https:\/\/blogs.blackberry.com\/en\/2019\/12\/zeppelin-russian-ransomware-targets-high-profile-users-in-the-us-and-europe\">\u6700\u521d\u306bBlackBerry Cylance\u304c\u5831\u544a\u3057\u305f<\/a>\u30b5\u30fc\u30d3\u30b9\u3068\u3057\u3066\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2(RaaS)\u3067\u3042\u308b<a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/buran-ransomware-the-evolution-of-vegalocker\/\">VegaLocker\/Buran<\/a>\u30d5\u30a1\u30df\u30ea\u306e1\u4e9c\u7a2e\u3067\u3059\u3002\u3053\u308c\u306f\u3001\u6697\u53f7\u5316\u3055\u308c\u305f\u30d5\u30a1\u30a4\u30eb\u30b3\u30fc\u30c9\u306b\u300cZEPPELIN\u300d\u3068\u3044\u3046\u30c6\u30ad\u30b9\u30c8\u304c\u8ffd\u52a0\u3055\u308c\u308b\u3053\u3068\u304b\u3089\u3053\u3046\u540d\u4ed8\u3051\u3089\u308c\u307e\u3057\u305f\u3002Zeppelin\u306f\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u8105\u5a01\u72b6\u6cc1\u306b\u304a\u3044\u3066\u5f15\u304d\u7d9a\u304d\u5f37\u3044\u5b58\u5728\u611f\u3092\u793a\u3057\u3066\u304a\u308a\u3001\u65b0\u3057\u3044\u30ad\u30e3\u30f3\u30da\u30fc\u30f3\u304c\u5b9a\u671f\u7684\u306b\u73fe\u308c\u3066\u3044\u307e\u3059\u3002\u6d17\u7df4\u6027\u3001\u6a19\u7684\u306e\u9078\u5b9a\u3001\u653b\u6483\u30d1\u30bf\u30fc\u30f3\u306e\u70b9\u3067\u306fEgregor\u3001DoppelPaymer\u3001Ryuk\u306e\u6bd4\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u304c\u3001Zeppelin\u306fRaaS\u754c\u9688\u3067\u5384\u4ecb\u3067\u5805\u7262\u306a\u5546\u7528\u30de\u30eb\u30a6\u30a7\u30a2\u4e9c\u7a2e\u3067\u3042\u308b\u3053\u3068\u304c\u5b9f\u8a3c\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u6700\u521d\u671f\u306b\u89b3\u6e2c\u3055\u308c\u305fZeppelin\u30b5\u30f3\u30d7\u30eb\u306f2019\u5e7411\u6708\u306e\u3082\u306e\u3067\u3059\u304c\u3001\u3053\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u306f\u3044\u307e\u3060\u60aa\u610f\u306e\u3042\u308b\u653b\u6483\u8005\u306b\u3088\u304f\u5229\u7528\u3055\u308c\u3066\u3044\u307e\u3059\u3002Unit 42\u306f\u3001\u72ec\u81ea\u306e\u30c6\u30ec\u30e1\u30c8\u30ea\u30c7\u30fc\u30bf\u3068\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\uff08OSINT\uff09\u306e\u4e21\u65b9\u3092\u4f7f\u3063\u3066\u7d99\u7d9a\u7684\u306bZeppelin\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u30ad\u30e3\u30f3\u30da\u30fc\u30f3\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u3092\u8ffd\u8de1\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<h3><a id=\"post-117552-_jawphkju5y5w\"><\/a>Zeppelin\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u6982\u8981<\/h3>\n<p><img  class=\"alignnone size-full wp-image-117641 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2021\/03\/Ransomware-series-21-illustration_Zeppelin.png\" alt=\"Conceptual image representing Zeppelin ransomware as part of the ransomware threat assessments companion to the 2021 Unit 42 Ransomware Threat Report. \" width=\"1587\" height=\"850\" \/><\/p>\n<p>Zeppelin\u306f\u975e\u5e38\u306b\u67d4\u8edf\u306b\u69cb\u6210\u5909\u66f4\u304c\u3067\u304d\u307e\u3059\u304c\u3001\u4eca\u65e5\u306e\u591a\u304f\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u3067\u898b\u3089\u308c\u308b\u914d\u5e03\u3084\u5c55\u958b\u306e\u305f\u3081\u306e\u4e00\u822c\u7684\u306a\u65b9\u6cd5\u3082\u7dad\u6301\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<ul>\n<li>\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30e1\u30fc\u30eb<\/li>\n<li>\u60aa\u610f\u306e\u3042\u308b\u30de\u30af\u30ed\u304c\u57cb\u3081\u8fbc\u307e\u308c\u305fMicrosoft Word\u6587\u66f8<\/li>\n<li>PowerShell\u30ed\u30fc\u30c0<\/li>\n<li>ScreenConnect\u307e\u305f\u306fVPN\u63a5\u7d9a\u306e\u958b\u59cb<\/li>\n<li>\u60aa\u610f\u306e\u3042\u308bWindows\u5b9f\u884c\u30d5\u30a1\u30a4\u30eb\uff08EXE)<\/li>\n<li>\u60aa\u610f\u306e\u3042\u308bDLL\u30d5\u30a1\u30a4\u30eb<\/li>\n<\/ul>\n<figure id=\"attachment_117585\" aria-describedby=\"caption-attachment-117585\" style=\"width: 721px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-117586 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2021\/03\/word-image-75.png\" alt=\"\u56f31 Zeppelin\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3092\u914d\u4fe1\u3059\u308b\u60aa\u610f\u306e\u3042\u308b\u30de\u30af\u30ed\u3092\u542b\u3080\u304a\u3068\u308a\u6587\u66f8\u3002\" width=\"721\" height=\"401\" \/><figcaption id=\"caption-attachment-117585\" class=\"wp-caption-text\">\u56f31 Zeppelin\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3092\u914d\u4fe1\u3059\u308b\u60aa\u610f\u306e\u3042\u308b\u30de\u30af\u30ed\u3092\u542b\u3080\u304a\u3068\u308a\u6587\u66f8<\/figcaption><\/figure>\n<p>\u3055\u3089\u306bZeppelin\u306f\u3001\u914d\u5e03\u4e2d\u306b\u306e\u307f\u30a2\u30af\u30c6\u30a3\u30d6\u306b\u306a\u308b\u4e00\u6642\u7684\u30b3\u30de\u30f3\u30c9&amp;\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\uff08C2\uff09\u30a4\u30f3\u30d5\u30e9\u30b9\u30c8\u30e9\u30af\u30c1\u30e3\u3084\u4fb5\u5bb3\u3055\u308c\u305fWeb\u30b5\u30a4\u30c8\u3092\u4ecb\u3057\u3066\u914d\u5e03\u3055\u308c\u308b\u3053\u3068\u304c\u3088\u304f\u3042\u308a\u307e\u3059\u3002\u3055\u3089\u306b\u4e8b\u60c5\u3092\u8907\u96d1\u306b\u3057\u3066\u3044\u308b\u306e\u304c\u3001\u6700\u8fd1\u306eZeppelin\u306e\u4e9c\u7a2e\u306b\u306f\u3001\u52d5\u7684\u5206\u6790\u30a8\u30f3\u30b8\u30f3\u3084\u30b5\u30f3\u30c9\u30dc\u30c3\u30af\u30b9\u3092\u30d0\u30a4\u30d1\u30b9\u3059\u308b\u305f\u3081\u300126\u79d2\u9593\u7d9a\u304f\u30b9\u30ea\u30fc\u30d7\u6a5f\u80fd\u3092\u542b\u3080\u3082\u306e\u304c\u3042\u308b\u3053\u3068\u3067\u3059\u3002Zeppelin\u306b\u306f\u3001\u88ab\u5bb3\u8005\u306e\u56fd\u30b3\u30fc\u30c9\u3092\u30c1\u30a7\u30c3\u30af\u3057\u3001\u5b9f\u884c\u3055\u308c\u3066\u3044\u308b\u56fd\u304c\u30ed\u30b7\u30a2\u3001\u30a6\u30af\u30e9\u30a4\u30ca\u3001\u30d9\u30e9\u30eb\u30fc\u30b7\u3001\u30ab\u30b6\u30d5\u30b9\u30bf\u30f3\u3067\u306f\u306a\u3044\u3053\u3068\u3092\u78ba\u8a8d\u3059\u308b\u6a5f\u80fd\u304c\u542b\u307e\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>Zeppelin\u306f\u3044\u304f\u3064\u304b\u306e\u696d\u754c\u3092\u6a19\u7684\u304b\u3089\u5916\u3057\u3066\u3044\u307e\u3059\u304c\u3001\u6700\u3082\u6253\u6483\u3092\u53d7\u3051\u3066\u3044\u308b\u696d\u754c\u3068\u3057\u3066\u306f\u3001\u4e0d\u52d5\u7523\u3001\u30d8\u30eb\u30b9\u30b1\u30a2\u3001\u88fd\u9020\u3001\u91d1\u878d\u3001\u30cf\u30a4\u30c6\u30af\u306a\u3069\u304c\u3042\u3052\u3089\u308c\u307e\u3059\u3002Zeppelin\u306e\u8eab\u4ee3\u91d1\u30e1\u30e2\u306f\u3001\u975e\u5e38\u306b\u4e00\u822c\u7684\u306a\u3082\u306e\u304b\u3089\u5bfe\u8c61\u3068\u306a\u308b\u7d44\u7e54\u306b\u95a2\u9023\u3057\u3066\u7279\u5225\u306b\u7d30\u5de5\u3055\u308c\u305f\u3082\u306e\u307e\u3067\u975e\u5e38\u306b\u5e45\u304c\u3042\u308a\u307e\u3059\u3002Zeppelin\u306e\u80cc\u5f8c\u306b\u3044\u308b\u30a2\u30af\u30bf\u30fc\u306f\u540c\u3058\u696d\u754c\u5185\u306e\u8907\u6570\u306e\u8457\u540d\u7d44\u7e54\u3092\u30bf\u30fc\u30b2\u30c3\u30c8\u306b\u3059\u308b\u3053\u3068\u3082\u3042\u308a\u307e\u3059\u30022020\u5e74\u306e\u5e73\u5747\u8eab\u4ee3\u91d1\u652f\u6255\u3044\u984d\u306f\u30d3\u30c3\u30c8\u30b3\u30a4\u30f3\u3067\u652f\u6255\u308f\u308c\u305f14,088\u30c9\u30eb\uff08\u65e5\u672c\u5186\u3067154\u4e07 \u5186\uff09\u3067\u3057\u305f\u3002Zeppelin\u306e\u88ab\u5bb3\u8005\u306e\u6240\u5728\u5730\u306f\u7c73\u56fd\u3001\u30ab\u30ca\u30c0\u3001\u30d6\u30eb\u30ac\u30ea\u30a2\u3001\u65e5\u672c\u3001\u97d3\u56fd\u3001\u30d5\u30e9\u30f3\u30b9\u3001\u53f0\u6e7e\u306a\u3069\u3001\u3044\u304f\u3064\u304b\u306e\u56fd\u306b\u307e\u305f\u304c\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>Zeppelin\u306e\u88ab\u5bb3\u8005\u5b66\u306e\u8a73\u7d30\u306b\u3064\u3044\u3066\u306f\u3001<a href=\"https:\/\/start.paloaltonetworks.com\/unit-42-ransomware-threat-report\">2021 Unit 42\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u30ec\u30dd\u30fc\u30c8<\/a>\u3092\u53c2\u7167\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n<figure id=\"attachment_117587\" aria-describedby=\"caption-attachment-117587\" style=\"width: 860px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-117588 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2021\/03\/word-image-76.png\" alt=\"\u56f32 \u500b\u4ebaID\u4ed8\u304d\u306e\u8eab\u4ee3\u91d1\u30e1\u30e2\uff08\u51fa\u5178: Juniper Threat Labs\uff09\" width=\"860\" height=\"520\" \/><figcaption id=\"caption-attachment-117587\" class=\"wp-caption-text\">\u56f32 \u500b\u4ebaID\u4ed8\u304d\u306e\u8eab\u4ee3\u91d1\u30e1\u30e2\uff08\u51fa\u5178: Juniper Threat Labs\uff09<\/figcaption><\/figure>\n<h3><a id=\"post-117552-_ngdxjcunldwx\"><\/a>\u884c\u52d5\u65b9\u91dd<\/h3>\n<p>\u3053\u306e\u30bb\u30af\u30b7\u30e7\u30f3\u3067\u306f\u3001Zeppelin\u306e\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u306b\u95a2\u9023\u3059\u308b\u6226\u8853\u3068\u624b\u6cd5\u3092\u6587\u66f8\u5316\u3057\u3001\u305d\u308c\u3089\u3092\u5f0a\u793e\u88fd\u54c1\u30fb\u30b5\u30fc\u30d3\u30b9\u306b\u76f4\u63a5\u30de\u30c3\u30d4\u30f3\u30b0\u3057\u307e\u3059\u3002\u307e\u305f\u3001\u304a\u5ba2\u69d8\u306b\u3066\u30c7\u30d0\u30a4\u30b9\u306e\u69cb\u6210\u304c\u6b63\u3057\u304f\u884c\u308f\u308c\u3066\u3044\u308b\u304b\u3069\u3046\u304b\u3092\u78ba\u8a8d\u3059\u308b\u65b9\u6cd5\u306b\u3064\u3044\u3066\u3082\u3054\u8aac\u660e\u3057\u307e\u3059\u3002<\/p>\n<table style=\"width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 18.0858%;\"><strong>\u88fd\u54c1\/\u30b5\u30fc\u30d3\u30b9<\/strong><\/td>\n<td style=\"width: 81.5413%;\"><strong>\u884c\u52d5\u65b9\u91dd<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center; width: 99.6271%;\" colspan=\"2\"><strong>\u521d\u671f\u30a2\u30af\u30bb\u30b9\u3001\u9632\u885b\u56de\u907f\u3001\u5b9f\u884c\u3001\u63a2\u7d22\u3001\u30b3\u30de\u30f3\u30c9&amp;\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\u3001\u5f71\u97ff<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center; width: 99.6271%;\" colspan=\"2\"><strong>Spearphishing Attachment [T1566.001]\uff08\u6dfb\u4ed8\u30d5\u30a1\u30a4\u30eb\u578b\u30b9\u30d4\u30a2\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\uff09\u3001<br \/>\nWeb Protocols [T1071.001]\uff08Web\u30d7\u30ed\u30c8\u30b3\u30eb\uff09\u3001<br \/>\nObfuscated Files or Information [T1027]\uff08\u96e3\u8aad\u5316\u3055\u308c\u305f\u30d5\u30a1\u30a4\u30eb\u307e\u305f\u306f\u60c5\u5831\uff09\u3001<br \/>\nWindows Command Shell [T1059.003]\uff08Windows\u30b3\u30de\u30f3\u30c9\u30b7\u30a7\u30eb\uff09\u3001<br \/>\nInhibit System Recovery [T1490]\uff08\u30b7\u30b9\u30c6\u30e0\u306e\u5fa9\u5143\u7981\u6b62\uff09\u3001<br \/>\nModify Registry [T1112]\uff08\u30ec\u30b8\u30b9\u30c8\u30ea\u306e\u5909\u66f4\uff09\u3001<br \/>\nFile and Directory Discovery [T1083](\u30d5\u30a1\u30a4\u30eb\u3068\u30c7\u30a3\u30ec\u30af\u30c8\u30ea\u306e\u63a2\u7d22)\u3001<br \/>\nData Encrypted for Impact [T1486]\uff08\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u305f\u3081\u306e\u30c7\u30fc\u30bf\u6697\u53f7\u5316\uff09<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 18.0858%;\" rowspan=\"4\">NGFW<\/td>\n<td style=\"width: 81.5413%;\">untrust\u30be\u30fc\u30f3\u304b\u3089\u3088\u308a\u4fe1\u983c\u3067\u304d\u308btrust\u30be\u30fc\u30f3\u3078\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u5834\u5408\u306f\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u304c\u5b58\u5728\u3059\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.5413%;\">\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3067\u30b5\u30fc\u30d3\u30b9\u306b\u300cany\u300d\u304c\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3082\u306e\u304c\u306a\u3044\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.5413%;\">\u4fe1\u983c\u3055\u308c\u305f\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u30bd\u30fc\u30b9\u306eIP\u30a2\u30c9\u30ec\u30b9\u3068\u306e\u9593\u306e\u3059\u3079\u3066\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u62d2\u5426\u3059\u308b\u300c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u300d\u304c\u5b58\u5728\u3059\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.5413%;\">\u30d5\u30a1\u30a4\u30eb\u30d6\u30ed\u30c3\u30af\u3092\u8a2d\u5b9a\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 18.0858%;\" rowspan=\"7\">WildFire<\/td>\n<td style=\"width: 81.5413%;\">WildFire\u30d5\u30a1\u30a4\u30eb\u30b5\u30a4\u30ba\u306e\u30a2\u30c3\u30d7\u30ed\u30fc\u30c9\u5236\u9650\u304c\u6700\u5927\u5316\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.5413%;\">WildFire\u30d5\u30a1\u30a4\u30eb\u30d6\u30ed\u30c3\u30af\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u306e\u3059\u3079\u3066\u306e\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3001\u30d5\u30a1\u30a4\u30eb\u30bf\u30a4\u30d7\u306b\u3064\u3044\u3066\u3001\u8ee2\u9001\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.5413%;\">\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3067WildFire\u5206\u6790\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.5413%;\">\u5fa9\u53f7\u3057\u305f\u30b3\u30f3\u30c6\u30f3\u30c4\u306eWildFire\u3078\u306e\u8ee2\u9001\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.5413%;\">\u3059\u3079\u3066\u306eWildFire\u30bb\u30c3\u30b7\u30e7\u30f3\u60c5\u5831\u8a2d\u5b9a\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.5413%;\">WildFire\u306b\u3088\u3063\u3066\u691c\u51fa\u3055\u308c\u305f\u60aa\u610f\u306e\u3042\u308b\u30d5\u30a1\u30a4\u30eb\u306b\u5bfe\u3059\u308b\u30a2\u30e9\u30fc\u30c8\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.5413%;\">\u300cWildFire\u306e\u66f4\u65b0\u30b9\u30b1\u30b8\u30e5\u30fc\u30eb\u300d\u304c\u6bce\u5206\u3054\u3068\u306b\u66f4\u65b0\u3092\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3066\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b\u3088\u3046\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 18.0858%;\" rowspan=\"6\">Threat Prevention<em><sup>\u2020<\/sup><\/em><\/td>\n<td style=\"width: 81.5413%;\">\u30a2\u30f3\u30c1\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u3001\u3059\u3079\u3066\u306e\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u306e\u91cd\u5927\u5ea6\u30ec\u30d9\u30eb\u3001\u30ab\u30c6\u30b4\u30ea\u3001\u304a\u3088\u3073\u8105\u5a01\u3092\u30d6\u30ed\u30c3\u30af\u3059\u308b\u3088\u3046\u306b\u69cb\u6210\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.5413%;\">\u4f7f\u7528\u4e2d\u306e\u3059\u3079\u3066\u306e\u30a2\u30f3\u30c1\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3067DNS\u30b7\u30f3\u30af\u30db\u30fc\u30eb\u304c\u69cb\u6210\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.5413%;\">\u4f7f\u7528\u4e2d\u306e\u3059\u3079\u3066\u306e\u30a2\u30f3\u30c1\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3067\u30d1\u30c3\u30b7\u30d6DNS\u306e\u76e3\u8996\u304c\u6709\u52b9\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.5413%;\">\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u3078\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u306b\u3001\u5b89\u5168\u306a\u30a2\u30f3\u30c1\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u9069\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.5413%;\">\u30d5\u30a1\u30a4\u30eb\u30d6\u30ed\u30c3\u30af\u3092\u8a2d\u5b9a\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.5413%;\">imap\u3001pop3\u3092\u9664\u304f\u3059\u3079\u3066\u306e\u30c7\u30b3\u30fc\u30c0\u3067\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u30d6\u30ed\u30c3\u30af\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 18.0858%;\">DNS Security<em><sup>\u2020<\/sup><\/em><\/td>\n<td style=\"width: 81.5413%;\">\u30a2\u30f3\u30c1\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2 \u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3067DNS\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u6709\u52b9\u306b\u3059\u308b<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 18.0858%;\" rowspan=\"5\">URL Filtering<em><sup>\u2020<\/sup><\/em><\/td>\n<td style=\"width: 81.5413%;\">PAN-DB URL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0\u304c\u4f7f\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.5413%;\">URL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0\u304c&lt;enterprise approved value&gt;\u306eURL\u30ab\u30c6\u30b4\u30ea\u306b\u300c\u30d6\u30ed\u30c3\u30af\u300d\u307e\u305f\u306f\u300c\u30aa\u30fc\u30d0\u30fc\u30e9\u30a4\u30c9\u300d\u306e\u30a2\u30af\u30b7\u30e7\u30f3\u3092\u4f7f\u7528\u3057\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.5413%;\">\u3059\u3079\u3066\u306eURL\u3078\u306e\u30a2\u30af\u30bb\u30b9\u304c\u30ed\u30b0\u306b\u8a18\u9332\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.5413%;\">\u3059\u3079\u3066\u306eHTTP\u30d8\u30c3\u30c0\u30fc\u30ed\u30b0\u30aa\u30d7\u30b7\u30e7\u30f3\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.5413%;\">\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u3078\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30dd\u30ea\u30b7\u30fc\u306b\u5bfe\u3057\u3066\u30bb\u30ad\u30e5\u30a2\u306aURL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0\u3092\u6709\u52b9\u306b\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 18.0858%;\" rowspan=\"3\">Cortex XDR<\/td>\n<td style=\"width: 81.5413%;\">\u30a2\u30f3\u30c1\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u30d7\u30ed\u30c6\u30af\u30b7\u30e7\u30f3\u3092\u6709\u52b9\u306b\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.5413%;\">\u30a2\u30f3\u30c1\u30de\u30eb\u30a6\u30a7\u30a2\u30d7\u30ed\u30c6\u30af\u30b7\u30e7\u30f3\u3092\u6709\u52b9\u306b\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.5413%;\">\u30de\u30eb\u30a6\u30a7\u30a2\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3067Behavioral Threat Protection\uff08BTP\uff09\u3092\u8a2d\u5b9a\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 18.0858%;\" rowspan=\"2\">Cortex XSOAR<\/td>\n<td style=\"width: 81.5413%;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 - Palo Alto Networks Endpoint Malware Investigation<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.5413%;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Ransomware Manual for incident response<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: center;\"><span style=\"font-size: 12pt;\"><sup><span style=\"color: #999999;\"><em>\u88681 Zeppelin\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u884c\u52d5\u65b9\u91dd<br \/>\n<\/em><\/span><\/sup><\/span><span style=\"font-size: 12pt;\"><sup><span style=\"color: #999999;\"><em>\u2020\u3053\u308c\u3089\u306e\u6a5f\u80fd\u306f\u3001NGFW\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30d6\u30b9\u30af\u30ea\u30d7\u30b7\u30e7\u30f3\u30b5\u30fc\u30d3\u30b9\u306e\u4e00\u90e8\u3067\u3059<\/em><\/span><\/sup><\/span><\/p>\n<h3><a id=\"post-117552-_6ll5dpi68sv\"><\/a>\u7d50\u8ad6<\/h3>\n<p>Zeppelin\u306f\u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30f3\u304c\u5b89\u5b9a\u3057\u3066\u304a\u308a\u3001\u5b9f\u88c5\u304c\u5bb9\u6613\u3067\u3001\u4e0e\u3048\u3046\u308b\u5f71\u97ff\u304c\u5927\u304d\u3044\u3053\u3068\u304b\u3089\u3001\u30b0\u30ed\u30fc\u30d0\u30eb\u306a\u5c55\u958b\u304c\u7d9a\u3044\u3066\u3044\u307e\u3059\u3002Unit 42\u306f\u3001Zeppelin\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u304c\u5f53\u9762\u7d9a\u304f\u3053\u3068\u306b\u3064\u3044\u3066\u307e\u3063\u305f\u304f\u7591\u3063\u3066\u3044\u307e\u305b\u3093\u3002<\/p>\n<p>Zeppelin \u306b\u95a2\u9023\u3059\u308b\u6307\u6a19\u306f\u3001\u3053\u3061\u3089\u306e<a href=\"https:\/\/github.com\/pan-unit42\/iocs\">GitHub<\/a>\u304b\u3089\u5229\u7528\u53ef\u80fd\u3067\u3059\u3002\u307e\u305fUnit 42\u306eTAXII<a href=\"https:\/\/github.com\/pan-unit42\/iocs\/tree\/master\/stix2-reports\/report_json\">\u30d5\u30a3\u30fc\u30c9<\/a>\u306b\u3082\u516c\u958b\u6e08\u307f\u3067\u3059\u3002<\/p>\n<p>\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306fZeppelin\u3092\u6b21\u306e\u65b9\u6cd5\u3067\u691c\u51fa\/\u9632\u6b62\u3057\u307e\u3059\u3002<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/products\/secure-the-network\/wildfire\">WildFire<\/a>: \u65e2\u77e5\u306e\u30b5\u30f3\u30d7\u30eb\u306f\u3059\u3079\u3066\u30de\u30eb\u30a6\u30a7\u30a2\u3068\u3057\u3066\u8b58\u5225\u3055\u308c\u307e\u3059\u3002<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/cortex\/cortex-xdr\">Cortex XDR<\/a>:\n<ul>\n<li>Zeppelin\u306e\u30a4\u30f3\u30b8\u30b1\u30fc\u30bf\u3092\u542b\u307f\u307e\u3059\u3002<\/li>\n<li>\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u5bfe\u7b56\u30e2\u30b8\u30e5\u30fc\u30eb\u3067Zeppelin\u306e\u6697\u53f7\u5316\u306e\u632f\u308b\u821e\u3044\u3092\u691c\u51fa\u3057\u307e\u3059\u3002<\/li>\n<li>\u30ed\u30fc\u30ab\u30eb\u5206\u6790\u30fb\u691c\u51fa\u6a5f\u80fd\u306b\u3088\u308aZeppelin\u30d0\u30a4\u30ca\u30ea\u3092\u691c\u51fa\u3057\u307e\u3059\u3002<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/network-security\/next-generation-firewall\">\u6b21\u4e16\u4ee3\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb<\/a>: DNS\u30b7\u30b0\u30cd\u30c1\u30e3\u304c\u65e2\u77e5\u306e\u30b3\u30de\u30f3\u30c9&amp;\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\uff08C2\uff09\u30c9\u30e1\u30a4\u30f3\u3092\u691c\u51fa\u3057\u3001<a href=\"https:\/\/www.paloaltonetworks.jp\/products\/threat-detection-and-prevention\/web-security\">URL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0<\/a>\u3067\u540c\u30c9\u30e1\u30a4\u30f3\u3092\u30de\u30eb\u30a6\u30a7\u30a2\u3068\u3057\u3066\u5206\u985e\u3057\u307e\u3059\u3002<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/cortex\/autofocus\">AutoFocus<\/a>: \u95a2\u9023\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u3092<a href=\"https:\/\/autofocus.paloaltonetworks.com\/#\/tag\/Unit42.Zeppelin\">Zeppelin<\/a>\u30bf\u30b0\u3067\u8ffd\u8de1\u3057\u307e\u3059\u3002<\/li>\n<\/ul>\n<p>\u3055\u3089\u306b\u3001Unit 42\u304c\u89b3\u6e2c\u3057\u305f\u30ad\u30e3\u30f3\u30da\u30fc\u30f3\u95a2\u9023IoC\u304c2020\u5e7412\u670811\u65e5 (<a href=\"https:\/\/twitter.com\/Unit42_Intel\/status\/1337453869304045570\">\u30d1\u30fc\u30c81<\/a>\u3001<a href=\"https:\/\/twitter.com\/Unit42_Intel\/status\/1337454124435185665\">\u30d1\u30fc\u30c82<\/a>\uff09\u3068<a href=\"https:\/\/twitter.com\/Unit42_Intel\/status\/1339352623372267520\">2020\u5e7412\u670816\u65e5<\/a>\u306eUnit 42\u306eTwitter\u30d5\u30a3\u30fc\u30c9\u3067\u516c\u958b\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<h3><a id=\"post-117552-_mvdu8yd02my1\"><\/a>\u8ffd\u52a0\u8cc7\u6599<\/h3>\n<ul>\n<li><a href=\"https:\/\/blogs.blackberry.com\/en\/2019\/12\/zeppelin-russian-ransomware-targets-high-profile-users-in-the-us-and-europe\">Zeppelin: Russian Ransomware Targets High Profile Users in the U.S. and Europe<\/a><\/li>\n<li><a href=\"https:\/\/blogs.juniper.net\/en-us\/threat-research\/zeppelin-ransomware-returns-with-a-fresh-wave-of-attacks\">Zeppelin Ransomware returns with a fresh wave of attacks<\/a><\/li>\n<\/ul>\n<p><strong><em>\u7d9a\u304d\u3092\u8aad\u3080: <a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/4\">DoppelPaymer<\/a><\/em><\/strong><\/p>\n<p><strong><em><a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/\">\u30c8\u30c3\u30d7\u306b\u623b\u308b<\/a><\/em><\/strong><\/p>\n<p><!--nextpage--><\/p>\n<h2><a id=\"post-117552-_xnaodf8yqo9i\"><\/a><em>\u8105\u5a01\u306e\u8a55\u4fa1\uff1aDoppelPaymer\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2<\/em><\/h2>\n<h3><a id=\"post-117552-_zalcqos3x8qe\"><\/a>\u6982\u8981<\/h3>\n<p>DoppelPaymer\u306f<a href=\"https:\/\/www.crowdstrike.com\/blog\/doppelpaymer-ransomware-and-dridex-2\/\">2019\u5e746\u6708<\/a>\u306b\u6700\u521d\u306b\u516c\u958b\u3055\u308c\u305f\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u3067\u3042\u308a\u3001\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u30b0\u30eb\u30fc\u30d7\u3067\u3059\u3002\u540c\u30b0\u30eb\u30fc\u30d7\u3068\u6210\u719f\u3057\u305f\u5b8c\u5168\u7248\u306e\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u4e21\u65b9\u306b\u660e\u78ba\u306b\u7d50\u3073\u3064\u304f\u653b\u6483\u306f2019\u5e746\u6708\u304b\u3089\u59cb\u307e\u3063\u3066\u3044\u307e\u3059\u304c\u3001\u305d\u308c\u4ee5\u524d\u3001\u30b0\u30eb\u30fc\u30d7\u306e\u660e\u78ba\u306a\u5e30\u5c5e\u304c\u307e\u3060\u308f\u304b\u3063\u3066\u3044\u306a\u304b\u3063\u305f\u3053\u308d\u306e\u672a\u719f\u306a\u30d0\u30fc\u30b8\u30e7\u30f3\u306e\u30de\u30eb\u30a6\u30a7\u30a2\u304c\u3001\u305d\u306e\u6570\u304b\u6708\u524d\u306b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b5\u30fc\u30c1\u30e3\u30fc\u306b\u3088\u308a\u5165\u624b\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u3053\u3068\u306f\u3001\u653b\u6483\u8005\u304c\u5b9f\u969b\u306e\u653b\u6483\u3067\u30de\u30eb\u30a6\u30a7\u30a2\u3092\u4f7f\u7528\u3059\u308b\u524d\u306b\u6a5f\u80fd\u3092\u30c6\u30b9\u30c8\u3057\u3066\u3044\u305f\u304b\u3001\u6642\u9593\u7d4c\u904e\u3068\u3068\u3082\u306b\u88ab\u5bb3\u8005\u3078\u306e\u5bfe\u5fdc\u30a2\u30d7\u30ed\u30fc\u30c1\u3092\u5909\u3048\u3066\u3044\u3063\u305f\u3053\u3068\u3092\u793a\u3059\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<h3><a id=\"post-117552-_iib7h6aspf79\"><\/a>Doppelpaymer\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u6982\u8981<\/h3>\n<p><img  class=\"alignnone size-full wp-image-117643 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2021\/03\/Ransomware-series-21-illustration_DoppelPaymer.png\" alt=\"\u300c2021 Unit 42\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u30ec\u30dd\u30fc\u30c8\u300d\u306b\u4ed8\u968f\u3059\u308b\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u8a55\u4fa1\u306e\u4e00\u90e8\u3068\u3057\u3066\u306eDoppelPaymer\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3092\u8868\u3059\u6982\u5ff5\u753b\u50cf\u3002 \" width=\"1587\" height=\"850\" \/><\/p>\n<p>DoppelPaymer\u306f<a href=\"https:\/\/success.trendmicro.com\/solution\/000261855\">BitPaymer<\/a>\u3068\u547c\u3070\u308c\u308b\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u30d5\u30a1\u30df\u30ea\u306e\u4e00\u90e8\u3068\u898b\u306a\u3055\u308c\u3066\u3044\u307e\u3059\u3002DoppelPaymer\u306e\u80cc\u5f8c\u306b\u3044\u308b\u30a2\u30af\u30bf\u30fc\u306b\u306fIndrik Spider\u3068\u3057\u3066\u77e5\u3089\u308c\u308b\u30a2\u30af\u30bf\u30fc\u30b0\u30eb\u30fc\u30d7\u3068\u306e\u90e8\u5206\u7684\u91cd\u8907\u304c\u898b\u3089\u308c\u307e\u3059\u3002DoppelPaymer\u30a2\u30af\u30bf\u30fc\u306f\u3001\u305d\u306e\u4ed6\u591a\u304f\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u30b0\u30eb\u30fc\u30d7\u540c\u69d8\u3001\u516c\u958b\u30b5\u30a4\u30c8\u3084\u30bd\u30fc\u30b7\u30e3\u30eb\u30e1\u30c7\u30a3\u30a2\u4e0a\u306e\u30a2\u30ab\u30a6\u30f3\u30c8\u3092\u3082\u3061\u3001\u591a\u304f\u306e\u5834\u5408\u306f\u305d\u3053\u306b\u88ab\u5bb3\u8005\u30ea\u30b9\u30c8\u3068\u305d\u306e\u6f0f\u3048\u3044\u30c7\u30fc\u30bf\u3092\u4fdd\u6301\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<figure id=\"attachment_117589\" aria-describedby=\"caption-attachment-117589\" style=\"width: 602px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-117590 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2021\/03\/word-image-77.png\" alt=\"\u56f31 \u6700\u8fd1\u306e\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u3092\u542b\u3080DoppelPaymer\u306eTwitter\u30d7\u30ed\u30d5\u30a3\u30fc\u30eb\uff08\u51fa\u5178: Twitter\uff09\" width=\"602\" height=\"920\" \/><figcaption id=\"caption-attachment-117589\" class=\"wp-caption-text\">\u56f31 \u6700\u8fd1\u306e\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u3092\u542b\u3080DoppelPaymer\u306eTwitter\u30d7\u30ed\u30d5\u30a3\u30fc\u30eb\uff08\u51fa\u5178: Twitter\uff09<\/figcaption><\/figure>\n<p>\u305d\u306e\u958b\u59cb\u4ee5\u6765\u3001\u3053\u306e\u30de\u30eb\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u306f\u901a\u5e38\u306f\u88ab\u5bb3\u8005\u306e\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u3067.locked\u3068.doppeled\u3068\u3044\u30462\u3064\u306e\u30d5\u30a1\u30a4\u30eb\u62e1\u5f35\u5b50\u3092\u5229\u7528\u3057\u3066\u304d\u307e\u3057\u305f\u3002\u3053\u308c\u30892\u3064\u306e\u30d5\u30a1\u30a4\u30eb\u62e1\u5f35\u5b50\u4ee5\u5916\u306b\u3001\u3053\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306f\u8208\u5473\u6df1\u3044\u624b\u6cd5\u3001\u3064\u307e\u308aProcessHacker\u3092\u5229\u7528\u3057\u3066\u30d7\u30ed\u30bb\u30b9\u3084\u30b5\u30fc\u30d3\u30b9\u3092\u7d42\u4e86\u3057\u307e\u3059\u3002ProcessHacker\u306f\u3001\u591a\u304f\u306eDoppelPaymer\u30b5\u30f3\u30d7\u30eb\u306b\u30d0\u30f3\u30c9\u30eb\u3055\u308c\u3066\u3044\u308b\u6b63\u898f\u306e\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u7ba1\u7406\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3067\u3001\u611f\u67d3\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u3067\u30d7\u30ed\u30bb\u30b9\u3068\u30b5\u30fc\u30d3\u30b9\u3092\u7d42\u4e86\u3059\u308b\u305f\u3081\u306b\u4f7f\u7528\u3055\u308c\u307e\u3059\u3002<\/p>\n<p>DoppelPaymer\u304c\u8868\u793a\u3059\u308b\u8eab\u4ee3\u91d1\u30e1\u30e2\u306f\u30012018\u5e74\u306bBitPaymer\u304c\u30c9\u30ed\u30c3\u30d7\u3057\u3066\u3044\u3082\u306e\u3068\u3088\u304f\u4f3c\u3066\u3044\u307e\u3059\u3002\u8eab\u4ee3\u91d1\u30e1\u30e2\u306b\u306f\u8eab\u4ee3\u91d1\u306e\u91d1\u984d\u306f\u542b\u307e\u308c\u3066\u3044\u307e\u305b\u3093\u304c\u3001\u652f\u6255\u3044\u3068\u653b\u6483\u306e\u80cc\u5f8c\u306b\u3044\u308b\u653b\u6483\u8005\u306b\u9023\u7d61\u3059\u308b\u305f\u3081\u306e\u30dd\u30fc\u30bf\u30eb\u3067\u3042\u308b.onion\u30c9\u30e1\u30a4\u30f3\u304c\u542b\u307e\u308c\u3066\u3044\u307e\u3059\u3002\u8eab\u4ee3\u91d1\u30e1\u30e2\u540c\u69d8\u3001DoppelPaymer\u306e\u652f\u6255\u3044\u30dd\u30fc\u30bf\u30eb\u306f\u3001\u307b\u307c\u5143\u306b\u306a\u3063\u305fBitPaymer\u652f\u6255\u3044\u30dd\u30fc\u30bf\u30eb\u306e\u30af\u30ed\u30fc\u30f3\u3067\u3059\u3002<\/p>\n<figure id=\"attachment_117591\" aria-describedby=\"caption-attachment-117591\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-117592 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2021\/03\/word-image-78.png\" alt=\"\u56f32 \u611f\u67d3\u30db\u30b9\u30c8\u306b\u8868\u793a\u3055\u308c\u308bDoppelPaymer\u8eab\u4ee3\u91d1\u30e1\u30e2\" width=\"900\" height=\"467\" \/><figcaption id=\"caption-attachment-117591\" class=\"wp-caption-text\">\u56f32 \u611f\u67d3\u30db\u30b9\u30c8\u306b\u8868\u793a\u3055\u308c\u308bDoppelPaymer\u8eab\u4ee3\u91d1\u30e1\u30e2<\/figcaption><\/figure>\n<p>Unit 42\u306f\u3001DoppelPaymer\u304c\u5378\u58f2\u304a\u3088\u3073\u5c0f\u58f2\u3001\u88fd\u9020\u3001\u91d1\u878d\u3001\u4fdd\u967a\u3001\u8f38\u9001\u304a\u3088\u3073\u30ed\u30b8\u30b9\u30c6\u30a3\u30af\u30b9\u3001\u30cf\u30a4\u30c6\u30af\u3001\u30db\u30b9\u30d4\u30bf\u30ea\u30c6\u30a3\u3001\u4e0d\u52d5\u7523\u696d\u754c\u306e\u4f01\u696d\u306b\u5bfe\u3057\u3066\u4f7f\u7528\u3055\u308c\u3066\u3044\u308b\u69d8\u5b50\u3092\u89b3\u6e2c\u3057\u3066\u3044\u307e\u3059\u3002\u5730\u57df\u5225\u306b\u898b\u308b\u3068\u3001DoppelPaymer\u306e\u80cc\u5f8c\u306b\u3044\u308b\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306f\u3001\u7c73\u56fd\u3001\u30ab\u30ca\u30c0\u3001\u30e1\u30ad\u30b7\u30b3\u3001\u5357\u30a2\u30d5\u30ea\u30ab\u3001\u30d9\u30eb\u30ae\u30fc\u3001\u30a4\u30bf\u30ea\u30a2\u3001\u30ce\u30eb\u30a6\u30a7\u30fc\u3001\u30c9\u30a4\u30c4\u306e\u88ab\u5bb3\u8005\u3092\u6a19\u7684\u306b\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>DoppelPaymer\u306f\u3001\u4fb5\u5bb3\u3057\u305f\u30c9\u30e1\u30a4\u30f3\u7ba1\u7406\u8005\u306e\u8cc7\u683c\u60c5\u5831\u3092\u4f7f\u7528\u3057\u3066\u30ea\u30e2\u30fc\u30c8\u306b\u3044\u308b\u4eba\u9593\u306e\u30aa\u30da\u30ec\u30fc\u30bf\u30fc\u7d4c\u7531\u3067\u4f1d\u64ad\u3057\u3001\u7d44\u7e54\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u5168\u4f53\u306b\u62e1\u6563\u3057\u307e\u3059\u3002DoppelPaymer\u306e\u80cc\u5f8c\u306b\u3044\u308b\u30aa\u30da\u30ec\u30fc\u30bf\u30fc\u304c\u901a\u5e38\u8981\u6c42\u3059\u308b\u8eab\u4ee3\u91d1\u8981\u6c42\u984d\u306f\u300125,000\u30c9\u30eb\u304b\u30891,700\u4e07\u30c9\u30eb\u306e\u9593\uff08\u65e5\u672c\u5186\u3067273\u4e07\u5186\u304b\u308918\u51046\u5343\u4e07\u5186\uff09\u3067\u3059\u30022020\u5e74\u306b\u652f\u6255\u308f\u308c\u305f\u8eab\u4ee3\u91d1\u306e\u5e73\u5747\u984d\u306f\u901a\u5e38\u30d3\u30c3\u30c8\u30b3\u30a4\u30f3\u652f\u6255\u3044\u3067276,587.41\u30c9\u30eb\uff08\u65e5\u672c\u5186\u30673020\u4e07\u5186\uff09\u306b\u9054\u3057\u3066\u3044\u307e\u3057\u305f\u3002<\/p>\n<p>DoppelPaymer\u306e\u88ab\u5bb3\u8005\u5b66\u306e\u8a73\u7d30\u306b\u3064\u3044\u3066\u306f\u3001<a href=\"https:\/\/start.paloaltonetworks.com\/unit-42-ransomware-threat-report\">2021 Unit 42\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u30ec\u30dd\u30fc\u30c8<\/a>\u3092\u53c2\u7167\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n<h3><a id=\"post-117552-_uvat2opjysat\"><\/a>\u884c\u52d5\u65b9\u91dd<\/h3>\n<p>\u3053\u306e\u30bb\u30af\u30b7\u30e7\u30f3\u3067\u306f\u3001DoppelPaymer\u306e\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u306b\u95a2\u9023\u3059\u308b\u6226\u8853\u3068\u624b\u6cd5\u3092\u6587\u66f8\u5316\u3057\u3001\u305d\u308c\u3089\u3092\u5f0a\u793e\u88fd\u54c1\u30fb\u30b5\u30fc\u30d3\u30b9\u306b\u76f4\u63a5\u30de\u30c3\u30d4\u30f3\u30b0\u3057\u307e\u3059\u3002\u307e\u305f\u3001\u304a\u5ba2\u69d8\u306b\u3066\u30c7\u30d0\u30a4\u30b9\u306e\u69cb\u6210\u304c\u6b63\u3057\u304f\u884c\u308f\u308c\u3066\u3044\u308b\u304b\u3069\u3046\u304b\u3092\u78ba\u8a8d\u3059\u308b\u65b9\u6cd5\u306b\u3064\u3044\u3066\u3082\u3054\u8aac\u660e\u3057\u307e\u3059\u3002<\/p>\n<table style=\"width: 98.2076%;\">\n<tbody>\n<tr>\n<td style=\"width: 15.5358%;\"><strong>\u88fd\u54c1\/\u30b5\u30fc\u30d3\u30b9<\/strong><\/td>\n<td style=\"width: 84.0837%; text-align: left;\"><strong>\u884c\u52d5\u65b9\u91dd<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 99.6195%; text-align: center;\" colspan=\"2\"><strong>\u521d\u671f\u30a2\u30af\u30bb\u30b9\u3001\u9632\u885b\u56de\u907f\u3001\u6c38\u7d9a\u6027\u3001 \u7279\u6a29\u6607\u683c<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 99.6195%; text-align: center;\" colspan=\"2\"><strong>Domain Accounts [T1078.002]\uff08\u30c9\u30e1\u30a4\u30f3\u30a2\u30ab\u30a6\u30f3\u30c8\uff09<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 15.5358%;\" rowspan=\"5\">NGFW<\/td>\n<td style=\"width: 84.0837%;\">User-ID\u304c\u5185\u90e8\u306e\u4fe1\u983c\u3067\u304d\u308b\u30a4\u30f3\u30bf\u30fc\u30d5\u30a7\u30fc\u30b9\u306b\u5bfe\u3057\u3066\u306e\u307f\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 84.0837%;\">User-ID\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u5834\u5408\u306f\u300c\u8a31\u53ef\/\u9664\u5916\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u300d\u304c\u4f7f\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 84.0837%;\">User-ID\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u5834\u5408\u306fUser-ID\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306b\u6700\u5c0f\u9650\u306e\u6a29\u9650\u3092\u8a2d\u5b9a\u3057\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 84.0837%;\">User-ID\u30b5\u30fc\u30d3\u30b9\u30a2\u30ab\u30a6\u30f3\u30c8\u306b\u5bfe\u8a71\u578b\u30ed\u30b0\u30aa\u30f3\u6a29\u9650\u304c\u306a\u3044\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 84.0837%;\">User-ID\u30b5\u30fc\u30d3\u30b9\u30a2\u30ab\u30a6\u30f3\u30c8\u306e\u30ea\u30e2\u30fc\u30c8\u30a2\u30af\u30bb\u30b9\u6a5f\u80fd\u304c\u7981\u6b62\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 15.5358%;\" rowspan=\"3\">\u8105\u5a01\u9632\u5fa1<em>\u2020<\/em><\/td>\n<td style=\"width: 84.0837%;\">imap\u3001pop3\u3092\u9664\u304f\u3059\u3079\u3066\u306e\u30c7\u30b3\u30fc\u30c0\u3067\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u30d6\u30ed\u30c3\u30af\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 84.0837%;\">\u30bb\u30ad\u30e5\u30a2\u306a\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u95a2\u9023\u3059\u308b\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u306b\u9069\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 84.0837%;\">\u3059\u3079\u3066\u306e\u30be\u30fc\u30f3\u306b\u3001\u5075\u5bdf\u884c\u70ba\u9632\u5fa1\u8a2d\u5b9a\u3092\u3059\u3079\u3066\u6709\u52b9\u5316\u3057\u3001\u8abf\u6574\u3057\u3001\u9069\u5207\u306a\u51e6\u7406\u3092\u8a2d\u5b9a\u3057\u305f\u30be\u30fc\u30f3\u30d7\u30ed\u30c6\u30af\u30b7\u30e7\u30f3\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u3042\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 15.5358%;\" rowspan=\"2\">Cortex XSOAR<\/td>\n<td style=\"width: 84.0837%;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Access Investigation Playbook<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 84.0837%;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Impossible Traveler<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 99.6195%; text-align: center;\" colspan=\"2\"><strong>\u6f0f\u51fa\u3001\u53ce\u96c6\u3001\u63a2\u7d22\u3001\u5f71\u97ff<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 99.6195%; text-align: center;\" colspan=\"2\"><strong>Automated Exfiltration [T1020]\uff08\u81ea\u52d5\u5316\u3055\u308c\u305f\u6f0f\u51fa\uff09\u3001<br \/>\nData from Local System [T1059.003]\uff08\u30ed\u30fc\u30ab\u30eb\u30b7\u30b9\u30c6\u30e0\u304b\u3089\u306e\u30c7\u30fc\u30bf\uff09\u3001<br \/>\nSystem Network Configuration Discovery [T1016]\uff08\u30b7\u30b9\u30c6\u30e0\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u69cb\u6210\u306e\u63a2\u7d22\uff09\u3001<br \/>\nInhibit System Recovery [T1490]\uff08\u30b7\u30b9\u30c6\u30e0\u306e\u5fa9\u5143\u7981\u6b62\uff09\u3001<br \/>\nData Encrypted for Impact [T1486]\uff08\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u305f\u3081\u306e\u30c7\u30fc\u30bf\u6697\u53f7\u5316\uff09<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 15.5358%;\" rowspan=\"2\">Cortex XDR<\/td>\n<td style=\"width: 84.0837%;\">\u30a2\u30f3\u30c1\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u30d7\u30ed\u30c6\u30af\u30b7\u30e7\u30f3\u3092\u6709\u52b9\u306b\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 84.0837%;\">\u30a2\u30f3\u30c1\u30de\u30eb\u30a6\u30a7\u30a2\u30d7\u30ed\u30c6\u30af\u30b7\u30e7\u30f3\u3092\u6709\u52b9\u306b\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 15.5358%;\" rowspan=\"6\">Cortex XSOAR<\/td>\n<td style=\"width: 84.0837%;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Block IP<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 84.0837%;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Block URL<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 84.0837%;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Hunting and Threat Detection Playbook<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 84.0837%;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 - PAN-OS Query Logs for Indicators<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 84.0837%;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 - Palo Alto Networks Endpoint Malware Investigation<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 84.0837%;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Ransomware Manual for incident response<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: center;\"><span style=\"font-size: 12pt;\"><sup><span style=\"color: #999999;\"><em>\u88681 DoppelPaymer\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u884c\u52d5\u65b9\u91dd<br \/>\n<\/em><\/span><\/sup><\/span><span style=\"font-size: 12pt;\"><sup><span style=\"color: #999999;\"><em>\u2020\u3053\u308c\u3089\u306e\u6a5f\u80fd\u306f\u3001NGFW\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30d6\u30b9\u30af\u30ea\u30d7\u30b7\u30e7\u30f3\u30b5\u30fc\u30d3\u30b9\u306e\u4e00\u90e8\u3067\u3059<\/em><\/span><\/sup><\/span><\/p>\n<h3><a id=\"post-117552-_d2e6iwkrpr2l\"><\/a>\u7d50\u8ad6<\/h3>\n<p>\u6b8b\u5ff5\u306a\u304c\u3089\u3001BitPaymer\u3001DoppelPaymer\u3001\u304a\u3088\u3073\u305d\u306e\u4ed6\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u306e\u985e\u4f3c\u70b9\u306f\u3001\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30a2\u30af\u30bf\u30fc\u304c\u4e92\u3044\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u304b\u3089\u8cb8\u3057\u501f\u308a\u3057\u3042\u3046\u3053\u3068\u304c\u5e38\u614b\u3068\u306a\u3063\u3066\u3044\u308b\u69d8\u5b50\u3092\u793a\u3057\u3066\u3044\u307e\u3059\u3002\u4ed6\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30a2\u30af\u30bf\u30fc\u540c\u69d8\u3001DoppelPaymer\u306e\u80cc\u5f8c\u306b\u3044\u308b\u30a2\u30af\u30bf\u30fc\u3082\u3001\u30a2\u30af\u30c6\u30a3\u30d6\u306a\u30bd\u30fc\u30b7\u30e3\u30eb\u30e1\u30c7\u30a3\u30a2\u306e\u5b58\u5728\u3068\u30ea\u30fc\u30af\u30b5\u30a4\u30c8\u3092\u7dad\u6301\u3057\u3064\u3064\u3001\u904e\u53bb\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u30b0\u30eb\u30fc\u30d7\u3068\u307b\u3068\u3093\u3069\u540c\u3058\u3088\u3046\u306b\u88ab\u5bb3\u8005\u304b\u3089\u306e\u8eab\u4ee3\u91d1\u306e\u5897\u984d\u3092\u6c42\u3081\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306fDoppelPaymer\u3092\u6b21\u306e\u65b9\u6cd5\u3067\u691c\u51fa\/\u9632\u6b62\u3057\u307e\u3059\u3002<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/products\/secure-the-network\/wildfire\">WildFire<\/a>: \u65e2\u77e5\u306e\u30b5\u30f3\u30d7\u30eb\u306f\u3059\u3079\u3066\u30de\u30eb\u30a6\u30a7\u30a2\u3068\u3057\u3066\u8b58\u5225\u3055\u308c\u307e\u3059\u3002<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/cortex\/cortex-xdr\">Cortex XDR<\/a>:\n<ul>\n<li>DoppelPaymer\u306e\u30a4\u30f3\u30b8\u30b1\u30fc\u30bf\u3092\u542b\u307f\u307e\u3059\u3002<\/li>\n<li>\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u5bfe\u7b56\u30e2\u30b8\u30e5\u30fc\u30eb\u3067DoppelPaymer\u306e\u6697\u53f7\u5316\u306e\u632f\u308b\u821e\u3044\u3092\u691c\u51fa\u3057\u307e\u3059\u3002<\/li>\n<li>\u30ed\u30fc\u30ab\u30eb\u5206\u6790\u30fb\u691c\u51fa\u6a5f\u80fd\u306b\u3088\u308aDoppelPaymer\u30d0\u30a4\u30ca\u30ea\u3092\u691c\u51fa\u3057\u307e\u3059\u3002<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/network-security\/next-generation-firewall\">\u6b21\u4e16\u4ee3\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb<\/a>: DNS\u30b7\u30b0\u30cd\u30c1\u30e3\u304c\u65e2\u77e5\u306e\u30b3\u30de\u30f3\u30c9&amp;\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\uff08C2\uff09\u30c9\u30e1\u30a4\u30f3\u3092\u691c\u51fa\u3057\u3001<a href=\"https:\/\/www.paloaltonetworks.jp\/products\/threat-detection-and-prevention\/web-security\">URL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0<\/a>\u3067\u540c\u30c9\u30e1\u30a4\u30f3\u3092\u30de\u30eb\u30a6\u30a7\u30a2\u3068\u3057\u3066\u5206\u985e\u3057\u307e\u3059\u3002<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/cortex\/autofocus\">AutoFocus<\/a>: \u95a2\u9023\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u3092<a href=\"https:\/\/autofocus.paloaltonetworks.com\/#\/tag\/Unit42.BitPaymerFamily\">BitPaymerFamily<\/a>\u30bf\u30b0\u3067\u8ffd\u8de1\u3057\u307e\u3059\u3002<\/li>\n<\/ul>\n<p>DoppelPaymer \u306b\u95a2\u9023\u3059\u308b\u6307\u6a19\u306f\u3001\u3053\u3061\u3089\u306e<a href=\"https:\/\/github.com\/pan-unit42\/iocs\/blob\/master\/DoppelPaymer\">GitHub<\/a>\u304b\u3089\u5229\u7528\u53ef\u80fd\u3067\u3059\u3002Unit 42\u306eTAXII<a href=\"https:\/\/github.com\/pan-unit42\/iocs\/tree\/master\/stix2-reports\/report_json\">\u30d5\u30a3\u30fc\u30c9<\/a>\u306b\u3082\u516c\u958b\u6e08\u307f\u3067\u3059\u3002<\/p>\n<h3><a id=\"post-117552-_8r8nmjcrq037\"><\/a>\u8ffd\u52a0\u8cc7\u6599<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.crowdstrike.com\/blog\/doppelpaymer-ransomware-and-dridex-2\/\">BitPaymer Source Code Fork: Meet DoppelPaymer Ransomware and Dridex 2.0<\/a><\/li>\n<li><a href=\"https:\/\/success.trendmicro.com\/solution\/000261855\">BitPaymer Malware Information<\/a><\/li>\n<\/ul>\n<p><strong><em>\u7d9a\u304d\u3092\u8aad\u3080: <a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/5\">Phobos<\/a><\/em><\/strong><\/p>\n<p><strong><em><a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/\">\u30c8\u30c3\u30d7\u306b\u623b\u308b<\/a><\/em><\/strong><\/p>\n<p><!--nextpage--><\/p>\n<h2><a id=\"post-117552-_r8nej8tuasy8\"><\/a><em>\u8105\u5a01\u306e\u8a55\u4fa1\uff1aPhobos\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2<\/em><\/h2>\n<h3><a id=\"post-117552-_ahdkpjsksr2v\"><\/a>\u6982\u8981<\/h3>\n<p>Phobos\u306f\u3001\u6bd4\u8f03\u7684\u30d9\u30fc\u30b7\u30c3\u30af\u304b\u3064\u591a\u4f5c\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u3067\u3001<a href=\"https:\/\/www.bleepingcomputer.com\/forums\/t\/688649\/phobos-ransomware-id-idemailphobos-adame-help-support\/\">2018\u5e7412\u6708<\/a>\u306b\u6700\u521d\u306b\u516c\u306b\u7279\u5b9a\u3055\u308c\u307e\u3057\u305f\u3002\u305d\u306e\u57fa\u672c\u8a2d\u8a08\u3068\u5b9f\u88c5\u306b\u3088\u308a\u3001Phobos\u306f\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306e\u9593\u3067\u5909\u308f\u3089\u305a\u4eba\u6c17\u304c\u3042\u308a\u307e\u3059\u3002Phobos\u306f\u78ba\u7acb\u3055\u308c\u305f\u611f\u67d3\u30d9\u30af\u30c8\u30eb\u3092\u4f7f\u7528\u3057\u307e\u3059\u3002\u305f\u3068\u3048\u3070\u30cf\u30c3\u30ad\u30f3\u30b0\u3092\u53d7\u3051\u305f\u304b\u3001\u8ca9\u58f2\u3055\u308c\u3066\u3044\u308b\u304b\u3001\u5b89\u5168\u3067\u306a\u3044\u304b\u3001\u3042\u308b\u3044\u306f\u305d\u306e\u4ed6\u306e\u8106\u5f31\u6027\u306e\u3042\u308b\u30ea\u30e2\u30fc\u30c8\u30c7\u30b9\u30af\u30c8\u30c3\u30d7\u30d7\u30ed\u30c8\u30b3\u30eb\uff08RDP\uff09\u63a5\u7d9a\u3092\u5229\u7528\u3057\u305f\u308a\u3001\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30e1\u30fc\u30eb\u306e\u60aa\u610f\u306e\u3042\u308b\u6dfb\u4ed8\u30d5\u30a1\u30a4\u30eb\u3092\u4f7f\u3063\u305f\u308a\u3057\u307e\u3059\u3002Phobos\u306f\u4ed6\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea<a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/05\/threat-spotlight-crysis-aka-dharma-ransomware-causing-a-crisis-for-businesses\/\">Dharma<\/a>\u3068\u975e\u5e38\u306b\u3088\u304f\u4f3c\u3066\u3044\u3066\u3001\u3053\u306e\u4e9c\u7a2e\u3068\u898b\u306a\u3055\u308c\u3066\u3044\u307e\u3059\u3002Dharma\u3068\u5171\u6709\u3057\u3066\u3044\u308b\u30b3\u30fc\u30c9\u306e\u985e\u4f3c\u6027\u306b\u52a0\u3048\u3001Phobos\u306f\u305d\u306e\u4e00\u90e8\u304c<a href=\"https:\/\/www.zdnet.com\/article\/new-phobos-ransomware-exploits-weak-security-to-hit-targets-around-the-world\/\">Dharma<\/a>\u3092\u914d\u5e03\u3057\u305f\u306e\u3068\u540c\u3058\u30a2\u30af\u30bf\u30fc\u30b0\u30eb\u30fc\u30d7\u306b\u3088\u308a\u914d\u5e03\u3055\u308c\u3066\u3044\u308b\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<h3><a id=\"post-117552-_7b6jsjw2xubg\"><\/a>Phobos\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u6982\u8981<\/h3>\n<p><img  class=\"alignnone size-full wp-image-117645 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2021\/03\/Ransomware-series-21-illustration_Phobos.png\" alt=\"Conceptual image representing Phobos ransomware as part of the ransomware threat assessments companion to the 2021 Unit 42 Ransomware Threat Report. \" width=\"1587\" height=\"850\" \/><\/p>\n<p>Phobos\u306f\u6280\u8853\u9762\u3067\u306f\u6bd4\u8f03\u7684\u30d9\u30fc\u30b7\u30c3\u30af\u3067\u3059\u304c\u3001\u3053\u308c\u3092\u8208\u5473\u6df1\u3044\u3082\u306e\u306b\u3059\u308b\u6ce8\u76ee\u3059\u3079\u304d\u6a5f\u80fd\u304c\u3044\u304f\u3064\u304b\u3042\u3052\u3089\u308c\u307e\u3059\u3002Phobos\u306e\u6607\u683c\u4e71\u7528\u624b\u6cd5\u306b\u30e6\u30fc\u30b6\u30fc\u30a2\u30ab\u30a6\u30f3\u30c8\u5236\u5fa1\uff08UAC\uff09\u30d0\u30a4\u30d1\u30b9\u306f\u76f4\u63a5\u542b\u307e\u308c\u3066\u3044\u307e\u305b\u3093\u304c\u3001UAC\u30d0\u30a4\u30d1\u30b9\u306e\u78ba\u8a8d\u304c\u5b9a\u671f\u7684\u306b\u30dd\u30c3\u30d7\u30a2\u30c3\u30d7\u8868\u793a\u3055\u308c\u307e\u3059\u3002<\/p>\n<p>\u30dd\u30c3\u30d7\u30a2\u30c3\u30d7\u3092\u53d7\u3051\u5165\u308c\u3001AES-256\u30ad\u30fc\u3092\u4f7f\u7528\u3057\u305f\u6697\u53f7\u5316\u30d7\u30ed\u30bb\u30b9\u304c\u5b8c\u4e86\u3059\u308b\u3068\u3001\u611f\u67d3\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u4e0a\u306binfo[.]txt\u306e\u30d5\u30a1\u30a4\u30eb\u540d\u3067.HTA\u304a\u3088\u3073.TXT\u306e\u8eab\u4ee3\u91d1\u30e1\u30e2\u304c\u8868\u793a\u3055\u308c\u307e\u3059\u3002Phobos\u306f\u5f15\u304d\u7d9a\u304d\u30d0\u30c3\u30af\u30b0\u30e9\u30a6\u30f3\u30c9\u3067\u5b9f\u884c\u3055\u308c\u3001\u30b3\u30fc\u30c9\u304c\u6697\u53f7\u5316\u3059\u308b\u3088\u3046\u306b\u6307\u793a\u3055\u308c\u305f\u65b0\u3057\u3044\u30d5\u30a1\u30a4\u30eb\u3092\u30a8\u30f3\u30b3\u30fc\u30c9\u3057\u307e\u3059\u3002<\/p>\n<figure id=\"attachment_117593\" aria-describedby=\"caption-attachment-117593\" style=\"width: 860px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-117594 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2021\/03\/word-image-79.png\" alt=\"\u56f31 Phobos\u304c\u88ab\u5bb3\u7aef\u672b\u3092\u611f\u67d3\u3055\u305b\u305f\u5f8c\u3067\u8868\u793a\u3059\u308b\u8eab\u4ee3\u91d1\u30da\u30fc\u30b8\uff08\u51fa\u5178\uff1aCoveware\uff09\" width=\"860\" height=\"520\" \/><figcaption id=\"caption-attachment-117593\" class=\"wp-caption-text\">\u56f31 Phobos\u304c\u88ab\u5bb3\u7aef\u672b\u3092\u611f\u67d3\u3055\u305b\u305f\u5f8c\u3067\u8868\u793a\u3059\u308b\u8eab\u4ee3\u91d1\u30da\u30fc\u30b8\uff08\u51fa\u5178\uff1aCoveware\uff09<\/figcaption><\/figure>\n<p>Phobos\u306f\u3001\u611f\u67d3\u30db\u30b9\u30c8\u306b\u63a5\u7d9a\u3055\u308c\u3066\u3044\u308b\u3059\u3079\u3066\u306e\u30ed\u30fc\u30ab\u30eb\u5171\u6709\u3068\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u5171\u6709\u306b\u8eab\u4ee3\u91d1\u3092\u8981\u6c42\u3057\u3088\u3046\u3068\u3057\u307e\u3059\u3002\u611f\u67d3\u3057\u305f\u5404\u30d5\u30a1\u30a4\u30eb\u306f\u500b\u5225\u306e\u30ad\u30fc\u3067\u6697\u53f7\u5316\u3055\u308c\u3001\u6697\u53f7\u5316\u3055\u308c\u305f\u30d5\u30a1\u30a4\u30eb\u306e\u62e1\u5f35\u5b50\u306f.acute\u3067\u3059\u3002Phobos\u306e\u6c38\u7d9a\u5316\u30e1\u30ab\u30cb\u30ba\u30e0\u306b\u306f\u3001\uff05APPDATA\uff05\u3078\u306e\u81ea\u8eab\u306e\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3001\u81ea\u52d5\u8d77\u52d5\u3078\u306e\u30ec\u30b8\u30b9\u30c8\u30ea\u30ad\u30fc\u306e\u8ffd\u52a0\u304c\u542b\u307e\u308c\u3001\u518d\u8d77\u52d5\u5f8c\u3082\u30de\u30eb\u30a6\u30a7\u30a2\u30d7\u30ed\u30bb\u30b9\u304c\u6c38\u7d9a\u5316\u3055\u308c\u308b\u3088\u3046\u306b\u3057\u307e\u3059\u3002\u305d\u306e\u6a5f\u80fd\u306e\u8208\u5473\u6df1\u3044\u90e8\u5206\u306e1\u3064\u306f\u3001\u5927\u304d\u306a\u30d5\u30a1\u30a4\u30eb\u306b\u4f7f\u7528\u3055\u308c\u308b\u3055\u307e\u3056\u307e\u306a\u30d5\u30a1\u30a4\u30eb\u30a8\u30f3\u30b3\u30fc\u30c7\u30a3\u30f3\u30b0\u624b\u6cd5\u3067\u3059\u3002Phobos\u306f\u5927\u304d\u306a\u30d5\u30a1\u30a4\u30eb\u306e\u7279\u5b9a\u306e\u90e8\u5206\u306e\u307f\u3092\u6697\u53f7\u5316\u3059\u308b\u305f\u3081\u3001\u5927\u304d\u306a\u30d5\u30a1\u30a4\u30eb\u306e\u6697\u53f7\u5316\u306b\u304b\u304b\u308b\u6642\u9593\u304c\u77ed\u7e2e\u3055\u308c\u307e\u3059\u3002<\/p>\n<p>Phobos\u306f\u30012020\u5e7410\u6708\u306b\u767a\u898b\u3055\u308c\u305f<a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/deep-analysis-the-eking-variant-of-phobos-ransomware\">Eking\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2<\/a>\u306e\u3088\u3046\u306a\u5f8c\u306e\u4e9c\u7a2e\u306e\u57fa\u76e4\u306e\u5f79\u5272\u3092\u679c\u305f\u3057\u3066\u304d\u307e\u3057\u305f\u3002<\/p>\n<p>Phobos\u306f\u3001\u307b\u3068\u3093\u3069\u306e\u5834\u5408\u3001\u30a2\u30f3\u30c0\u30fc\u30b0\u30e9\u30a6\u30f3\u30c9\u306e\u30b5\u30fc\u30d3\u30b9\u3068\u3057\u3066\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\uff08RaaS\uff09\u88fd\u54c1\u3067\u8ca9\u58f2\u3055\u308c\u3066\u3044\u307e\u3059\u3002Phobos\u306f\u3053\u308c\u307e\u3067\u3055\u307e\u3056\u307e\u306a\u898f\u6a21\u306e\u7d44\u7e54\u3092\u6a19\u7684\u306b\u3057\u3066\u304d\u307e\u3057\u305f\u304c\u3001\u4e00\u90e8\u306e\u5b64\u767a\u4f8b\u3067\u306f\u500b\u4eba\u306b\u3082\u611f\u67d3\u3057\u3066\u3044\u307e\u3057\u305f\u3002Phobos\u306e\u7dcf\u88ab\u5bb3\u8005\u6570\u306f\u3044\u307e\u306e\u3068\u3053\u308d\u4e0d\u660e\u306e\u307e\u307e\u3067\u3059\u3002<\/p>\n<figure id=\"attachment_117595\" aria-describedby=\"caption-attachment-117595\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-117596 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2021\/03\/word-image-80.png\" alt=\"\u56f32 \u4eba\u6c17\u306e\u30a2\u30f3\u30c0\u30fc\u30b0\u30e9\u30a6\u30f3\u30c9\u30d5\u30a9\u30fc\u30e9\u30e0\u306ePhobos\u306e\u6295\u7a3f\" width=\"900\" height=\"346\" \/><figcaption id=\"caption-attachment-117595\" class=\"wp-caption-text\">\u56f32 \u4eba\u6c17\u306e\u30a2\u30f3\u30c0\u30fc\u30b0\u30e9\u30a6\u30f3\u30c9\u30d5\u30a9\u30fc\u30e9\u30e0\u306ePhobos\u306e\u6295\u7a3f<\/figcaption><\/figure>\n<p>Phobos\u3068Dharma\u306f\u3001\u4e00\u90e8\u3001\u30a2\u30af\u30bf\u30fc\u3068\u30b3\u30fc\u30c9\u306e\u985e\u4f3c\u70b9\u3092\u5171\u6709\u3057\u3066\u3044\u307e\u3059\u3002\u4e21\u30d5\u30a1\u30df\u30ea\u306f\u611f\u67d3\u5f8c\u306e\u8eab\u4ee3\u91d1\u30e1\u30e2\u304c\u540c\u3058\u3067\u3059\u3002\u3055\u3089\u306b\u88ab\u5bb3\u8005\u304b\u3089\u4e21\u30a2\u30af\u30bf\u30fc\u3078\u306e\u6700\u521d\u306e\u901a\u4fe1\u304c\u540c\u3058\u3067\u3059\u3002\u3053\u308c\u3089\u306e\u5171\u6709\u3055\u308c\u305f\u6a5f\u80fd\u306f\u3001Dharma\u3068Phobos\u304c\u6301\u3064\u30b3\u30fc\u30c7\u30a3\u30f3\u30b0\u306e\u985e\u4f3c\u6027\u3068\u3068\u3082\u306b\u3001\u3053\u306e\u30de\u30eb\u30a6\u30a7\u30a2\u304c\u540c\u3058\u30a2\u30af\u30bf\u30fc\u306b\u3088\u3063\u3066\u958b\u767a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u793a\u5506\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u305f\u3060\u3057\u3001\u7279\u306b\u30d5\u30a1\u30a4\u30eb\u69cb\u9020\u306e\u30b3\u30fc\u30c9\u306e\u9055\u3044\u306b\u3088\u308a\u3001\u3053\u308c\u306f\u4e9c\u7a2e\u3068\u5b9a\u7fa9\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u5177\u4f53\u7684\u306b\u306f\u3001\u30e2\u30b8\u30e5\u30e9\u30fc\u69cb\u6210\u306e\u30b5\u30dd\u30fc\u30c8\u3092\u8ffd\u52a0\u3057\u3066\u3044\u308b\u3001\u5bfe\u8c61\u30d5\u30a9\u30eb\u30c0\u3092\u624b\u52d5\u3067\u6697\u53f7\u5316\u3059\u308b\u6a5f\u80fd\u3092\u63d0\u4f9b\u3057\u3066\u3044\u308b\u306a\u3069\u3001Phobos\u306b\u306f\u3044\u304f\u3064\u304b\u306e\u9855\u8457\u306a\u9055\u3044\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<p>Phobos\u306e2020\u5e74\u306e\u5e73\u5747\u8eab\u4ee3\u91d1\u652f\u6255\u3044\u984d\u306f13,955\u30c9\u30eb\uff08\u65e5\u672c\u5186\u3067152\u4e07\u5186\uff09\u3067\u3057\u305f\u3002\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306f\u3001\u91d1\u878d\u3001\u6559\u80b2\u3001\u88fd\u9020\u3001\u5c02\u9580\u7684\u304a\u3088\u3073\u6cd5\u52d9\u30b5\u30fc\u30d3\u30b9\u3001\u4fdd\u967a\u3001\u30cf\u30a4\u30c6\u30af\u3001\u5efa\u8a2d\u304a\u3088\u3073\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u3001\u30d8\u30eb\u30b9\u30b1\u30a2\u3001\u30a8\u30cd\u30eb\u30ae\u30fc\u306e\u5404\u30bb\u30af\u30bf\u3067\u88ab\u5bb3\u8005\u3078\u306e\u653b\u6483\u3092\u89b3\u6e2c\u3057\u307e\u3057\u305f\u3002Dharma\u540c\u69d8\u3001\u8105\u5a01\u306e\u30a2\u30af\u30bf\u30fc\u306f\u4e2d\u5c0f\u4f01\u696d\u306b\u7126\u70b9\u3092\u5f53\u3066\u3066\u3044\u307e\u3059\u3002Phobos\u306e\u88ab\u5bb3\u8005\u306e\u6240\u5728\u5730\u306f\u3001\u7c73\u56fd\u3001\u30dd\u30eb\u30c8\u30ac\u30eb\u3001\u30d6\u30e9\u30b8\u30eb\u3001\u30bb\u30a4\u30b7\u30a7\u30eb\u3001\u30eb\u30fc\u30de\u30cb\u30a2\u3001\u30a4\u30f3\u30c9\u30cd\u30b7\u30a2\u3001\u30c9\u30a4\u30c4\u3001\u65e5\u672c\u306a\u3069\u3067\u3059\u3002<\/p>\n<p>Phobos\u306e\u88ab\u5bb3\u8005\u5b66\u306e\u8a73\u7d30\u306b\u3064\u3044\u3066\u306f\u3001<a href=\"https:\/\/start.paloaltonetworks.com\/unit-42-ransomware-threat-report\">2021 Unit 42\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u30ec\u30dd\u30fc\u30c8<\/a>\u3092\u53c2\u7167\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n<h3><a id=\"post-117552-_gggrm0nm38ze\"><\/a>\u884c\u52d5\u65b9\u91dd<\/h3>\n<p>\u3053\u306e\u30bb\u30af\u30b7\u30e7\u30f3\u3067\u306f\u3001Phobos\u306e\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u306b\u95a2\u9023\u3059\u308b\u6226\u8853\u3068\u624b\u6cd5\u3092\u6587\u66f8\u5316\u3057\u3001\u305d\u308c\u3089\u3092\u5f0a\u793e\u88fd\u54c1\u30fb\u30b5\u30fc\u30d3\u30b9\u306b\u76f4\u63a5\u30de\u30c3\u30d4\u30f3\u30b0\u3057\u307e\u3059\u3002\u307e\u305f\u3001\u304a\u5ba2\u69d8\u306b\u3066\u30c7\u30d0\u30a4\u30b9\u306e\u69cb\u6210\u304c\u6b63\u3057\u304f\u884c\u308f\u308c\u3066\u3044\u308b\u304b\u3069\u3046\u304b\u3092\u78ba\u8a8d\u3059\u308b\u65b9\u6cd5\u306b\u3064\u3044\u3066\u3082\u3054\u8aac\u660e\u3057\u307e\u3059\u3002<\/p>\n<table style=\"width: 100.3%; height: 888px;\">\n<tbody>\n<tr style=\"height: 24px;\">\n<td style=\"width: 20.2282%; height: 24px;\"><strong>\u88fd\u54c1\/\u30b5\u30fc\u30d3\u30b9<\/strong><\/td>\n<td style=\"width: 145.954%; text-align: left; height: 24px;\"><strong>\u884c\u52d5\u65b9\u91dd<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 166.182%; text-align: center; height: 24px;\" colspan=\"2\"><strong>\u5b9f\u884c<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 166.182%; text-align: center; height: 24px;\" colspan=\"2\"><strong>Windows Management Instrumentation [T1047]\uff08WMI\uff09<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 20.2282%; height: 216px;\" rowspan=\"9\">NGFW<\/td>\n<td style=\"width: 145.954%; height: 24px;\">User-ID\u304c\u5185\u90e8\u306e\u4fe1\u983c\u3067\u304d\u308b\u30a4\u30f3\u30bf\u30fc\u30d5\u30a7\u30fc\u30b9\u306b\u5bfe\u3057\u3066\u306e\u307f\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 145.954%; height: 24px;\">User-ID\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u5834\u5408\u306f\u300c\u8a31\u53ef\/\u9664\u5916\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u300d\u304c\u4f7f\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 145.954%; height: 24px;\">User-ID\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u5834\u5408\u306fUser-ID\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306b\u6700\u5c0f\u9650\u306e\u6a29\u9650\u3092\u8a2d\u5b9a\u3057\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 145.954%; height: 24px;\">User-ID\u30b5\u30fc\u30d3\u30b9\u30a2\u30ab\u30a6\u30f3\u30c8\u306b\u5bfe\u8a71\u578b\u30ed\u30b0\u30aa\u30f3\u6a29\u9650\u304c\u306a\u3044\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 145.954%; height: 24px;\">User-ID\u30b5\u30fc\u30d3\u30b9\u30a2\u30ab\u30a6\u30f3\u30c8\u306e\u30ea\u30e2\u30fc\u30c8\u30a2\u30af\u30bb\u30b9\u6a5f\u80fd\u304c\u7981\u6b62\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 145.954%; height: 24px;\">User-ID\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u304cuntrust\u30be\u30fc\u30f3\u306b\u5165\u308b\u306e\u3092\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3067\u5236\u9650\u3057\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 145.954%; height: 24px;\">untrust\u30be\u30fc\u30f3\u304b\u3089\u3088\u308a\u4fe1\u983c\u3067\u304d\u308btrust\u30be\u30fc\u30f3\u3078\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u5834\u5408\u306f\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u304c\u5b58\u5728\u3059\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 145.954%; height: 24px;\">\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3067\u30b5\u30fc\u30d3\u30b9\u306b\u300cany\u300d\u304c\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3082\u306e\u304c\u306a\u3044\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 145.954%; height: 24px;\">\u4fe1\u983c\u3055\u308c\u305f\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u30bd\u30fc\u30b9\u306eIP\u30a2\u30c9\u30ec\u30b9\u3068\u306e\u9593\u306e\u3059\u3079\u3066\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u62d2\u5426\u3059\u308b\u300c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u300d\u304c\u5b58\u5728\u3059\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 20.2282%; height: 24px;\">Cortex XDR Prevent<\/td>\n<td style=\"width: 145.954%; height: 24px;\">Restriction\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3092\u69cb\u6210\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 166.182%; text-align: center; height: 24px;\" colspan=\"2\"><strong>\u9632\u885b\u56de\u907f\u3001\u6c38\u7d9a\u6027<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 72px;\">\n<td style=\"width: 166.182%; text-align: center; height: 72px;\" colspan=\"2\"><strong>Masquerading [T1036]\uff08\u30de\u30b9\u30ab\u30ec\u30fc\u30c9\uff09\u3001<br \/>\nModify Registry [T1112]\uff08\u30ec\u30b8\u30b9\u30c8\u30ea\u306e\u5909\u66f4\uff09\u3001<br \/>\nRegistry Run Keys \/ Startup Folder [T1547.001]\uff08\u30ec\u30b8\u30b9\u30c8\u30eaRun Keys\/\u30b9\u30bf\u30fc\u30c8\u30a2\u30c3\u30d7\u30d5\u30a9\u30eb\u30c0\u30fc\uff09<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 20.2282%; height: 48px;\" rowspan=\"2\">\u8105\u5a01\u9632\u5fa1<em>\u2020<\/em><\/td>\n<td style=\"width: 145.954%; height: 24px;\">imap\u3001pop3\u3092\u9664\u304f\u3059\u3079\u3066\u306e\u30c7\u30b3\u30fc\u30c0\u3067\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u30d6\u30ed\u30c3\u30af\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 145.954%; height: 24px;\">\u30bb\u30ad\u30e5\u30a2\u306a\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u95a2\u9023\u3059\u308b\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u306b\u9069\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 20.2282%; height: 168px;\" rowspan=\"7\">WildFire<\/td>\n<td style=\"width: 145.954%; height: 24px;\">WildFire\u30d5\u30a1\u30a4\u30eb\u30b5\u30a4\u30ba\u306e\u30a2\u30c3\u30d7\u30ed\u30fc\u30c9\u5236\u9650\u304c\u6700\u5927\u5316\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 145.954%; height: 24px;\">WildFire\u30d5\u30a1\u30a4\u30eb\u30d6\u30ed\u30c3\u30af\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u306e\u3059\u3079\u3066\u306e\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3001\u30d5\u30a1\u30a4\u30eb\u30bf\u30a4\u30d7\u306b\u3064\u3044\u3066\u3001\u8ee2\u9001\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 145.954%; height: 24px;\">\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3067WildFire\u5206\u6790\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 145.954%; height: 24px;\">\u5fa9\u53f7\u3057\u305f\u30b3\u30f3\u30c6\u30f3\u30c4\u306eWildFire\u3078\u306e\u8ee2\u9001\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 145.954%; height: 24px;\">\u3059\u3079\u3066\u306eWildFire\u30bb\u30c3\u30b7\u30e7\u30f3\u60c5\u5831\u8a2d\u5b9a\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 145.954%; height: 24px;\">WildFire\u306b\u3088\u3063\u3066\u691c\u51fa\u3055\u308c\u305f\u60aa\u610f\u306e\u3042\u308b\u30d5\u30a1\u30a4\u30eb\u306b\u5bfe\u3059\u308b\u30a2\u30e9\u30fc\u30c8\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 145.954%; height: 24px;\">\u300cWildFire\u306e\u66f4\u65b0\u30b9\u30b1\u30b8\u30e5\u30fc\u30eb\u300d\u304c\u6bce\u5206\u3054\u3068\u306b\u66f4\u65b0\u3092\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3066\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b\u3088\u3046\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 20.2282%; height: 72px;\" rowspan=\"3\">Cortex XDR Prevent<\/td>\n<td style=\"width: 145.954%; height: 24px;\">\u30de\u30eb\u30a6\u30a7\u30a2\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3067Behavioral Threat Protection\uff08BTP\uff09\u3092\u8a2d\u5b9a\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 145.954%; height: 24px;\">\u30a2\u30f3\u30c1\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u30d7\u30ed\u30c6\u30af\u30b7\u30e7\u30f3\u3092\u6709\u52b9\u306b\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 145.954%; height: 24px;\">\u30a2\u30f3\u30c1\u30de\u30eb\u30a6\u30a7\u30a2\u30d7\u30ed\u30c6\u30af\u30b7\u30e7\u30f3\u3092\u6709\u52b9\u306b\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 166.182%; text-align: center; height: 24px;\" colspan=\"2\"><strong>\u6a2a\u5c55\u958b<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 166.182%; text-align: center; height: 24px;\" colspan=\"2\"><strong>Replication Through Removable Media [T1091]\uff08\u30ea\u30e0\u30fc\u30d0\u30d6\u30eb\u30e1\u30c7\u30a3\u30a2\u7d4c\u7531\u306e\u8907\u88fd\uff09<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 20.2282%; height: 24px;\">Cortex XDR Prevent<\/td>\n<td style=\"width: 145.954%; height: 24px;\">\u30c7\u30d0\u30a4\u30b9\u5236\u5fa1\u3092\u6709\u52b9\u306b\u3059\u308b<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 166.182%; height: 24px;\" colspan=\"2\"><strong>\u5f71\u97ff<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"width: 166.182%; text-align: center; height: 48px;\" colspan=\"2\"><strong>Inhibit System Recovery [T1490]\uff08\u30b7\u30b9\u30c6\u30e0\u306e\u5fa9\u5143\u7981\u6b62\uff09\u3001<br \/>\nData Encrypted for Impact [T1486]\uff08\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u305f\u3081\u306e\u30c7\u30fc\u30bf\u6697\u53f7\u5316\uff09<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 20.2282%; height: 48px;\" rowspan=\"2\">Cortex XSOAR<\/td>\n<td style=\"width: 145.954%; height: 24px;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 - Palo Alto Networks Endpoint Malware Investigation<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 145.954%; height: 24px;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Ransomware Manual for incident response<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: center;\"><span style=\"font-size: 12pt;\"><sup><span style=\"color: #999999;\"><em>\u88681 Phobos\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u884c\u52d5\u65b9\u91dd<br \/>\n<\/em><\/span><\/sup><\/span><span style=\"font-size: 12pt;\"><sup><span style=\"color: #999999;\"><em>\u2020\u3053\u308c\u3089\u306e\u6a5f\u80fd\u306f\u3001NGFW\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30d6\u30b9\u30af\u30ea\u30d7\u30b7\u30e7\u30f3\u30b5\u30fc\u30d3\u30b9\u306e\u4e00\u90e8\u3067\u3059<\/em><\/span><\/sup><\/span><\/p>\n<h3><a id=\"post-117552-_ylkmfnvzgwna\"><\/a>\u7d50\u8ad6<\/h3>\n<p>Phobos\u306f\u3001Unit42\u304c\u3053\u308c\u307e\u3067\u89b3\u6e2c\u30fb\u5206\u6790\u3057\u3066\u304d\u305f\u4ed6\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u3068\u3088\u304f\u4f3c\u3066\u3044\u307e\u3059\u3002RaaS\u7279\u6709\u306e\u4f7f\u3044\u3084\u3059\u3055\u304b\u3089\u3001Phobos\u3092\u914d\u5e03\u3059\u308b\u30a2\u30af\u30bf\u30fc\u50cf\u306f\u591a\u7a2e\u591a\u69d8\u3067\u3059\u3002\u30de\u30eb\u30a6\u30a7\u30a2\u4f5c\u6210\u8005\u3068\u30b3\u30fc\u30c9\u518d\u5229\u7528\u306e\u985e\u4f3c\u6027\u306f\u3001Phobos\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u306b\u5171\u901a\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u306f\u3001\u5171\u6709\u3068\u5171\u901a\u306eRaaS\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u30e2\u30c7\u30eb\u306e\u4e0a\u306b\u7e41\u6804\u3057\u3001\u9032\u5316\u3092\u7d9a\u3051\u308b\u8105\u5a01\u30a8\u30b3\u30b7\u30b9\u30c6\u30e0\u3092\u8868\u3059\u3082\u306e\u3067\u3001\u3053\u306e\u304a\u304b\u3052\u3067\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30a2\u30af\u30bf\u30fc\u306f\u6700\u5c0f\u9650\u306e\u6642\u9593\u6295\u8cc7\u3067\u5229\u76ca\u3092\u3042\u3052\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/p>\n<p>\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306fPhobos\u3092\u6b21\u306e\u65b9\u6cd5\u3067\u691c\u51fa\/\u9632\u6b62\u3057\u307e\u3059\u3002<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/products\/secure-the-network\/wildfire\">WildFire<\/a>: \u65e2\u77e5\u306e\u30b5\u30f3\u30d7\u30eb\u306f\u3059\u3079\u3066\u30de\u30eb\u30a6\u30a7\u30a2\u3068\u3057\u3066\u8b58\u5225\u3055\u308c\u307e\u3059\u3002<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/cortex\/cortex-xdr\">Cortex XDR<\/a>:\n<ul>\n<li>Phobos\u306e\u30a4\u30f3\u30b8\u30b1\u30fc\u30bf\u3092\u542b\u307f\u307e\u3059\u3002<\/li>\n<li>\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u5bfe\u7b56\u30e2\u30b8\u30e5\u30fc\u30eb\u3067Phobos\u306e\u6697\u53f7\u5316\u306e\u632f\u308b\u821e\u3044\u3092\u691c\u51fa\u3057\u307e\u3059\u3002<\/li>\n<li>\u30ed\u30fc\u30ab\u30eb\u5206\u6790\u30fb\u691c\u51fa\u6a5f\u80fd\u306b\u3088\u308aPhobos\u30d0\u30a4\u30ca\u30ea\u3092\u691c\u51fa\u3057\u307e\u3059\u3002<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/network-security\/next-generation-firewall\">\u6b21\u4e16\u4ee3\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb<\/a>: DNS\u30b7\u30b0\u30cd\u30c1\u30e3\u304c\u65e2\u77e5\u306e\u30b3\u30de\u30f3\u30c9&amp;\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\uff08C2\uff09\u30c9\u30e1\u30a4\u30f3\u3092\u691c\u51fa\u3057\u3001<a href=\"https:\/\/www.paloaltonetworks.jp\/products\/threat-detection-and-prevention\/web-security\">URL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0<\/a>\u3067\u540c\u30c9\u30e1\u30a4\u30f3\u3092\u30de\u30eb\u30a6\u30a7\u30a2\u3068\u3057\u3066\u5206\u985e\u3057\u307e\u3059\u3002<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/cortex\/autofocus\">AutoFocus<\/a>: \u95a2\u9023\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u3092 <a href=\"https:\/\/autofocus.paloaltonetworks.com\/#\/tag\/Unit42.Phobos\">Phobos<\/a>\u30bf\u30b0\u3067\u8ffd\u8de1\u3057\u307e\u3059\u3002<\/li>\n<\/ul>\n<p>Phobos \u306b\u95a2\u9023\u3059\u308b\u6307\u6a19\u306f\u3001\u3053\u3061\u3089\u306e<a href=\"https:\/\/github.com\/pan-unit42\/iocs\">GitHub<\/a>\u304b\u3089\u5229\u7528\u53ef\u80fd\u3067\u3059\u3002Unit 42\u306eTAXII<a href=\"https:\/\/github.com\/pan-unit42\/iocs\/tree\/master\/stix2-reports\/report_json\">\u30d5\u30a3\u30fc\u30c9<\/a>\u306b\u3082\u516c\u958b\u6e08\u307f\u3067\u3059\u3002<\/p>\n<h3><a id=\"post-117552-_9ayv891r2iuu\"><\/a>\u8ffd\u52a0\u8cc7\u6599<\/h3>\n<ul>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/07\/a-deep-dive-into-phobos-ransomware\/\">A deep dive into Phobos ransomware<\/a><\/li>\n<li><a href=\"https:\/\/www.coveware.com\/phobos-ransomware-payment\">Phobos Ransomware Recovery, Payment &amp; Decryption Statistics<\/a><\/li>\n<\/ul>\n<p><strong><em>\u7d9a\u304d\u3092\u8aad\u3080: <a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/6\">Dharma<\/a><\/em><\/strong><\/p>\n<p><strong><em><a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/\">\u30c8\u30c3\u30d7\u306b\u623b\u308b<\/a><\/em><\/strong><\/p>\n<p><!--nextpage--><\/p>\n<h2><a id=\"post-117552-_k2nmz6c8ec21\"><\/a><em>\u8105\u5a01\u306e\u8a55\u4fa1\uff1aDharma\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2<\/em><\/h2>\n<h3><a id=\"post-117552-_eiajr4cuhm1b\"><\/a>\u6982\u8981<\/h3>\n<p>Dharma\uff08\u307e\u305f\u306e\u540d\u3092CrySIS\u3001Wadhrama\uff09\u306f<a href=\"https:\/\/www.cyber.nj.gov\/threat-center\/threat-profiles\/ransomware-variants\/crysis-dharma\">2016\u5e74\u306b\u6700\u521d\u306b\u516c\u306b\u7279\u5b9a\u3055\u308c\u305f<\/a>\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u3067\u3059\u3002Dharma\u306f\u3001\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30e1\u30fc\u30eb\u306e\u60aa\u610f\u306e\u3042\u308b\u6dfb\u4ed8\u30d5\u30a1\u30a4\u30eb\u306a\u3069\u3001\u3044\u304f\u3064\u304b\u306e\u65b9\u6cd5\u3067\u7d44\u7e54\u306eWindows\u30db\u30b9\u30c8\u3092\u6a19\u7684\u306b\u3057\u307e\u3059\u3002Dharma\u306f2019\u5e74\u306b\u767a\u898b\u3055\u308c\u305f<a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/07\/a-deep-dive-into-phobos-ransomware\/\">Phobos<\/a>\u306e\u3088\u3046\u306a\u5f8c\u7d99\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u306e\u30b3\u30fc\u30c9\u30d9\u30fc\u30b9\u3068\u3057\u3066\u306e\u5f79\u5272\u3082\u679c\u305f\u3057\u3066\u3044\u307e\u3059\u3002\u307e\u305f\u3001Dharma\u306e\u80cc\u5f8c\u306b\u3044\u308b\u653b\u6483\u8005\u306f\u3001\u30a6\u30a4\u30eb\u30b9\u5bfe\u7b56\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306a\u3069\u3001\u6b63\u5f53\u306a\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30a4\u30f3\u30b9\u30c8\u30fc\u30e9\u306e\u3088\u3046\u306b\u898b\u3048\u308b\u507d\u88c5\u30a4\u30f3\u30b9\u30c8\u30fc\u30e9\u3092\u5229\u7528\u3057\u307e\u3059\u3002<\/p>\n<p>Dharma\u306f\u3001\u30b9\u30d1\u30e0\u30e1\u30fc\u30eb\u3084\u60aa\u610f\u306e\u3042\u308b\u30a4\u30f3\u30b9\u30c8\u30fc\u30e9\u3067\u914d\u5e03\u3055\u308c\u308b\u3060\u3051\u3067\u306a\u304f\u3001\u30d6\u30eb\u30fc\u30c8\u30d5\u30a9\u30fc\u30b9\u306b\u3088\u3063\u3066\u3001\u307e\u305f\u306f\u3059\u3067\u306b\u516c\u958b\u6e08\u307f\u3067\u3042\u3063\u305f\u308a\u8106\u5f31\u6027\u304c\u3042\u3063\u305f\u308a\u3059\u308b\u30ea\u30e2\u30fc\u30c8\u30c7\u30b9\u30af\u30c8\u30c3\u30d7\u30d7\u30ed\u30c8\u30b3\u30eb\uff08RDP\uff09\u30b5\u30fc\u30d3\u30b9\u3092\u4ecb\u3057\u3066\u88ab\u5bb3\u8005\u306b\u914d\u5e03\u3055\u308c\u307e\u3059\u3002<\/p>\n<h3><a id=\"post-117552-_n9g9mhg655mu\"><\/a>Dharma\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u6982\u8981<\/h3>\n<p><img  class=\"alignnone size-full wp-image-117647 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2021\/03\/Ransomware-series-21-illustration_Dharma.png\" alt=\"Conceptual image representing Dharma ransomware as part of the ransomware threat assessments companion to the 2021 Unit 42 Ransomware Threat Report. \" width=\"1587\" height=\"850\" \/><\/p>\n<p>Dharma\u306f\u3001\u30a2\u30f3\u30c0\u30fc\u30b0\u30e9\u30a6\u30f3\u30c9\u30d5\u30a9\u30fc\u30e9\u30e0\u3084\u30bd\u30fc\u30b7\u30e3\u30eb\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3067\u3001\u30b5\u30fc\u30d3\u30b9\u3068\u3057\u3066\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\uff08RaaS\uff09\u3068\u3057\u3066\u5b9a\u671f\u7684\u306b\u914d\u5e03\u307e\u305f\u306f\u8ca9\u58f2\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<figure id=\"attachment_117597\" aria-describedby=\"caption-attachment-117597\" style=\"width: 768px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-117598 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2021\/03\/word-image-81.png\" alt=\"\u56f31 \u4eba\u6c17\u30a2\u30f3\u30c0\u30fc\u30b0\u30e9\u30a6\u30f3\u30c9\u30de\u30fc\u30b1\u30c3\u30c8\u30d7\u30ec\u30a4\u30b9\u4e0a\u306eDharma RaaS\u306e\u6295\u7a3f(\u51fa\u5e97: Sophos)\" width=\"768\" height=\"337\" \/><figcaption id=\"caption-attachment-117597\" class=\"wp-caption-text\">\u56f31 \u4eba\u6c17\u30a2\u30f3\u30c0\u30fc\u30b0\u30e9\u30a6\u30f3\u30c9\u30de\u30fc\u30b1\u30c3\u30c8\u30d7\u30ec\u30a4\u30b9\u4e0a\u306eDharma RaaS\u306e\u6295\u7a3f(\u51fa\u5e97: Sophos)<\/figcaption><\/figure>\n<p>\u88ab\u5bb3\u8005\u306e\u30d5\u30a1\u30a4\u30eb\u6697\u53f7\u5316\u3092\u5b8c\u4e86\u3057\u305f\u5f8c\u3001Dharma\u306f\u5e0c\u671b\u3059\u308b\u8eab\u4ee3\u91d1\u306e\u91d1\u984d\u3068\u9023\u7d61\u7528\u96fb\u5b50\u30e1\u30fc\u30eb\u30a2\u30c9\u30ec\u30b9\u3092\u542b\u3080\u8eab\u4ee3\u91d1\u30e1\u30e2\u3092\u30c7\u30b9\u30af\u30c8\u30c3\u30d7\u306b\u30c9\u30ed\u30c3\u30d7\u3057\u307e\u3059\u30022020\u5e74\u306b\u652f\u6255\u308f\u308c\u305f\u8eab\u4ee3\u91d1\u306e\u5e73\u5747\u984d\u306f7,801\u30c9\u30eb\uff08\u65e5\u672c\u5186\u306785\u4e07\u5186\uff09\u3067\u3057\u305f\u304c\u3001\u30bf\u30fc\u30b2\u30c3\u30c8\u306e\u7d44\u7e54\u898f\u6a21\u306b\u3088\u3063\u3066\u8981\u6c42\u984d\u306f\u82e5\u5e72\u5909\u52d5\u3057\u3066\u3044\u307e\u3057\u305f\u3002<\/p>\n<p>\u611f\u67d3\u30d5\u30a1\u30a4\u30eb\u3092\u6697\u53f7\u5316\u3059\u308b\u3068\u3001\u30d5\u30a1\u30a4\u30eb\u540d\u306b\u4ee5\u4e0b\u306e\u30d5\u30a1\u30a4\u30eb\u62e1\u5f35\u5b50\u304c\u8ffd\u52a0\u3055\u308c\u308b\u3053\u3068\u304c\u78ba\u8a8d\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p><span style=\"font-family: 'courier new', courier, monospace;\">.crysis, .dharma, wallet, .java, .adobe, .viper1, .write, .bip, .zzzzz, .viper2, .arrow, .gif, .xtbl, .onion, .bip, .cezar, .combo, .cesar, .cmb, .AUF, .arena, .brrr, .btc, .cobra, .gamma, .heets, .java, .monro, .USA, .bkp, .xwx, .btc, .best, .bgtx, .boost, .heets, .waifu, .qwe, .gamma, .ETH, .bet, ta, .air, .vanss, . 888, .FUNNY, .amber, .gdb, .frend, .like, .KARLS, .xxxxx, .aqva, .lock, .korea, .plomb, .tron, .NWA, .AUDIT, .com, .cccmn, .azero, .Bear, .bk666, .fire, .stun, .myjob, .ms13, .war, .carcn, .risk, .btix, .bkpx, .he, .ets, .santa, .gate, .bizer, .LOVE, .LDPR, .MERS, .bat, .qbix, .aa1, .wal<\/span><\/p>\n<figure id=\"attachment_117599\" aria-describedby=\"caption-attachment-117599\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-117600 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2021\/03\/word-image-82.png\" alt=\"\u56f32 Dharma\u306e\u8eab\u4ee3\u91d1\u8981\u6c42\u30da\u30fc\u30b8\" width=\"900\" height=\"360\" \/><figcaption id=\"caption-attachment-117599\" class=\"wp-caption-text\">\u56f32 Dharma\u306e\u8eab\u4ee3\u91d1\u8981\u6c42\u30da\u30fc\u30b8<\/figcaption><\/figure>\n<p>\u4eca\u65e5\u51fa\u56de\u3063\u3066\u3044\u308b\u591a\u304f\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u540c\u69d8\u3001Dharma\u306f\u4ed6\u306e\u30d5\u30a1\u30df\u30ea\uff08\u305f\u3068\u3048\u3070Phobos\uff09\u3068\u4e00\u90e8\u30a2\u30af\u30bf\u30fc\u3084\u30b3\u30fc\u30c9\u306e\u985e\u4f3c\u70b9\u3092\u5171\u6709\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u4e21\u30d5\u30a1\u30df\u30ea\u306f\u611f\u67d3\u5f8c\u306e\u8eab\u4ee3\u91d1\u30e1\u30e2\u304c\u540c\u3058\u3067\u3059\u3002\u3055\u3089\u306b\u88ab\u5bb3\u8005\u304b\u3089\u4e21\u30a2\u30af\u30bf\u30fc\u3078\u306e\u6700\u521d\u306e\u901a\u4fe1\u304c\u540c\u3058\u3067\u3059\u3002\u305f\u3060\u3057\u3001Dharma\u3068Phobos\u306e\u9593\u306b\u306f\u3001\u30d5\u30a1\u30a4\u30eb\u69cb\u9020\u306a\u3069\u3001\u3044\u304f\u3064\u304b\u306e\u30b3\u30fc\u30c9\u3067\u9055\u3044\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<p>\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u3067\u306f\u3001\u4e3b\u306b\u4e2d\u5c0f\u4f01\u696d\u306b\u7126\u70b9\u3092\u5f53\u3066\u305f\u3001\u4fdd\u967a\u3001\u904b\u8f38\u3001\u30ed\u30b8\u30b9\u30c6\u30a3\u30af\u30b9\u3001\u30cf\u30a4\u30c6\u30af\u3001\u30d8\u30eb\u30b9\u30b1\u30a2\u3001\u653f\u5e9c\u90e8\u9580\u3067\u88ab\u5bb3\u8005\u3092\u89b3\u6e2c\u3057\u3066\u3044\u307e\u3059\u3002\u88ab\u5bb3\u8005\u306e\u6240\u5728\u5730\u306f\u7c73\u56fd\u3001\u30a4\u30bf\u30ea\u30a2\u3001\u65e5\u672c\u3001\u30a4\u30f3\u30c9\u306a\u3069\u3067\u3057\u305f\u3002<\/p>\n<p>Dharma \u306e\u88ab\u5bb3\u8005\u5b66\u306e\u8a73\u7d30\u306b\u3064\u3044\u3066\u306f\u3001<a href=\"https:\/\/start.paloaltonetworks.com\/unit-42-ransomware-threat-report\">2021 Unit 42\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u30ec\u30dd\u30fc\u30c8<\/a>\u3092\u53c2\u7167\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n<h3><a id=\"post-117552-_x2abnj4lkybr\"><\/a>\u884c\u52d5\u65b9\u91dd<\/h3>\n<p>\u3053\u306e\u30bb\u30af\u30b7\u30e7\u30f3\u3067\u306f\u3001Dharma\u306e\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u306b\u95a2\u9023\u3059\u308b\u6226\u8853\u3068\u624b\u6cd5\u3092\u6587\u66f8\u5316\u3057\u3001\u305d\u308c\u3089\u3092\u5f0a\u793e\u88fd\u54c1\u30fb\u30b5\u30fc\u30d3\u30b9\u306b\u76f4\u63a5\u30de\u30c3\u30d4\u30f3\u30b0\u3057\u307e\u3059\u3002\u307e\u305f\u3001\u304a\u5ba2\u69d8\u306b\u3066\u30c7\u30d0\u30a4\u30b9\u306e\u69cb\u6210\u304c\u6b63\u3057\u304f\u884c\u308f\u308c\u3066\u3044\u308b\u304b\u3069\u3046\u304b\u3092\u78ba\u8a8d\u3059\u308b\u65b9\u6cd5\u306b\u3064\u3044\u3066\u3082\u3054\u8aac\u660e\u3057\u307e\u3059\u3002<\/p>\n<table style=\"width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 17.9615%;\"><strong>\u88fd\u54c1\/\u30b5\u30fc\u30d3\u30b9<\/strong><\/td>\n<td style=\"width: 81.6656%; text-align: left;\"><strong>\u884c\u52d5\u65b9\u91dd<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 99.6271%; text-align: center;\" colspan=\"2\"><strong>\u9632\u885b\u56de\u907f\u3001\u6c38\u7d9a\u6027\u3001 \u7279\u6a29\u6607\u683c\u3001\u63a2\u7d22<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 99.6271%; text-align: center;\" colspan=\"2\"><strong>Mshta [T1218.005]\uff08Mshta\uff09\u3001<br \/>\nRegistry Run Keys \/ Startup Folder [T1547.001]\uff08\u30ec\u30b8\u30b9\u30c8\u30eaRun Keys\/\u30b9\u30bf\u30fc\u30c8\u30a2\u30c3\u30d7\u30d5\u30a9\u30eb\u30c0\u30fc\uff09\u3001<br \/>\nProcess Injection [T1055](\u30d7\u30ed\u30bb\u30b9\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3)\u3001<br \/>\nDLL Search Order Hijacking [T1574.001]\uff08DLL\u691c\u7d22\u9806\u306e\u30cf\u30a4\u30b8\u30e3\u30c3\u30af\uff09\u3001<br \/>\nSoftware Packing [T1027.002]\uff08\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30d1\u30c3\u30ad\u30f3\u30b0\uff09\u3001<br \/>\nMasquerading [T1036]\uff08\u30de\u30b9\u30ab\u30ec\u30fc\u30c9\uff09\u3001<br \/>\nModify Registry [T1112]\uff08\u30ec\u30b8\u30b9\u30c8\u30ea\u306e\u5909\u66f4\uff09\u3001<br \/>\nBypass User Access Control [T1548.002](UAC: \u30e6\u30fc\u30b6\u30fc\u30a2\u30af\u30bb\u30b9\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\u306e\u30d0\u30a4\u30d1\u30b9)\u3001<br \/>\nProcess Discovery [T1057]\uff08\u30d7\u30ed\u30bb\u30b9\u306e\u63a2\u7d22\uff09\u3001<br \/>\nProcess Hollowing [T1055.012]\uff08\u30d7\u30ed\u30bb\u30b9\u30db\u30ed\u30fc\u30a4\u30f3\u30b0\uff09<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 17.9615%;\" rowspan=\"3\">NGFW<\/td>\n<td style=\"width: 81.6656%;\">untrust\u30be\u30fc\u30f3\u304b\u3089\u3088\u308a\u4fe1\u983c\u3067\u304d\u308btrust\u30be\u30fc\u30f3\u3078\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u5834\u5408\u306f\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u304c\u5b58\u5728\u3059\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.6656%;\">\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3067\u30b5\u30fc\u30d3\u30b9\u306b\u300cany\u300d\u304c\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3082\u306e\u304c\u306a\u3044\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.6656%;\">\u4fe1\u983c\u3055\u308c\u305f\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u30bd\u30fc\u30b9\u306eIP\u30a2\u30c9\u30ec\u30b9\u3068\u306e\u9593\u306e\u3059\u3079\u3066\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u62d2\u5426\u3059\u308b\u300c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u300d\u304c\u5b58\u5728\u3059\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 17.9615%;\">DNS Security<\/td>\n<td style=\"width: 81.6656%;\">\u30a2\u30f3\u30c1\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2 \u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3067DNS\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u6709\u52b9\u306b\u3059\u308b<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 17.9615%;\" rowspan=\"5\">URL Filtering<\/td>\n<td style=\"width: 81.6656%;\">URL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0\u304c\u4f7f\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.6656%;\">URL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0\u304c&lt;enterprise approved value&gt;\u306eURL\u30ab\u30c6\u30b4\u30ea\u306b\u300c\u30d6\u30ed\u30c3\u30af\u300d\u307e\u305f\u306f\u300c\u30aa\u30fc\u30d0\u30fc\u30e9\u30a4\u30c9\u300d\u306e\u30a2\u30af\u30b7\u30e7\u30f3\u3092\u4f7f\u7528\u3057\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.6656%;\">\u3059\u3079\u3066\u306eURL\u3078\u306e\u30a2\u30af\u30bb\u30b9\u304c\u30ed\u30b0\u306b\u8a18\u9332\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.6656%;\">\u3059\u3079\u3066\u306eHTTP\u30d8\u30c3\u30c0\u30fc\u30ed\u30b0\u30aa\u30d7\u30b7\u30e7\u30f3\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.6656%;\">\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u3078\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30dd\u30ea\u30b7\u30fc\u306b\u5bfe\u3057\u3066\u30bb\u30ad\u30e5\u30a2\u306aURL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0\u3092\u6709\u52b9\u306b\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 17.9615%;\">Cortex XDR Prevent<\/td>\n<td style=\"width: 81.6656%;\">\u30a2\u30f3\u30c1\u30de\u30eb\u30a6\u30a7\u30a2\u30d7\u30ed\u30c6\u30af\u30b7\u30e7\u30f3\u3092\u6709\u52b9\u306b\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 17.9615%;\">Cortex XSOAR<\/td>\n<td style=\"width: 81.6656%;\">XSOAR \u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u30c7\u30d7\u30ed\u30a4 - Endpoint Malware Investigation<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 17.9615%;\" rowspan=\"2\">Threat Prevention<\/td>\n<td style=\"width: 81.6656%;\">imap\u3001pop3\u3092\u9664\u304f\u3059\u3079\u3066\u306e\u30c7\u30b3\u30fc\u30c0\u3067\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u30d6\u30ed\u30c3\u30af\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.6656%;\">\u30bb\u30ad\u30e5\u30a2\u306a\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u95a2\u9023\u3059\u308b\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u306b\u9069\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 17.9615%;\" rowspan=\"7\">WildFire<\/td>\n<td style=\"width: 81.6656%;\">WildFire\u30d5\u30a1\u30a4\u30eb\u30b5\u30a4\u30ba\u306e\u30a2\u30c3\u30d7\u30ed\u30fc\u30c9\u5236\u9650\u304c\u6700\u5927\u5316\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.6656%;\">WildFire\u30d5\u30a1\u30a4\u30eb\u30d6\u30ed\u30c3\u30af\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u306e\u3059\u3079\u3066\u306e\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3001\u30d5\u30a1\u30a4\u30eb\u30bf\u30a4\u30d7\u306b\u3064\u3044\u3066\u3001\u8ee2\u9001\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.6656%;\">\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3067WildFire\u5206\u6790\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.6656%;\">\u5fa9\u53f7\u3057\u305f\u30b3\u30f3\u30c6\u30f3\u30c4\u306eWildFire\u3078\u306e\u8ee2\u9001\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.6656%;\">\u3059\u3079\u3066\u306eWildFire\u30bb\u30c3\u30b7\u30e7\u30f3\u60c5\u5831\u8a2d\u5b9a\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.6656%;\">WildFire\u306b\u3088\u3063\u3066\u691c\u51fa\u3055\u308c\u305f\u60aa\u610f\u306e\u3042\u308b\u30d5\u30a1\u30a4\u30eb\u306b\u5bfe\u3059\u308b\u30a2\u30e9\u30fc\u30c8\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.6656%;\">\u300cWildFire\u306e\u66f4\u65b0\u30b9\u30b1\u30b8\u30e5\u30fc\u30eb\u300d\u304c\u6bce\u5206\u3054\u3068\u306b\u66f4\u65b0\u3092\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3066\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b\u3088\u3046\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 17.9615%;\" rowspan=\"2\">Cortex XDR Prevent<\/td>\n<td style=\"width: 81.6656%;\">\u30de\u30eb\u30a6\u30a7\u30a2\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3067Behavioral Threat Protection\uff08BTP\uff09\u3092\u8a2d\u5b9a\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.6656%;\">\u30a2\u30f3\u30c1\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u30d7\u30ed\u30c6\u30af\u30b7\u30e7\u30f3\u3092\u6709\u52b9\u306b\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 99.6271%; text-align: center;\" colspan=\"2\"><strong>\u6a2a\u5c55\u958b<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 99.6271%; text-align: center;\" colspan=\"2\"><strong>Replication Through Removable Media [T1091]\uff08\u30ea\u30e0\u30fc\u30d0\u30d6\u30eb\u30e1\u30c7\u30a3\u30a2\u7d4c\u7531\u306e\u8907\u88fd\uff09<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 17.9615%;\">Cortex XDR Prevent<\/td>\n<td style=\"width: 81.6656%;\">\u30c7\u30d0\u30a4\u30b9\u5236\u5fa1\u3092\u6709\u52b9\u306b\u3059\u308b<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 99.6271%; text-align: center;\" colspan=\"2\"><strong>\u5f71\u97ff<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 99.6271%; text-align: center;\" colspan=\"2\"><strong>Inhibit System Recovery [T1490]\uff08\u30b7\u30b9\u30c6\u30e0\u306e\u5fa9\u5143\u7981\u6b62\uff09\u3001<br \/>\nData Encrypted for Impact [T1486]\uff08\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u305f\u3081\u306e\u30c7\u30fc\u30bf\u6697\u53f7\u5316\uff09<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 17.9615%;\" rowspan=\"2\">Cortex XSOAR<\/td>\n<td style=\"width: 81.6656%;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 - Palo Alto Networks Endpoint Malware Investigation<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 81.6656%;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Ransomware Manual for incident response<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: center;\"><span style=\"font-size: 12pt;\"><sup><span style=\"color: #999999;\"><em>\u88681 Courses of Action for Dharma ransomware.<br \/>\n<\/em><\/span><\/sup><\/span><span style=\"font-size: 12pt;\"><sup><span style=\"color: #999999;\"><em>\u2020\u3053\u308c\u3089\u306e\u6a5f\u80fd\u306f\u3001NGFW\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30d6\u30b9\u30af\u30ea\u30d7\u30b7\u30e7\u30f3\u30b5\u30fc\u30d3\u30b9\u306e\u4e00\u90e8\u3067\u3059<\/em><\/span><\/sup><\/span><\/p>\n<h3><a id=\"post-117552-_cqlehxmsl3mw\"><\/a>\u7d50\u8ad6<\/h3>\n<p>Unit 42\u304c\u6bce\u65e5\u8ffd\u8de1\u3057\u3066\u3044\u308b\u591a\u304f\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u540c\u69d8\u3001Dharma\u306fPhobos\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u3068\u4e00\u90e8\u30a2\u30af\u30bf\u30fc\u3084\u30b3\u30fc\u30c9\u306e\u985e\u4f3c\u70b9\u3092\u5171\u6709\u3057\u3066\u3044\u307e\u3059\u3002\u4e16\u754c\u4e2d\u306e\u591a\u304f\u306e\u7d44\u7e54\u304c\u521d\u671f\u611f\u67d3\u30d9\u30af\u30c8\u30eb\u3067\u3042\u308bRDP\u306b\u4f9d\u5b58\u3057\u3066\u3044\u308b\u3053\u3068\u304b\u3089\u3001Dharma\u306f\u3053\u3068\u3055\u3089\u5384\u4ecb\u306a\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3067\u3059\u3002\u30d6\u30ec\u306a\u3044\u653b\u6483\u30b0\u30eb\u30fc\u30d7\u304c\u7d44\u7e54\u306b\u4e0e\u3048\u308b\u5f71\u97ff\u3084\u3001\u653b\u6483\u8005\u306e\u30b3\u30fc\u30c9\u3001\u30a4\u30f3\u30d5\u30e9\u30b9\u30c8\u30e9\u30af\u30c1\u30e3\u306e\u518d\u5229\u7528\u306f\u58ca\u6ec5\u7684\u306a\u7d50\u679c\u3092\u307e\u306d\u304f\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<p>\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306fDharma\u3092\u6b21\u306e\u65b9\u6cd5\u3067\u691c\u51fa\/\u9632\u6b62\u3057\u307e\u3059\u3002<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/products\/secure-the-network\/wildfire\">WildFire<\/a>: \u65e2\u77e5\u306e\u30b5\u30f3\u30d7\u30eb\u306f\u3059\u3079\u3066\u30de\u30eb\u30a6\u30a7\u30a2\u3068\u3057\u3066\u8b58\u5225\u3055\u308c\u307e\u3059\u3002<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/cortex\/cortex-xdr\">Cortex XDR<\/a>:\n<ul>\n<li>Dharma\u306e\u30a4\u30f3\u30b8\u30b1\u30fc\u30bf\u3092\u542b\u307f\u307e\u3059\u3002<\/li>\n<li>\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u5bfe\u7b56\u30e2\u30b8\u30e5\u30fc\u30eb\u3067Dharma\u306e\u6697\u53f7\u5316\u306e\u632f\u308b\u821e\u3044\u3092\u691c\u51fa\u3057\u307e\u3059\u3002<\/li>\n<li>\u30ed\u30fc\u30ab\u30eb\u5206\u6790\u30fb\u691c\u51fa\u6a5f\u80fd\u306b\u3088\u308aDharma\u30d0\u30a4\u30ca\u30ea\u3092\u691c\u51fa\u3057\u307e\u3059\u3002<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/network-security\/next-generation-firewall\">\u6b21\u4e16\u4ee3\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb<\/a>: DNS\u30b7\u30b0\u30cd\u30c1\u30e3\u304c\u65e2\u77e5\u306e\u30b3\u30de\u30f3\u30c9&amp;\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\uff08C2\uff09\u30c9\u30e1\u30a4\u30f3\u3092\u691c\u51fa\u3057\u3001<a href=\"https:\/\/www.paloaltonetworks.jp\/products\/threat-detection-and-prevention\/web-security\">URL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0<\/a>\u3067\u540c\u30c9\u30e1\u30a4\u30f3\u3092\u30de\u30eb\u30a6\u30a7\u30a2\u3068\u3057\u3066\u5206\u985e\u3057\u307e\u3059\u3002<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/cortex\/autofocus\">AutoFocus<\/a>: \u95a2\u9023\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u3092<a href=\"https:\/\/autofocus.paloaltonetworks.com\/#\/tag\/Unit42.Dharma\">Dharma<\/a> \u30bf\u30b0\u3067\u8ffd\u8de1\u3057\u307e\u3059\u3002<\/li>\n<\/ul>\n<p>Dharma \u306b\u95a2\u9023\u3059\u308b\u6307\u6a19\u306f\u3001\u3053\u3061\u3089\u306e<a href=\"https:\/\/github.com\/pan-unit42\/iocs\">GitHub<\/a>\u304b\u3089\u5229\u7528\u53ef\u80fd\u3067\u3059\u3002Unit 42\u306eTAXII<a href=\"https:\/\/github.com\/pan-unit42\/iocs\/tree\/master\/stix2-reports\/report_json\">\u30d5\u30a3\u30fc\u30c9<\/a>\u306b\u3082\u516c\u958b\u6e08\u307f\u3067\u3059\u3002<\/p>\n<h3><a id=\"post-117552-_s29vpscma7h2\"><\/a>\u8ffd\u52a0\u8cc7\u6599<\/h3>\n<ul>\n<li><a href=\"https:\/\/news.sophos.com\/en-us\/2020\/08\/12\/color-by-numbers-inside-a-dharma-ransomware-as-a-service-attack\/\">Color by numbers: inside a Dharma ransomware-as-a-service attack<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/07\/a-deep-dive-into-phobos-ransomware\/\">A deep dive into Phobos ransomware<\/a><\/li>\n<li><a href=\"https:\/\/www.cyber.nj.gov\/threat-center\/threat-profiles\/ransomware-variants\/crysis-dharma\">NJCCIC Threat Profile<\/a><\/li>\n<\/ul>\n<p><strong><em>\u7d9a\u304d\u3092\u8aad\u3080: <a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/7\">GandCrab\u304a\u3088\u3073REvil<\/a><\/em><\/strong><\/p>\n<p><strong><em><a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/\">\u30c8\u30c3\u30d7\u306b\u623b\u308b<\/a><\/em><\/strong><\/p>\n<p><!--nextpage--><\/p>\n<h2><a id=\"post-117552-_19rdy1ktgimw\"><\/a><em>\u8105\u5a01\u306e\u8a55\u4fa1\uff1aGandCrab\u304a\u3088\u3073REvil\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2<\/em><\/h2>\n<h3><a id=\"post-117552-_yw7pj88k8bhv\"><\/a>\u6982\u8981<\/h3>\n<p>GandCrab\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306f\u77ed\u547d\u3067\u3057\u305f\u304c\u6700\u76db\u671f\u306b\u306f\u591a\u4f5c\u306a\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u3067\u3057\u305f\u3002\u3053\u306e\u8105\u5a01\u306f\u6700\u521d\u306b<a href=\"https:\/\/www.malwarebytes.com\/gandcrab\/\">2018\u5e741\u6708\u306b\u89b3\u6e2c<\/a>\u3055\u308c\u30012019\u5e745\u6708\u307e\u3067\u6d41\u884c\u3057\u3066\u3044\u307e\u3057\u305f\u3002\u5f53\u6642\u3053\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306b\u306f\u3055\u307e\u3056\u307e\u306b\u7570\u306a\u308b\u30d0\u30fc\u30b8\u30e7\u30f3\u304c\u591a\u6570\u3042\u308a\u307e\u3057\u305f\u3002GandCrab\u3078\u306e\u611f\u67d3\u306f\u3001\u30de\u30eb\u30d0\u30bf\u30a4\u30b8\u30f3\u30b0\u3001\u30b9\u30d1\u30e0\u3001\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u30ad\u30c3\u30c8\u653b\u6483\u306e\u30da\u30a4\u30ed\u30fc\u30c9\u3068\u3057\u3066\u6700\u3082\u4e00\u822c\u7684\u306b\u89b3\u6e2c\u3055\u308c\u3066\u3044\u307e\u3057\u305f\u3002\u30de\u30eb\u30d0\u30bf\u30a4\u30b8\u30f3\u30b0\u653b\u6483\u306f\u3001<a href=\"https:\/\/en.wikipedia.org\/wiki\/Drive-by_download\">\u30c9\u30e9\u30a4\u30d6\u30d0\u30a4\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/a>\u3092\u4ecb\u3057\u3001\u88ab\u5bb3\u8005\u306b\u611f\u67d3\u3059\u308b\u305f\u3081\u306b\u4f7f\u7528\u3055\u308c\u308b\u60aa\u610f\u306e\u3042\u308b\u5e83\u544a\u3067\u3059\u3002\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u30ad\u30c3\u30c8\u306f\u65e5\u5e38\u7684\u306b\u540c\u69d8\u306e\u65b9\u6cd5\u3067\u4f7f\u7528\u3055\u308c\u3066\u304a\u308a\u3001\u591a\u6570\u306e\u30ad\u30c3\u30c8\u304c\u88ab\u5bb3\u8005\u306e\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u306bGandCrab\u3092\u30c9\u30ed\u30c3\u30d7\u3057\u3066\u3044\u307e\u3059\u3002GandCrab\u306e\u914d\u5e03\u306b\u4f7f\u7528\u3055\u308c\u308b\u6700\u3082\u4e00\u822c\u7684\u306a\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u30ad\u30c3\u30c8\u306f\u3001Rig\u3068Grandsoft\u3067\u3057\u305f\u3002<\/p>\n<p>2019\u5e74\u306e\u521d\u3081\u3001GandCrab\u306e\u80cc\u5f8c\u306b\u3044\u305f\u4f5c\u8005\u306f\u300c\u5341\u5206\u91d1\u3092\u7a3c\u304e\u640d\u5bb3\u3092\u4e0e\u3048\u305f\u306e\u3067\u5f15\u9000\u3059\u308b\u300d\u3068\u8868\u660e\u3057\u307e\u3057\u305f\u3002\u305f\u3060\u3057\u305d\u308c\u3068\u307b\u307c\u540c\u6642\u306bREvil\u3068\u547c\u3070\u308c\u308b\u65b0\u3057\u3044\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u304c\u51fa\u73fe\u3057\u307e\u3057\u305f\uff08Sodinokibi\u3068\u3082\u547c\u3070\u308c\u307e\u3059\uff09\u30022\u3064\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u306e\u9593\u306b\u306f\u5f37\u3044\u985e\u4f3c\u6027\u304c\u3042\u308a\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b5\u30fc\u30c1\u30e3\u30fc\u306fREvil\u304cGandCrab\u304c\u9032\u5316\u3057\u305f\u3082\u306e\u3067\u3042\u308b\u3068\u8003\u3048\u308b\u3088\u3046\u306b\u306a\u308a\u307e\u3057\u305f\u3002\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u653b\u6483\u8005\u306e\u63a1\u7528\u3059\u308b\u88ab\u5bb3\u8005\u3084\u6226\u8853\u306f\u5909\u66f4\u3055\u308c\u3066\u3044\u307e\u3059\u3002REvil\u3082\u3084\u306f\u308aGandCrab\u306e\u3088\u3046\u306a\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3067\u3057\u305f\u304c\u3001\u4f7f\u7528\u3055\u308c\u308b\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u306fGandCrab\u304c\u63a1\u7528\u3057\u305f\u4e0d\u7279\u5b9a\u591a\u6570\u3078\u306e\u653b\u6483\u3068\u306f\u5bfe\u7167\u7684\u306b\u3001\u6a19\u7684\u578b\u653b\u6483\u306b\u3088\u308a\u719f\u9054\u3057\u3066\u3044\u307e\u3057\u305f\u3002<\/p>\n<h3><a id=\"post-117552-_2jkx7ih41snd\"><\/a>GandCrab\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u6982\u8981<\/h3>\n<p>GandCrab\u3092\u72ec\u81ea\u305f\u3089\u3057\u3081\u3066\u3044\u305f\u306e\u306f\u30de\u30eb\u30a6\u30a7\u30a2\u62e1\u6563\u306b\u4f7f\u7528\u3055\u308c\u305f\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u30d7\u30ed\u30b0\u30e9\u30e0\u3067\u3057\u305f\u3002\u3053\u306e\u30d7\u30ed\u30b0\u30e9\u30e0\u3067\u306f\u30d1\u30fc\u30c8\u30ca\u30fc\u306b\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u914d\u5e03\u3092\u307e\u304b\u305b\u3001\u5f7c\u3089\u30d1\u30fc\u30c8\u30ca\u30fc\u304c\u88ab\u5bb3\u8005\u3092\u96c6\u3081\u3066\u3044\u307e\u3057\u305f\u3002\u305d\u306e\u304b\u308f\u308a\u3001\u30d1\u30fc\u30c8\u30ca\u30fc\u306f\u3001\u652f\u6255\u308f\u308c\u305f\u8eab\u4ee3\u91d1\u304b\u3089\u5229\u76ca\u306e\u4e00\u90e8\u3092\u53d7\u3051\u53d6\u3063\u3066\u3044\u307e\u3057\u305f\u3002<a href=\"https:\/\/www.knowbe4.com\/gandcrab-ransomware\">\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8<\/a>\u304c\u53d7\u3051\u53d6\u3063\u3066\u3044\u305f\u306e\u306f30%\u304b\u308940%\u3060\u3063\u305f\u3068\u5831\u544a\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u914d\u5e03\u30ed\u30b8\u30b9\u30c6\u30a3\u30af\u30b9\u304c\u4ed6\u306e\u653b\u6483\u8005\u306b\u59d4\u306d\u3089\u308c\u305f\u3053\u3068\u3067\u3001\u4f7f\u7528\u3055\u308c\u305f\u653b\u6483\u304c\u591a\u5c90\u306b\u308f\u305f\u3063\u3066\u3044\u305f\u3053\u3068\u306e\u8aac\u660e\u304c\u3064\u304d\u307e\u3059\u3002\u3053\u306e\u304a\u304b\u3052\u3067GandCrab\u4f5c\u6210\u8005\u306f\u30de\u30eb\u30a6\u30a7\u30a2\u3092\u3055\u3089\u306b\u958b\u767a\u3057\u3001\u5f37\u5316\u3057\u3066\u3044\u304f\u6642\u9593\u3092\u3064\u304f\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3057\u305f\u3002\u3053\u3046\u3057\u305f\u958b\u767a\u5f37\u5316\u306e\u30d7\u30ed\u30bb\u30b9\u304c\u5fc5\u8981\u3060\u3063\u305f\u7406\u7531\u306f\u3001\u30ea\u30b5\u30fc\u30c1\u30e3\u30fc\u304c\u5fa9\u53f7\u30c4\u30fc\u30eb\u3092\u30ea\u30ea\u30fc\u30b9\u3057\u3001\u611f\u67d3\u88ab\u5bb3\u8005\u304c\u8eab\u4ee3\u91d1\u3092\u652f\u6255\u308f\u305a\u306b\u30d5\u30a1\u30a4\u30eb\u3092\u5fa9\u53f7\u3067\u304d\u308b\u30b1\u30fc\u30b9\u304c\u3042\u3063\u305f\u305f\u3081\u3067\u3059\u3002\u30de\u30eb\u30a6\u30a7\u30a2\u304c\u88ab\u5bb3\u8005\u3092\u30c1\u30a7\u30c3\u30af\u3057\u3001<a href=\"https:\/\/www.acronis.com\/en-us\/articles\/gandcrab\/\">\u30ad\u30fc\u30dc\u30fc\u30c9\u30ec\u30a4\u30a2\u30a6\u30c8\u304c<\/a>\u30ed\u30b7\u30a2\u8a9e\u306e\u30ec\u30a4\u30a2\u30a6\u30c8\u3067\u3042\u308c\u3070\u7121\u8996\u3059\u308b\u3053\u3068\u304c\u77e5\u3089\u308c\u3066\u3044\u305f\u3053\u3068\u304b\u3089\u3001\u4f5c\u6210\u8005\u306f\u30ed\u30b7\u30a2\u4eba\u306e\u53ef\u80fd\u6027\u304c\u7591\u308f\u308c\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u306b\u306f\u305d\u306e\u56fd\u3067\u306e\u8d77\u8a34\u3092\u56de\u907f\u3059\u308b\u305f\u3081\u3068\u3044\u3046\u7591\u3044\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<figure id=\"attachment_117601\" aria-describedby=\"caption-attachment-117601\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-117602 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2021\/03\/word-image-83.png\" alt=\"\u56f31 GandCrab\u306e\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u306e\u30a2\u30ca\u30a6\u30f3\u30b9\uff08\u51fa\u5178\uff1aKrebs on Security\uff09\" width=\"900\" height=\"505\" \/><figcaption id=\"caption-attachment-117601\" class=\"wp-caption-text\">\u56f31 GandCrab\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u306e\u30a2\u30ca\u30a6\u30f3\u30b9\uff08\u51fa\u5178\uff1aKrebs on Security\uff09<\/figcaption><\/figure>\n<p>GandCrab\u306f\u3001\u591a\u304f\u306e\u5834\u5408\u3001\u30e9\u30f3\u30b5\u30e0\u30d5\u30a1\u30a4\u30eb\u672b\u5c3e\u306b\u8ffd\u52a0\u3055\u308c\u308b\u30d5\u30a1\u30a4\u30eb\u62e1\u5f35\u5b50\uff08.KRAB\u304a\u3088\u3073.CRAB\uff09\u3067\u5bb9\u6613\u306b\u8b58\u5225\u3067\u304d\u307e\u3059\u3002<\/p>\n<p>2019\u5e745\u6708\u3001GandCrab\u306e\u958b\u767a\u8005\u306f\u3082\u3046\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3092\u958b\u767a\u3059\u308b\u3064\u3082\u308a\u306f\u306a\u3044\u3068<a href=\"https:\/\/krebsonsecurity.com\/2019\/07\/whos-behind-the-gandcrab-ransomware\/\">\u8868\u660e<\/a>\u3057\u305f\u3053\u3068\u3067\u6709\u540d\u3067\u3059\u3002\u305d\u306e\u7406\u7531\u306f\u300c1\u5e74\u3061\u3087\u3063\u3068\u3067\u5341\u5206\u306a\u304a\u91d1\u3092\u7a3c\u3044\u3060\u3057\u60aa\u4e8b\u3092\u50cd\u3044\u3066\u3082\u9003\u3052\u304a\u304a\u305b\u308b\u3068\u8a3c\u660e\u3067\u304d\u305f\u304b\u3089\u300d\u3068\u3044\u3046\u3082\u306e\u3067\u3057\u305f\u3002\u3053\u306e\u958b\u767a\u8005\u305f\u3061\u306f\u307e\u305f\u30011\u5e74\u3068\u5c11\u3057\u30671\u51045000\u4e07\u30c9\u30eb\uff08\u65e5\u672c\u5186\u3067163\u51047250\u4e07\u5186\uff09\u4ee5\u4e0a\u3092\u7a3c\u304e\u3001\u5229\u76ca\u3092\u4ed6\u306e\u5408\u6cd5\u306a\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u306b\u5206\u6563\u6295\u8cc7\u3057\u305f\u3068\u3046\u305d\u3076\u3044\u3066\u3044\u307e\u3057\u305f\u3002\u305f\u3060\u3057\u305d\u306e\u8868\u660e\u4ee5\u964d\u3082\u540c\u69d8\u306e\u6307\u6a19\u3067\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30b5\u30f3\u30d7\u30eb\u304c\u89b3\u5bdf\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u304b\u3089\u3001\u4f5c\u8005\u306e\u4e00\u90e8\u306f\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u958b\u767a\u3092\u7d9a\u3051\u3066\u3044\u308b\u3082\u306e\u3068\u8003\u3048\u3089\u308c\u307e\u3059\u3002<\/p>\n<figure id=\"attachment_117603\" aria-describedby=\"caption-attachment-117603\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-117604 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2021\/03\/word-image-84.png\" alt=\"\u56f32 \u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u306eGandCrab\u611f\u67d3\uff08\u51fa\u5178: Any.Run\uff09\" width=\"900\" height=\"429\" \/><figcaption id=\"caption-attachment-117603\" class=\"wp-caption-text\">\u56f32 \u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u306eGandCrab\u611f\u67d3\uff08\u51fa\u5178: Any.Run\uff09<\/figcaption><\/figure>\n<h3><a id=\"post-117552-_5ut4p3y4pyih\"><\/a>REvil\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u6982\u8981<\/h3>\n<p><img  class=\"alignnone size-full wp-image-117649 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2021\/03\/Ransomware-series-21-illustration_REvil.png\" alt=\"\u300c2021 Unit 42\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u30ec\u30dd\u30fc\u30c8\u300d\u306b\u4ed8\u968f\u3059\u308b\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u8a55\u4fa1\u306e\u4e00\u90e8\u3068\u3057\u3066\u306eREvil\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3092\u8868\u3059\u6982\u5ff5\u753b\u50cf\u3002 \" width=\"1587\" height=\"850\" \/><\/p>\n<p><a href=\"https:\/\/blog.talosintelligence.com\/2019\/04\/sodinokibi-ransomware-exploits-weblogic.html\">2019\u5e744\u6708<\/a>\u3001REvil\u3068\u547c\u3070\u308c\u308b\u5225\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u304c\u51fa\u73fe\u3057\u307e\u3059\uff08Sodinokibi\u3068\u3082\u547c\u3070\u308c\u3066\u3044\u307e\u3059\uff09\u3002GandCrab\u3068REvil\u306e\u9593\u306b\u306f\u76f4\u63a5\u7684\u306a\u985e\u4f3c\u70b9\u304c\u3042\u308a\u3001REvil\u306e\u521d\u671f\u30b5\u30f3\u30d7\u30eb\u306fGandCrab\u3068\u3057\u3066\u8b58\u5225\u3055\u308c\u307e\u3057\u305f\u3002REvil\u306f\u30b5\u30fc\u30d3\u30b9\u3068\u3057\u3066\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\uff08Ransomware-as-a-Service\u3001RaaS\uff09\u3067\u3082\u3042\u308a\u3001\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u3092\u4f7f\u7528\u3057\u3066\u30de\u30eb\u30a6\u30a7\u30a2\u611f\u67d3\u3092\u5e83\u3052\u307e\u3059\u3002\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u306e\u30e1\u30f3\u30d0\u30fc\u306f\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u958b\u767a\u8005\u304c\u8eab\u4ee3\u91d1\u306e\u652f\u6255\u3044\u304b\u3089\u81ea\u5206\u305f\u3061\u306e\u53d6\u308a\u5206\u3092\u9664\u3044\u305f\u5f8c\u306e\u4e00\u5b9a\u306e\u5272\u5408\u3092\u53d7\u3051\u53d6\u3063\u3066\u3044\u307e\u3057\u305f\u3002<\/p>\n<p>REvil\u306e<a href=\"https:\/\/www.csoonline.com\/article\/3597298\/revil-ransomware-explained-a-widespread-extortion-operation.html\">\u5206\u5e03<\/a>\u65b9\u6cd5\u306f\u3001GandCrab\u306e\u305d\u308c\u3068\u306f\u7570\u306a\u308a\u307e\u3059\u3002\u3088\u308a\u30b9\u30ad\u30eb\u306e\u9ad8\u3044\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u304c\u3001Oracle WebLogic CVE-2019-2725\u306e\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u3092\u4f7f\u3063\u305f\u308a\u3001\u30d1\u30b9\u30ef\u30fc\u30c9\u3092\u30d6\u30eb\u30fc\u30c8\u30d5\u30a9\u30fc\u30b9\u653b\u6483\u3067\u7834\u3063\u3066\u30ea\u30e2\u30fc\u30c8\u30c7\u30b9\u30af\u30c8\u30c3\u30d7\u30d7\u30ed\u30c8\u30b3\u30eb\uff08RDP\uff09\u7d4c\u7531\u3067\u63a5\u7d9a\u3092\u3059\u308b\u306a\u3069\u306e\u624b\u6cd5\u306b\u3088\u308a\u3001\u4f01\u696d\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3092\u4fb5\u5bb3\u3057\u3066\u88ab\u5bb3\u8005\u3092\u7a4d\u6975\u7684\u306b\u653b\u6483\u3057\u3001REvil\u3092\u30c9\u30ed\u30c3\u30d7\u3057\u3066\u3044\u307e\u3057\u305f\u3002\u307e\u305f\u3001GandCrab\u3067\u306e\u60aa\u610f\u306e\u3042\u308b\u30b9\u30d1\u30e0\u3084\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u30ad\u30c3\u30c8\u3001\u30de\u30eb\u30d0\u30bf\u30a4\u30b8\u30f3\u30b0\u30d9\u30af\u30c8\u30eb\u3068\u306f\u5bfe\u7167\u7684\u306b\u3001REvil\u3067\u306f\u30ec\u30c3\u30c9\u30c1\u30fc\u30e0\u7528\u306e\u30c4\u30fc\u30eb\u3001\u30c6\u30af\u30cb\u30c3\u30af\u3001\u624b\u9806\uff08TTP\uff09\u304c\u4f7f\u7528\u3055\u308c\u307e\u3059\u3002\u3053\u308c\u306f\u307e\u305f\u3001\u3088\u308a\u9ad8\u3044\u8eab\u4ee3\u91d1\u3092\u652f\u6255\u308f\u305b\u308b\u305f\u3081\u306b\u3001\u3088\u308a\u6a19\u7684\u3092\u3057\u307c\u3063\u305f\u88ab\u5bb3\u8005\u304c\u9078\u3070\u308c\u308b\u3053\u3068\u3092\u610f\u5473\u3057\u307e\u3057\u305f\u3002<\/p>\n<p>GandCrab\u306e\u5206\u6790\u3067\u306fREvil\u3068GandCrab\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30b5\u30f3\u30d7\u30eb\u306e\u9593\u306b\u306f\u5f37\u3044\u985e\u4f3c\u6027\u304c\u3042\u308b\u3053\u3068\u304c<a href=\"https:\/\/www.secureworks.com\/research\/revil-sodinokibi-ransomware\">\u793a\u3055\u308c<\/a>\u307e\u3057\u305f\u3002\u3053\u308c\u30892\u3064\u306e\u985e\u4f3c\u70b9\u306b\u57fa\u3065\u304d\u3001REvil\u306fGandCrab\u306e\u5358\u306a\u308b\u30d6\u30e9\u30f3\u30c9\u5909\u66f4\u3067\u3001\u305d\u306e\u9032\u5316\u5f62\u3067\u3042\u308b\u3053\u3068\u304c\u5e83\u304f\u4fe1\u3058\u3089\u308c\u3066\u3044\u307e\u3059\u3002\u3053\u3053\u304b\u3089\u3001GandCrab\u306e\u958b\u767a\u8005\u5168\u54e1\u304c\u3053\u3046\u3057\u305f\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u4f5c\u6210\u3092\u3084\u3081\u305f\u308f\u3051\u3067\u306f\u306a\u3044\u3068\u3044\u3046\u7d50\u8ad6\u306b\u81f3\u308a\u307e\u3059\u3002\u3053\u306e\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u306b\u3088\u308b\u611f\u67d3\u6226\u8853\u306f\u3001\u4e0d\u7279\u5b9a\u591a\u6570\u3078\u306e\u653b\u6483\u304b\u3089\u30ec\u30c3\u30c9\u30c1\u30fc\u30e0TTP\u306b\u7cbe\u901a\u3057\u305f\u3088\u308a\u719f\u7df4\u3057\u305f\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u3092\u4f7f\u7528\u3057\u305f\u653b\u6483\u306b\u79fb\u884c\u3059\u308b\u3053\u3068\u306b\u3088\u308b\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u9032\u5316\u3082\u793a\u3057\u3066\u3044\u307e\u3059\u3002\u307e\u305f\u3001\u6a19\u7684\u3068\u306a\u308b\u30e6\u30fc\u30b6\u30fc\u3082\u3001\u60aa\u610f\u306e\u3042\u308b\u96fb\u5b50\u30e1\u30fc\u30eb\u5185\u306e\u30ea\u30f3\u30af\u3092\u30af\u30ea\u30c3\u30af\u3059\u308b\u304b\u3082\u3057\u308c\u306a\u3044\u30e6\u30fc\u30b6\u30fc\u304b\u3089\u3001\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u306b\u63a5\u7d9a\u3057\u3066\u3044\u308b\u8106\u5f31\u6027\u306e\u3042\u308b\u6a5f\u5668\u3092\u3082\u3061\u3001\u305d\u3053\u306b\u653b\u6483\u8005\u304cREvil\u3092\u30c9\u30ed\u30c3\u30d7\u3067\u304d\u308b\u4f01\u696d\u3078\u3068\u5909\u66f4\u3055\u308c\u307e\u3057\u305f\u3002<\/p>\n<p>2020\u5e74\u306e\u5e73\u5747\u8eab\u4ee3\u91d1\u652f\u6255\u3044\u984d\u306f508,523\u30c9\u30eb\uff08\u65e5\u672c\u5186\u30675560\u4e07\u5186\uff09\u3067\u3001REvil\u306e\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306f\u3001\u7c73\u56fd\u3001\u30aa\u30fc\u30b9\u30c8\u30e9\u30ea\u30a2\u3001\u30ab\u30ca\u30c0\u3001\u30d5\u30a3\u30f3\u30e9\u30f3\u30c9\u3001\u9999\u6e2f\u306e\u5c02\u9580\u304a\u3088\u3073\u6cd5\u5f8b\u30b5\u30fc\u30d3\u30b9\u3001\u88fd\u9020\u3001\u30e1\u30c7\u30a3\u30a2\u304a\u3088\u3073\u901a\u4fe1\u3001\u5378\u58f2\u304a\u3088\u3073\u5c0f\u58f2\u3001\u5efa\u8a2d\u304a\u3088\u3073\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u3001\u30a8\u30cd\u30eb\u30ae\u30fc\u90e8\u9580\u3092\u88ab\u5bb3\u5bfe\u8c61\u3068\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>REvil\u306e\u88ab\u5bb3\u8005\u5b66\u306e\u8a73\u7d30\u306b\u3064\u3044\u3066\u306f\u3001<a href=\"https:\/\/start.paloaltonetworks.com\/unit-42-ransomware-threat-report\">2021 Unit 42\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u30ec\u30dd\u30fc\u30c8<\/a>\u3092\u53c2\u7167\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n<h3><a id=\"post-117552-_dzsifvqp6i3h\"><\/a>\u884c\u52d5\u65b9\u91dd<\/h3>\n<p>\u3053\u306e\u30bb\u30af\u30b7\u30e7\u30f3\u3067\u306f\u3001REvil\u306e\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u306b\u95a2\u9023\u3059\u308b\u6226\u8853\u3068\u624b\u6cd5\u3092\u6587\u66f8\u5316\u3057\u3001\u305d\u308c\u3089\u3092\u5f0a\u793e\u88fd\u54c1\u30fb\u30b5\u30fc\u30d3\u30b9\u306b\u76f4\u63a5\u30de\u30c3\u30d4\u30f3\u30b0\u3057\u307e\u3059\u3002\u307e\u305f\u3001\u304a\u5ba2\u69d8\u306b\u3066\u30c7\u30d0\u30a4\u30b9\u306e\u69cb\u6210\u304c\u6b63\u3057\u304f\u884c\u308f\u308c\u3066\u3044\u308b\u304b\u3069\u3046\u304b\u3092\u78ba\u8a8d\u3059\u308b\u65b9\u6cd5\u306b\u3064\u3044\u3066\u3082\u3054\u8aac\u660e\u3057\u307e\u3059\u3002<\/p>\n<table style=\"width: 100.295%;\">\n<tbody>\n<tr>\n<td style=\"width: 13.4497%;\"><strong>\u88fd\u54c1\/\u30b5\u30fc\u30d3\u30b9<\/strong><\/td>\n<td style=\"width: 101.775%;\"><strong>\u884c\u52d5\u65b9\u91dd<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 115.225%; text-align: center;\" colspan=\"2\"><strong>\u30b3\u30de\u30f3\u30c9&amp;\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 115.225%; text-align: center;\" colspan=\"2\"><strong>Application Layer Protocol [T1071.001]\uff08\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30ec\u30a4\u30e4\u30d7\u30ed\u30c8\u30b3\u30eb\uff09\u3001<br \/>\nNon-Application Layer Protocol [T1095]\uff08\u975e\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30ec\u30a4\u30e4\u306e\u30d7\u30ed\u30c8\u30b3\u30eb\uff09<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 13.4497%;\" rowspan=\"3\">NGFW<\/td>\n<td style=\"width: 101.775%;\">untrust\u30be\u30fc\u30f3\u304b\u3089\u3088\u308a\u4fe1\u983c\u3067\u304d\u308btrust\u30be\u30fc\u30f3\u3078\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u5834\u5408\u306f\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u304c\u5b58\u5728\u3059\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 101.775%;\">\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3067\u30b5\u30fc\u30d3\u30b9\u306b\u300cany\u300d\u304c\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3082\u306e\u304c\u306a\u3044\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 101.775%;\">\u4fe1\u983c\u3055\u308c\u305f\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u30bd\u30fc\u30b9\u306eIP\u30a2\u30c9\u30ec\u30b9\u3068\u306e\u9593\u306e\u3059\u3079\u3066\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u62d2\u5426\u3059\u308b\u300c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u300d\u304c\u5b58\u5728\u3059\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 13.4497%;\" rowspan=\"6\">\u8105\u5a01\u9632\u5fa1<em>\u2020<\/em><\/td>\n<td style=\"width: 101.775%;\">imap\u3001pop3\u3092\u9664\u304f\u3059\u3079\u3066\u306e\u30c7\u30b3\u30fc\u30c0\u3067\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u30d6\u30ed\u30c3\u30af\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 101.775%;\">\u30bb\u30ad\u30e5\u30a2\u306a\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u95a2\u9023\u3059\u308b\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u306b\u9069\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 101.775%;\">\u30a2\u30f3\u30c1\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u3001\u3059\u3079\u3066\u306e\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u306e\u91cd\u5927\u5ea6\u30ec\u30d9\u30eb\u3001\u30ab\u30c6\u30b4\u30ea\u3001\u304a\u3088\u3073\u8105\u5a01\u3092\u30d6\u30ed\u30c3\u30af\u3059\u308b\u3088\u3046\u306b\u69cb\u6210\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 101.775%;\">\u4f7f\u7528\u4e2d\u306e\u3059\u3079\u3066\u306e\u30a2\u30f3\u30c1\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3067DNS\u30b7\u30f3\u30af\u30db\u30fc\u30eb\u304c\u69cb\u6210\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 101.775%;\">\u4f7f\u7528\u4e2d\u306e\u3059\u3079\u3066\u306e\u30a2\u30f3\u30c1\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3067\u30d1\u30c3\u30b7\u30d6DNS\u306e\u76e3\u8996\u304c\u6709\u52b9\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 101.775%;\">\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u3078\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u306b\u3001\u5b89\u5168\u306a\u30a2\u30f3\u30c1\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u9069\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 13.4497%;\">DNS\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<em>\u2020<\/em><\/td>\n<td style=\"width: 101.775%;\">\u30a2\u30f3\u30c1\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2 \u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3067DNS\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u6709\u52b9\u306b\u3059\u308b<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 13.4497%;\" rowspan=\"5\">URL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0<em>\u2020<\/em><\/td>\n<td style=\"width: 101.775%;\">URL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0\u304c\u4f7f\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 101.775%;\">URL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0\u304c&lt;enterprise approved value&gt;\u306eURL\u30ab\u30c6\u30b4\u30ea\u306b\u300c\u30d6\u30ed\u30c3\u30af\u300d\u307e\u305f\u306f\u300c\u30aa\u30fc\u30d0\u30fc\u30e9\u30a4\u30c9\u300d\u306e\u30a2\u30af\u30b7\u30e7\u30f3\u3092\u4f7f\u7528\u3057\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 101.775%;\">\u3059\u3079\u3066\u306eURL\u3078\u306e\u30a2\u30af\u30bb\u30b9\u304c\u30ed\u30b0\u306b\u8a18\u9332\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 101.775%;\">\u3059\u3079\u3066\u306eHTTP\u30d8\u30c3\u30c0\u30fc\u30ed\u30b0\u30aa\u30d7\u30b7\u30e7\u30f3\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 101.775%;\">\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u3078\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30dd\u30ea\u30b7\u30fc\u306b\u5bfe\u3057\u3066\u30bb\u30ad\u30e5\u30a2\u306aURL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0\u3092\u6709\u52b9\u306b\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 13.4497%;\" rowspan=\"3\">Cortex XSOAR<\/td>\n<td style=\"width: 101.775%;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Block IP<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 101.775%;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Block URL<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 101.775%;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Palo Alto Networks \u2013 Hunting And Threat Detection<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 115.225%; text-align: center;\" colspan=\"2\"><strong>\u9632\u885b\u56de\u907f\u3001\u6c38\u7d9a\u6027\u3001\u63a2\u7d22<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 115.225%; text-align: center;\" colspan=\"2\"><strong>Exploitation for Defense Evasion [T1211]\uff08\u9632\u5fa1\u56de\u907f\u306e\u305f\u3081\u306e\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\uff09\u3001<br \/>\nRegistry Run Keys \/ Startup Folder [T1547.001]\uff08\u30ec\u30b8\u30b9\u30c8\u30eaRun Keys\/\u30b9\u30bf\u30fc\u30c8\u30a2\u30c3\u30d7\u30d5\u30a9\u30eb\u30c0\u30fc\uff09\u3001<br \/>\nMasquerading [T1036.005]\uff08\u30de\u30b9\u30ab\u30ec\u30fc\u30c9\uff09\u3001<br \/>\nModify Registry [T1112]\uff08\u30ec\u30b8\u30b9\u30c8\u30ea\u306e\u5909\u66f4\uff09\u3001<br \/>\nProcess Discovery [T1057]\uff08\u30d7\u30ed\u30bb\u30b9\u306e\u63a2\u7d22\uff09<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 13.4497%;\" rowspan=\"2\">\u8105\u5a01\u9632\u5fa1<em>\u2020<\/em><\/td>\n<td style=\"width: 101.775%;\">\u8106\u5f31\u6027\u9632\u5fa1\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u91cd\u5927\u5ea6\u300cCritical\uff08\u91cd\u5927\uff09\u300d\u304a\u3088\u3073\u300cHigh\uff08\u9ad8\uff09\u300d\u306e\u8106\u5f31\u6027\u306b\u5bfe\u3059\u308b\u653b\u6483\u304c\u300cBlock\uff08\u30d6\u30ed\u30c3\u30af\uff09\u300d\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3001\u91cd\u5927\u5ea6\u300cMedium\uff08\u4e2d\uff09\u300d\u3001\u300cLow\uff08\u4f4e\uff09\u300d\u3001\u300cInformational\uff08\u60c5\u5831\uff09\u300d\u306e\u8106\u5f31\u6027\u304c\u300cDefault\uff08\u30c7\u30d5\u30a9\u30eb\u30c8\uff09\u300d\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 101.775%;\">\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30eb\u30fc\u30eb\u306b\u30bb\u30ad\u30e5\u30a2\u306a\u8106\u5f31\u6027\u9632\u5fa1\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u9069\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 13.4497%;\" rowspan=\"4\">Cortex XDR<\/td>\n<td style=\"width: 101.775%;\">\u30a2\u30f3\u30c1\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u30d7\u30ed\u30c6\u30af\u30b7\u30e7\u30f3\u3092\u6709\u52b9\u306b\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 101.775%;\">\u30a2\u30f3\u30c1\u30de\u30eb\u30a6\u30a7\u30a2\u30d7\u30ed\u30c6\u30af\u30b7\u30e7\u30f3\u3092\u6709\u52b9\u306b\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 101.775%;\">\u30de\u30eb\u30a6\u30a7\u30a2\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3067Behavioral Threat Protection\uff08BTP\uff09\u3092\u8a2d\u5b9a\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 101.775%;\">Restriction\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3092\u69cb\u6210\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 115.225%; text-align: center;\" colspan=\"2\"><strong>\u5f71\u97ff<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 115.225%; text-align: center;\" colspan=\"2\"><strong>Data Encrypted for Impact [T1486]\uff08\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u305f\u3081\u306e\u30c7\u30fc\u30bf\u6697\u53f7\u5316\uff09\u3001<br \/>\nInhibit System Recovery [T1490]\uff08\u30b7\u30b9\u30c6\u30e0\u306e\u5fa9\u5143\u7981\u6b62\uff09<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 13.4497%;\" rowspan=\"2\">Cortex XSOAR<\/td>\n<td style=\"width: 101.775%;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Ransomware Manual for incident response<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 101.775%;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Palo Alto Networks Endpoint Malware Investigation<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: center;\"><span style=\"font-size: 12pt;\"><sup><span style=\"color: #999999;\"><em>\u88681 GandCrab\u3068REvil\u306e\u884c\u52d5\u65b9\u91dd<\/em><\/span><\/sup><\/span><span style=\"font-size: 12pt;\"><sup><span style=\"color: #999999;\"><em>\u2020\u3053\u308c\u3089\u306e\u6a5f\u80fd\u306f\u3001NGFW\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30d6\u30b9\u30af\u30ea\u30d7\u30b7\u30e7\u30f3\u30b5\u30fc\u30d3\u30b9\u306e\u4e00\u90e8\u3067\u3059<\/em><\/span><\/sup><\/span><\/p>\n<h3><a id=\"post-117552-_s77poxeqrv8b\"><\/a>\u7d50\u8ad6<\/h3>\n<p>\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u30d7\u30ed\u30b0\u30e9\u30e0\u3092\u5229\u7528\u3059\u308b\u653b\u6483\u8005\u3068\u3044\u3046\u6982\u5ff5\u306f\u65b0\u3057\u3044\u3082\u306e\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u3067\u3059\u304cGandCrab\u306f\u3001\u3053\u3046\u3057\u305f\u30d7\u30ed\u30b0\u30e9\u30e0\u304c\u3001\u5b9f\u969b\u306b\u3084\u3063\u3066\u307f\u308b\u3068\u3069\u308c\u307b\u3069\u6210\u529f\u304c\u7c21\u5358\u306a\u306e\u304b\u3092\u5b9f\u8a3c\u3057\u3066\u307f\u305b\u307e\u3057\u305f\u3002\u3053\u306e\u6210\u529f\u306e\u9375\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u72af\u7f6a\u30a8\u30b3\u30b7\u30b9\u30c6\u30e0\u3078\u306e\u53c2\u5165\u969c\u58c1\u3092\u4f4e\u304f\u3057\u3001\u540c\u6642\u306b\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u30d7\u30ed\u30b0\u30e9\u30e0\u306e\u30e1\u30f3\u30d0\u30fc\u5168\u4f53\u306b\u8cc7\u91d1\u3092\u5206\u914d\u3059\u308b\u3053\u3068\u3067\u3057\u305f\u3002GandCrab\u306f\u3001\u30a2\u30f3\u30c0\u30fc\u30b0\u30e9\u30a6\u30f3\u30c9\u30d5\u30a9\u30fc\u30e9\u30e0\u3084\u30bd\u30fc\u30b7\u30e3\u30eb\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3067\u4e00\u822c\u7684\u306a\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u30de\u30fc\u30b1\u30c3\u30c8\u30b9\u30ad\u30fc\u30e0\u306e\u30d1\u30ef\u30fc\u30d7\u30ec\u30fc\u30e4\u30fc\u3068\u3057\u3066\u306e\u5730\u4f4d\u3092\u81ea\u529b\u3067\u78ba\u7acb\u3057\u307e\u3057\u305f\u3002<\/p>\n<p>GandCrab\u306e\u80cc\u5f8c\u306b\u3044\u308b\u30a2\u30af\u30bf\u30fc\u306f\u8868\u5411\u304d2019\u5e74\u306b\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u304b\u3089\u306f\u8db3\u3092\u6d17\u3063\u305f\u3088\u3046\u306b\u601d\u308f\u305b\u3088\u3046\u3068\u3057\u307e\u3057\u305f\u304c\u3001REvil\u3068\u547c\u3070\u308c\u308b\u65b0\u305f\u306a\u8105\u5a01\u306b\u306fGandCrab\u3068\u306e\u985e\u4f3c\u70b9\u304c\u3042\u308a\u307e\u3057\u305f\u3002\u89b3\u6e2c\u3055\u308c\u305f\u985e\u4f3c\u6027\u306f\u975e\u5e38\u306b\u5f37\u304f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u306fREvil\u306fGandcrab\u306e\u9032\u5316\u5f62\u3060\u3068\u4fe1\u3058\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u9032\u5316\u306f\u30de\u30eb\u30a6\u30a7\u30a2\u3060\u3051\u3067\u306a\u304f\u3001\u4f01\u696d\u306e\u88ab\u5bb3\u8005\u3092\u4fb5\u5bb3\u3059\u308b\u305f\u3081\u306e\u914d\u5e03\u306b\u4f7f\u7528\u3059\u308b\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u3084TTP\u306b\u3082\u3042\u308a\u307e\u3057\u305f\u3002\u3053\u306e\u7d50\u679c\u3001\u88ab\u5bb3\u304c\u3088\u308a\u6a19\u7684\u578b\u306b\u306a\u308a\u3001\u6b8b\u5ff5\u306a\u304c\u3089\u8eab\u4ee3\u91d1\u3082\u9ad8\u304f\u306a\u308a\u307e\u3057\u305f\u3002\u3053\u308c\u3089\u306b\u52a0\u3048\u3001REvil\u306b\u306f\u6050\u559d\u3068\u3044\u3046\u5074\u9762\u3082\u3042\u308a\u307e\u3059\u3002\u671f\u9650\u307e\u3067\u306b\u88ab\u5bb3\u8005\u304c\u652f\u6255\u3044\u306b\u5fdc\u3058\u306a\u3051\u308c\u3070\u3001\u6697\u53f7\u5316\u4e2d\u306b\u7a83\u53d6\u3057\u305f\u30c7\u30fc\u30bf\u306f\u30a2\u30f3\u30c0\u30fc\u30b0\u30e9\u30a6\u30f3\u30c9\u30d5\u30a9\u30fc\u30e9\u30e0\u3067\u7af6\u58f2\u306b\u304b\u3051\u3089\u308c\u307e\u3059\u3002REvil\u3092\u4f01\u696d\u306b\u3068\u3063\u3066\u3044\u3061\u3058\u308b\u3057\u304f\u5371\u967a\u305f\u3089\u3057\u3081\u3066\u3044\u308b\u306e\u306f\u3001\u3053\u3046\u3057\u305f\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u3082\u3064\u6a19\u7684\u578b\u306e\u653b\u6483\u50be\u5411\u3067\u3059\u3002<\/p>\n<p>\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306fGandCrab\u3092\u6b21\u306e\u65b9\u6cd5\u3067\u691c\u51fa\/\u9632\u6b62\u3057\u307e\u3059\u3002<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/products\/secure-the-network\/wildfire\">WildFire<\/a>: \u65e2\u77e5\u306e\u30b5\u30f3\u30d7\u30eb\u306f\u3059\u3079\u3066\u30de\u30eb\u30a6\u30a7\u30a2\u3068\u3057\u3066\u8b58\u5225\u3055\u308c\u307e\u3059\u3002<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/cortex\/cortex-xdr\">Cortex XDR<\/a>:\n<ul>\n<li>GandCrab\u306e\u30a4\u30f3\u30b8\u30b1\u30fc\u30bf\u3092\u542b\u307f\u307e\u3059\u3002<\/li>\n<li>\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u5bfe\u7b56\u30e2\u30b8\u30e5\u30fc\u30eb\u3067GandCrab\u306e\u6697\u53f7\u5316\u306e\u632f\u308b\u821e\u3044\u3092\u691c\u51fa\u3057\u307e\u3059\u3002<\/li>\n<li>\u30ed\u30fc\u30ab\u30eb\u5206\u6790\u30fb\u691c\u51fa\u6a5f\u80fd\u306b\u3088\u308aGandCrab\u30d0\u30a4\u30ca\u30ea\u3092\u691c\u51fa\u3057\u307e\u3059\u3002<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/network-security\/next-generation-firewall\">\u6b21\u4e16\u4ee3\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb<\/a>: DNS\u30b7\u30b0\u30cd\u30c1\u30e3\u304c\u65e2\u77e5\u306e\u30b3\u30de\u30f3\u30c9&amp;\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\uff08C2\uff09\u30c9\u30e1\u30a4\u30f3\u3092\u691c\u51fa\u3057\u3001<a href=\"https:\/\/www.paloaltonetworks.jp\/products\/threat-detection-and-prevention\/web-security\">URL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0<\/a>\u3067\u540c\u30c9\u30e1\u30a4\u30f3\u3092\u30de\u30eb\u30a6\u30a7\u30a2\u3068\u3057\u3066\u5206\u985e\u3057\u307e\u3059\u3002<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/cortex\/autofocus\">AutoFocus<\/a>: \u95a2\u9023\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u3092<a href=\"https:\/\/autofocus.paloaltonetworks.com\/#\/tag\/Unit42.GandCrab\">GandCrab<\/a>\u30bf\u30b0\u3067\u8ffd\u8de1\u3057\u307e\u3059\u3002<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/cortex\/autofocus\">AutoFocus<\/a>: REvil\u3001\u307e\u305f\u306e\u540d\u3092<a href=\"https:\/\/autofocus.paloaltonetworks.com\/#\/tag\/Unit42.Sodinokibi\">Sodinokibi<\/a>\u306b\u95a2\u9023\u3059\u308b\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u3092\u540c\u30bf\u30b0\u3067\u8ffd\u8de1\u3057\u307e\u3059\u3002<\/li>\n<\/ul>\n<p>GandCrab \u306b\u95a2\u9023\u3059\u308b\u6307\u6a19\u306f\u3001\u3053\u3061\u3089\u306e<a href=\"https:\/\/github.com\/pan-unit42\/iocs\">GitHub<\/a>\u304b\u3089\u5229\u7528\u53ef\u80fd\u3067\u3059\u3002Unit 42\u306eTAXII<a href=\"https:\/\/github.com\/pan-unit42\/iocs\/tree\/master\/stix2-reports\/report_json\">\u30d5\u30a3\u30fc\u30c9<\/a>\u306b\u3082\u516c\u958b\u6e08\u307f\u3067\u3059\u3002<\/p>\n<p><strong><em>\u7d9a\u304d\u3092\u8aad\u3080: <a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/8\">Defray777<\/a><\/em><\/strong><\/p>\n<p><strong><em><a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/\">\u30c8\u30c3\u30d7\u306b\u623b\u308b<\/a><\/em><\/strong><\/p>\n<p><!--nextpage--><\/p>\n<h2><a id=\"post-117552-_c19c7abc49gi\"><\/a><em>\u8105\u5a01\u306e\u8a55\u4fa1\uff1aDefray777\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2<\/em><\/h2>\n<h3><a id=\"post-117552-_n41yi9jwwr88\"><\/a>\u6982\u8981<\/h3>\n<p>Defray\u306f<a href=\"https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/new-defray-ransomware-targets-education-and-healthcare-verticals\">2017\u5e74\u306b\u6700\u521d\u306b\u767a\u898b\u3055\u308c<\/a>\u3001\u30e6\u30fc\u30b6\u30fc\u3092\u3060\u307e\u3057\u3066Microsoft Word\u6587\u66f8\u306a\u3069\u306e\u60aa\u610f\u306e\u3042\u308b\u30d5\u30a1\u30a4\u30eb\u3092\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3055\u305b\u308b\u3001\u5c0f\u898f\u6a21\u3067\u7684\u3092\u7d5e\u3063\u305f\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30ad\u30e3\u30f3\u30da\u30fc\u30f3\u3092\u4ecb\u3057\u3066\u4f1d\u64ad\u3059\u308b\u3053\u3068\u304c\u78ba\u8a8d\u3055\u308c\u3066\u3044\u307e\u3059\u3002Defray 2018\u3001Target777\u3001<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-ransom-x-ransomware-used-in-texas-txdot-cyberattack\/\">Ransom X<\/a>\u3001<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/montreals-stm-public-transport-system-hit-by-ransomware-attack\/?_hsenc=p2ANqtz--TMeD-DcOlE_JbE5-1DKkStefcr1qAFppJIfTyGcye3y_Z5SsaryNC0zrBu7qu5iPsiwx0&amp;utm_campaign=Ad%20hoc%20social%20posts%20&amp;utm_content=143516149&amp;utm_medium=social&amp;utm_source=twitter&amp;hss_channel=tw-29175108\">RansomEXX<\/a>\u3068\u3082\u3088\u3070\u308c\u308bDefray777\u306f\u3001Defray\u3088\u308a\u306f\u308b\u304b\u306b\u6d17\u7df4\u3055\u308c\u3001<a href=\"https:\/\/www.speartip.com\/resources\/this-particular-ransomware-group-is-quickly-going-unnoticed\/\">2018\u5e74\u304b\u3089\u30a2\u30af\u30c6\u30a3\u30d6<\/a>\u3067\u3059\u3002\u3053\u306e\u65b0\u3057\u3044\u30de\u30eb\u30a6\u30a7\u30a2\u4e9c\u7a2e\u306f\u3001\u305d\u308c\u307e\u3067\u306b\u306f\u306a\u3044\u6280\u8853\u3092\u4f7f\u3063\u3066\u691c\u51fa\u3055\u308c\u306b\u304f\u304f\u3059\u308b\u3053\u3068\u304c\u78ba\u8a8d\u3055\u308c\u3066\u304a\u308a\u3001<a href=\"https:\/\/www.csoonline.com\/article\/3604599\/sprite-spider-emerging-as-one-of-the-most-destructive-ransomware-threat-actors.html\">Sprite Spider<\/a>\u3001<a href=\"https:\/\/www.secureworks.com\/research\/threat-profiles\/gold-dupont\">GOLD DUPONT<\/a>\u3068\u547c\u3070\u308c\u308b\u8105\u5a01\u30b0\u30eb\u30fc\u30d7\u306b\u5e30\u5c5e\u3057\u307e\u3059\u3002<\/p>\n<h3><a id=\"post-117552-_3zjjv3d9r5mc\"><\/a>Defray777\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u6982\u8981<\/h3>\n<p><img  class=\"alignnone size-full wp-image-117651 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2021\/03\/Ransomware-series-21-illustration_Defray777.png\" alt=\"Conceptual image representing Defray777 ransomware as part of the ransomware threat assessments companion to the 2021 Unit 42 Ransomware Threat Report. \" width=\"1587\" height=\"850\" \/><\/p>\n<p>2020\u5e74\u306eDefray777\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306f\u3001\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30ad\u30e3\u30f3\u30da\u30fc\u30f3\u306a\u3069\u306e\u4e00\u822c\u7684\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u653b\u6483\u30d9\u30af\u30c8\u30eb\u3092\u4f7f\u308f\u305a\u3001Vatet\u30ed\u30fc\u30c0\u3084PyXie RAT\u3001Cobalt Strike\u306a\u3069\u306e\u30c4\u30fc\u30eb\u3068\u9023\u643a\u3057\u3066\u3001\u8907\u6570\u306e\u7d44\u7e54\u306b\u5bfe\u3057\u3001\u5c11\u6570\u306e\u6a19\u7684\u578b\u653b\u6483\u306b\u3088\u3063\u3066\u914d\u4fe1\u3055\u308c\u307e\u3057\u305f\u3002<\/p>\n<figure id=\"attachment_117605\" aria-describedby=\"caption-attachment-117605\" style=\"width: 856px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-117606 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2021\/03\/word-image-85.png\" alt=\"\u56f31 Defray777\u8eab\u4ee3\u91d1\u30e1\u30e2\u306e\u30b9\u30af\u30ea\u30fc\u30f3\u30b7\u30e7\u30c3\u30c8\" width=\"856\" height=\"429\" \/><figcaption id=\"caption-attachment-117605\" class=\"wp-caption-text\">\u56f31Defray777\u8eab\u4ee3\u91d1\u30e1\u30e2\u306e\u30b9\u30af\u30ea\u30fc\u30f3\u30b7\u30e7\u30c3\u30c8<\/figcaption><\/figure>\n<p>Defray777\u306f\u5b8c\u5168\u306b\u30e1\u30e2\u30ea\u5185\u3067\u5b9f\u884c\u3055\u308c\u308b\u70b9\u306b\u7279\u5fb4\u304c\u3042\u308a\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b5\u30fc\u30c1\u30e3\u30fc\u306b\u8ffd\u8de1\u3055\u308c\u306b\u304f\u3044\u3082\u306e\u306b\u306a\u3063\u3066\u3044\u307e\u3059\u3002Defray777\u306f\u305d\u306e\u5b9f\u884c\u4e2d\u3001\u7279\u5b9a\u306e\u300c\u671b\u307e\u3057\u304f\u306a\u3044\u300d\u30b9\u30ec\u30c3\u30c9\u3084\u30d7\u30ed\u30bb\u30b9\u3092\u5f37\u5236\u7d42\u4e86\u3059\u308b\u6a5f\u80fd\u3092\u5099\u3048\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u5bfe\u8c61\u3068\u306a\u308b\u306e\u306f<span style=\"font-family: 'courier new', courier, monospace;\">powershell.exe\u3001rundll32.exe\u3001vmnat.exe\u3001wefault.exe<span style=\"font-family: georgia, palatino, serif;\">\u3001<\/span>explorer.exe<\/span>\u306a\u3069\u3067\u3059\u3002\u6697\u53f7\u5316\u51e6\u7406\u4e2d\u306e\u691c\u51fa\u3092\u907f\u3051\u308b\u305f\u3081\u3001\u30b7\u30b9\u30c6\u30e0\u306e\u30b3\u30a2\u3068\u306a\u308b\u6a5f\u80fd\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u3053\u3068\u306a\u304fAES-256\u6697\u53f7\u3067\u30d5\u30a1\u30a4\u30eb\u3092\u6697\u53f7\u5316\u3059\u308b\u6a5f\u80fd\u3092\u3082\u3061\u3001\u6697\u53f7\u5316\u306e\u5b8c\u4e86\u5f8c\u306b\u306e\u307f\u30b3\u30de\u30f3\u30c9\u3092\u5b9f\u884c\u3057\u307e\u3059\u3002\u3053\u306e\u305f\u3081\u3001EDR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306a\u3069\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c4\u30fc\u30eb\u304cDefray777\u306e\u60aa\u610f\u306e\u3042\u308b\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u3092\u8b66\u544a\u3067\u304d\u308b\u3088\u3046\u306b\u306a\u308b\u3053\u308d\u306b\u306f\u3001\u30d5\u30a1\u30a4\u30eb\u306f\u3059\u3067\u306b\u6697\u53f7\u5316\u3055\u308c\u3066\u3057\u307e\u3063\u3066\u3044\u307e\u3059\u30022020\u5e74\u3001Defray777\u306f\u6700\u8fd1\u306e\u79fb\u690d\u3092\u901a\u3058\u3066Windows\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3060\u3051\u3067\u306a\u304fLinux\u3082\u5bfe\u8c61\u3068\u3059\u308b\u3088\u3046\u306b\u9032\u5316\u3057\u3001Windows\u3068Linux\u306e\u4e21\u65b9\u3067\u30b9\u30bf\u30f3\u30c9\u30a2\u30ed\u30f3\u306e\u5b9f\u884c\u53ef\u80fd\u30d5\u30a1\u30a4\u30eb\u3092\u6301\u3064\u6700\u521d\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306b\u306a\u308a\u307e\u3057\u305f\u3002\u3053\u308c\u306b\u3088\u308a\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306f\u3001<a href=\"https:\/\/www.crowdstrike.com\/blog\/carbon-spider-sprite-spider-target-esxi-servers-with-ransomware\/\">VMWare ESXI \u30b5\u30fc\u30d0\u30fc<\/a>\u306e\u3088\u3046\u306bELF\u30d0\u30a4\u30ca\u30ea\u3092\u5b9f\u884c\u3067\u304d\u308b\u30a4\u30f3\u30d5\u30e9\u30b9\u30c8\u30e9\u30af\u30c1\u30e3\u306b\u5bfe\u3057\u3066Defray777\u3092\u6d3b\u7528\u3067\u304d\u308b\u3088\u3046\u306b\u306a\u308a\u307e\u3057\u305f\u3002<\/p>\n<p>2020\u5e74\u3001Defray777\u306e\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306f\u3001\u7c73\u56fd\u3001\u30ab\u30ca\u30c0\u3001\u30aa\u30fc\u30b9\u30c8\u30e9\u30ea\u30a2\u3001\u65e5\u672c\u3001\u30d5\u30e9\u30f3\u30b9\u3001\u30d6\u30e9\u30b8\u30eb\u306e\u30d8\u30eb\u30b9\u30b1\u30a2\u3001\u6559\u80b2\u3001\u88fd\u9020\u3001\u653f\u5e9c\u3001\u5efa\u8a2d\u3001\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u3001\u30cf\u30a4\u30c6\u30af\u30bb\u30af\u30bf\u3092\u6a19\u7684\u306b\u3057\u3066\u3044\u307e\u3057\u305f\u3002\u8eab\u4ee3\u91d1\u306e\u8981\u6c42\u984d\u306f\u901a\u5e38\u3001\u305d\u306e\u7279\u5b9a\u306e\u88ab\u5bb3\u8005\u3054\u3068\u306b\u8abf\u6574\u3055\u308c\u307e\u3059\u3002<\/p>\n<p>\u8a73\u7d30\u306a\u5206\u6790\u306f\u3001\u300c<a href=\"https:\/\/unit42.paloaltonetworks.jp\/vatet-pyxie-defray777\/3\/\">\u77e5\u3089\u308c\u3056\u308b\u30de\u30eb\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u3001Vatet\u3001PyXie\u3001Defray777 \u306e\u8a73\u7d30<\/a>\u300d\u306b\u516c\u958b\u6e08\u307f\u3067\u3059\u306e\u3067\u3053\u3061\u3089\u304b\u3089\u3054\u78ba\u8a8d\u304f\u3060\u3055\u3044\u3002<\/p>\n<p>Defray777\u306e\u88ab\u5bb3\u8005\u5b66\u306e\u8a73\u7d30\u306b\u3064\u3044\u3066\u306f\u3001<a href=\"https:\/\/start.paloaltonetworks.com\/unit-42-ransomware-threat-report\">2021 Unit 42\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u30ec\u30dd\u30fc\u30c8<\/a>\u3092\u53c2\u7167\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n<h3><a id=\"post-117552-_ypzkam7yqb65\"><\/a>\u884c\u52d5\u65b9\u91dd<\/h3>\n<p>\u3053\u306e\u30bb\u30af\u30b7\u30e7\u30f3\u3067\u306f\u3001Defray777\u306e\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u306b\u95a2\u9023\u3059\u308b\u6226\u8853\u3068\u624b\u6cd5\u3092\u6587\u66f8\u5316\u3057\u3001\u305d\u308c\u3089\u3092\u5f0a\u793e\u88fd\u54c1\u30fb\u30b5\u30fc\u30d3\u30b9\u306b\u76f4\u63a5\u30de\u30c3\u30d4\u30f3\u30b0\u3057\u307e\u3059\u3002\u307e\u305f\u3001\u304a\u5ba2\u69d8\u306b\u3066\u30c7\u30d0\u30a4\u30b9\u306e\u69cb\u6210\u304c\u6b63\u3057\u304f\u884c\u308f\u308c\u3066\u3044\u308b\u304b\u3069\u3046\u304b\u3092\u78ba\u8a8d\u3059\u308b\u65b9\u6cd5\u306b\u3064\u3044\u3066\u3082\u3054\u8aac\u660e\u3057\u307e\u3059\u3002<\/p>\n<table style=\"width: 99.0603%; height: 755px;\">\n<tbody>\n<tr style=\"height: 21px;\">\n<td style=\"width: 20.3859%; height: 21px;\"><strong>\u88fd\u54c1\/\u30b5\u30fc\u30d3\u30b9<\/strong><\/td>\n<td style=\"width: 175.224%; height: 21px;\"><strong>\u884c\u52d5\u65b9\u91dd<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 195.61%; text-align: center; height: 21px;\" colspan=\"2\"><strong>\u521d\u671f\u30a2\u30af\u30bb\u30b9<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 44px;\">\n<td style=\"width: 195.61%; text-align: center; height: 44px;\" colspan=\"2\">\u4ee5\u4e0b\u306e\u4e00\u9023\u306e\u30a2\u30af\u30b7\u30e7\u30f3\u306f\u3001\u6b21\u306e\u30c6\u30af\u30cb\u30c3\u30af\u3092\u7de9\u548c\u3057\u307e\u3059\u3002<br \/>\n<strong>Spearphishing Attachment [T1566.001]\uff08\u6dfb\u4ed8\u30d5\u30a1\u30a4\u30eb\u578b\u30b9\u30d4\u30a2\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\uff09<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 20.3859%; height: 21px;\">NGFW<\/td>\n<td style=\"width: 175.224%; height: 21px;\">\u30d5\u30a1\u30a4\u30eb\u30d6\u30ed\u30c3\u30af\u3092\u8a2d\u5b9a\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 20.3859%; height: 42px;\" rowspan=\"2\">\u8105\u5a01\u9632\u5fa1<em>\u2020<\/em><\/td>\n<td style=\"width: 175.224%; height: 21px;\">imap\u3001pop3\u3092\u9664\u304f\u3059\u3079\u3066\u306e\u30c7\u30b3\u30fc\u30c0\u3067\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u30d6\u30ed\u30c3\u30af\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 175.224%; height: 21px;\">\u30bb\u30ad\u30e5\u30a2\u306a\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u95a2\u9023\u3059\u308b\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u306b\u9069\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 20.3859%; height: 147px;\" rowspan=\"7\">WildFire<em>\u2020<\/em><\/td>\n<td style=\"width: 175.224%; height: 21px;\">WildFire\u30d5\u30a1\u30a4\u30eb\u30b5\u30a4\u30ba\u306e\u30a2\u30c3\u30d7\u30ed\u30fc\u30c9\u5236\u9650\u304c\u6700\u5927\u5316\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 175.224%; height: 21px;\">WildFire\u30d5\u30a1\u30a4\u30eb\u30d6\u30ed\u30c3\u30af\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u306e\u3059\u3079\u3066\u306e\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3001\u30d5\u30a1\u30a4\u30eb\u30bf\u30a4\u30d7\u306b\u3064\u3044\u3066\u3001\u8ee2\u9001\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 175.224%; height: 21px;\">\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3067WildFire\u5206\u6790\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 175.224%; height: 21px;\">\u5fa9\u53f7\u3057\u305f\u30b3\u30f3\u30c6\u30f3\u30c4\u306eWildFire\u3078\u306e\u8ee2\u9001\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 175.224%; height: 21px;\">\u3059\u3079\u3066\u306eWildFire\u30bb\u30c3\u30b7\u30e7\u30f3\u60c5\u5831\u8a2d\u5b9a\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 175.224%; height: 21px;\">WildFire\u306b\u3088\u3063\u3066\u691c\u51fa\u3055\u308c\u305f\u60aa\u610f\u306e\u3042\u308b\u30d5\u30a1\u30a4\u30eb\u306b\u5bfe\u3059\u308b\u30a2\u30e9\u30fc\u30c8\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 175.224%; height: 21px;\">\u300cWildFire\u306e\u66f4\u65b0\u30b9\u30b1\u30b8\u30e5\u30fc\u30eb\u300d\u304c\u6bce\u5206\u3054\u3068\u306b\u66f4\u65b0\u3092\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3066\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b\u3088\u3046\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 20.3859%; height: 21px;\">Cortex XDR<\/td>\n<td style=\"width: 175.224%; height: 21px;\">\u30de\u30eb\u30a6\u30a7\u30a2 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3092\u69cb\u6210\u3059\u308b<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 20.3859%; height: 42px;\" rowspan=\"2\">Cortex XSOAR<\/td>\n<td style=\"width: 175.224%; height: 21px;\">XSOAR \u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u30c7\u30d7\u30ed\u30a4 - Phishing Investigation - Generic V2<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 175.224%; height: 21px;\">XSOAR \u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u30c7\u30d7\u30ed\u30a4 - Endpoint Malware Investigation<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 195.61%; text-align: center; height: 21px;\" colspan=\"2\"><strong>\u521d\u671f\u30a2\u30af\u30bb\u30b9\u3001\u30e9\u30c6\u30e9\u30eb\u30e0\u30fc\u30d6\u30e1\u30f3\u30c8\uff08\u6a2a\u5c55\u958b\u3001\u6c34\u5e73\u5c55\u958b\uff09<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 44px;\">\n<td style=\"width: 195.61%; text-align: center; height: 44px;\" colspan=\"2\">\u4ee5\u4e0b\u306e\u4e00\u9023\u306e\u30a2\u30af\u30b7\u30e7\u30f3\u306f\u3001\u6b21\u306e\u30c6\u30af\u30cb\u30c3\u30af\u3092\u7de9\u548c\u3057\u307e\u3059\u3002<br \/>\n<strong>Replication Through Removable Media [T1091]\uff08\u30ea\u30e0\u30fc\u30d0\u30d6\u30eb\u30e1\u30c7\u30a3\u30a2\u7d4c\u7531\u306e\u8907\u88fd\uff09<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 20.3859%; height: 21px;\">Cortex XDR<\/td>\n<td style=\"width: 175.224%; height: 21px;\">\u30c7\u30d0\u30a4\u30b9\u5236\u5fa1\u3092\u6709\u52b9\u306b\u3059\u308b<\/td>\n<\/tr>\n<tr style=\"height: 34px;\">\n<td style=\"width: 195.61%; text-align: center; height: 34px;\" colspan=\"2\"><strong>\u7279\u6a29\u6607\u683c\u3001\u9632\u5fa1\u56de\u907f<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 41px;\">\n<td style=\"width: 195.61%; text-align: center; height: 41px;\" colspan=\"2\">\u4ee5\u4e0b\u306e\u4e00\u9023\u306e\u30a2\u30af\u30b7\u30e7\u30f3\u306f\u3001\u6b21\u306e\u30c6\u30af\u30cb\u30c3\u30af\u3092\u7de9\u548c\u3057\u307e\u3059\u3002<br \/>\n<strong>Process Injection [T1055]\uff08\u30d7\u30ed\u30bb\u30b9\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\uff09<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 20.3859%; height: 42px;\" rowspan=\"2\">Cortex XDR<\/td>\n<td style=\"width: 175.224%; height: 21px;\">\u30a2\u30f3\u30c1\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u30d7\u30ed\u30c6\u30af\u30b7\u30e7\u30f3\u3092\u6709\u52b9\u306b\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 175.224%; height: 21px;\">\u30a2\u30f3\u30c1\u30de\u30eb\u30a6\u30a7\u30a2\u30d7\u30ed\u30c6\u30af\u30b7\u30e7\u30f3\u3092\u6709\u52b9\u306b\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 195.61%; text-align: center; height: 21px;\" colspan=\"2\"><strong>\u9632\u885b\u56de\u907f\u3001\u63a2\u7d22<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 44px;\">\n<td style=\"width: 195.61%; text-align: center; height: 44px;\" colspan=\"2\">\u4ee5\u4e0b\u306e\u4e00\u9023\u306e\u30a2\u30af\u30b7\u30e7\u30f3\u306f\u3001\u6b21\u306e\u30c6\u30af\u30cb\u30c3\u30af\u3092\u7de9\u548c\u3057\u307e\u3059\u3002<br \/>\n<strong>Masquerade Task or Service [T1036.004]\uff08\u30bf\u30b9\u30af\u3084\u30b5\u30fc\u30d3\u30b9\u306e\u30de\u30b9\u30ab\u30ec\u30fc\u30c9\uff09\u3001<br \/>\nProcess Discovery [T1057]\uff08\u30d7\u30ed\u30bb\u30b9\u306e\u63a2\u7d22\uff09<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 20.3859%; height: 21px;\">Cortex XDR<\/td>\n<td style=\"width: 175.224%; height: 21px;\">\u30de\u30eb\u30a6\u30a7\u30a2\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3067Behavioral Threat Protection\uff08BTP\uff09\u3092\u8a2d\u5b9a\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 195.61%; height: 21px; text-align: center;\" colspan=\"2\"><strong>\u5f71\u97ff<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 44px;\">\n<td style=\"width: 195.61%; height: 44px; text-align: center;\" colspan=\"2\">\u4ee5\u4e0b\u306e\u4e00\u9023\u306e\u30a2\u30af\u30b7\u30e7\u30f3\u306f\u3001\u6b21\u306e\u30c6\u30af\u30cb\u30c3\u30af\u3092\u7de9\u548c\u3057\u307e\u3059\u3002<br \/>\n<strong>Data Encrypted for Impact [T1486]\uff08\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u305f\u3081\u306e\u30c7\u30fc\u30bf\u6697\u53f7\u5316\uff09\u3001<br \/>\nInhibit System Recovery [T1490]\uff08\u30b7\u30b9\u30c6\u30e0\u306e\u5fa9\u5143\u7981\u6b62\uff09<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 20.3859%; height: 42px;\" rowspan=\"2\">Cortex XSOAR<\/td>\n<td style=\"width: 175.224%; height: 21px;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Ransomware Manual for incident response<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td style=\"width: 175.224%; height: 21px;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 - Palo Alto Networks Endpoint Malware Investigation<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: center;\"><span style=\"font-size: 12pt;\"><sup><span style=\"color: #999999;\"><em>\u88681 Defray777\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u884c\u52d5\u65b9\u91dd<br \/>\n<\/em><\/span><\/sup><\/span><span style=\"font-size: 12pt;\"><sup><span style=\"color: #999999;\"><em>\u2020\u3053\u308c\u3089\u306e\u6a5f\u80fd\u306f\u3001NGFW\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30d6\u30b9\u30af\u30ea\u30d7\u30b7\u30e7\u30f3\u30b5\u30fc\u30d3\u30b9\u306e\u4e00\u90e8\u3067\u3059<\/em><\/span><\/sup><\/span><\/p>\n<h3><a id=\"post-117552-_rzpzdw7rp9va\"><\/a>\u7d50\u8ad6<\/h3>\n<p>Defray777\u306f\u3001\u3044\u304b\u306b\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u304c\u6642\u9593\u306e\u7d4c\u904e\u3068\u3068\u3082\u306b\u9032\u5316\u3057\u3001\u307e\u3063\u305f\u304f\u65b0\u3057\u3044\u3084\u308a\u304b\u305f\u3067\u6df1\u523b\u306a\u640d\u5bb3\u3092\u4e0e\u3048\u3046\u308b\u306e\u304b\u3092\u793a\u3059\u683c\u597d\u306e\u4f8b\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u3002\u3055\u3089\u306b\u3053\u306e\u65b0\u305f\u306a\u4e9c\u7a2e\u306e\u59cb\u307e\u308a\u306f\u3001\u8105\u5a01\u653b\u6483\u8005\u304c\u72ec\u81ea\u6226\u8853\u3092\u6d3b\u7528\u3057\u3001\u6700\u65b0\u691c\u51fa\u624b\u6cd5\u3092\u56de\u907f\u3059\u308b\u3053\u3068\u3067\u3001\u6355\u6349\u3092\u56de\u907f\u3067\u304d\u308b\u3068\u3044\u3046\u3053\u3068\u3082\u5f37\u8abf\u3057\u3066\u3044\u307e\u3059\u3002Linux\u306e\u4f8b\u306e\u3088\u3046\u306b\u3001\u3053\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u304c\u62e1\u5f35\u3055\u308c\u3001\u3055\u3089\u306b\u8ffd\u52a0\u306e\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u3088\u3046\u306b\u306a\u308c\u3070\u3001\u4eca\u5f8c\u3055\u3089\u306b\u5927\u304d\u306a\u5f71\u97ff\u3092\u4e0e\u3048\u3046\u308b\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<p>\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306fDefray777\u3092\u6b21\u306e\u65b9\u6cd5\u3067\u691c\u51fa\/\u9632\u6b62\u3057\u307e\u3059\u3002<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/products\/secure-the-network\/wildfire\">WildFire<\/a>: \u65e2\u77e5\u306e\u30b5\u30f3\u30d7\u30eb\u306f\u3059\u3079\u3066\u30de\u30eb\u30a6\u30a7\u30a2\u3068\u3057\u3066\u8b58\u5225\u3055\u308c\u307e\u3059\u3002<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/cortex\/cortex-xdr\">Cortex XDR<\/a>:\n<ul>\n<li>Defray777\u306e\u30a4\u30f3\u30b8\u30b1\u30fc\u30bf\u3092\u542b\u307f\u307e\u3059\u3002<\/li>\n<li>\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u5bfe\u7b56\u30e2\u30b8\u30e5\u30fc\u30eb\u3067Defray777\u306e\u6697\u53f7\u5316\u306e\u632f\u308b\u821e\u3044\u3092\u691c\u51fa\u3057\u307e\u3059\u3002<\/li>\n<li>\u30ed\u30fc\u30ab\u30eb\u5206\u6790\u30fb\u691c\u51fa\u6a5f\u80fd\u306b\u3088\u308aDefray777\u30d0\u30a4\u30ca\u30ea\u3092\u691c\u51fa\u3057\u307e\u3059\u3002<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/network-security\/next-generation-firewall\">\u6b21\u4e16\u4ee3\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb<\/a>: DNS\u30b7\u30b0\u30cd\u30c1\u30e3\u304c\u65e2\u77e5\u306e\u30b3\u30de\u30f3\u30c9&amp;\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\uff08C2\uff09\u30c9\u30e1\u30a4\u30f3\u3092\u691c\u51fa\u3057\u3001<a href=\"https:\/\/www.paloaltonetworks.jp\/products\/threat-detection-and-prevention\/web-security\">URL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0<\/a>\u3067\u540c\u30c9\u30e1\u30a4\u30f3\u3092\u30de\u30eb\u30a6\u30a7\u30a2\u3068\u3057\u3066\u5206\u985e\u3057\u307e\u3059\u3002<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/cortex\/autofocus\">AutoFocus<\/a>: \u95a2\u9023\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u3092Defray777\u306e\u5225\u540d\u3067\u3042\u308b<a href=\"https:\/\/autofocus.paloaltonetworks.com\/#\/tag\/Unit42.RansomX\">RansomX<\/a>\u30bf\u30b0\u3067\u8ffd\u8de1\u3057\u307e\u3059\u3002<\/li>\n<\/ul>\n<p>Defray777 \u306b\u95a2\u9023\u3059\u308b\u6307\u6a19\u306f\u3001\u3053\u3061\u3089\u306e<a href=\"https:\/\/github.com\/pan-unit42\/iocs\">GitHub<\/a>\u304b\u3089\u5229\u7528\u53ef\u80fd\u3067\u3059\u3002Unit 42\u306eTAXII<a href=\"https:\/\/github.com\/pan-unit42\/iocs\/tree\/master\/stix2-reports\/report_json\">\u30d5\u30a3\u30fc\u30c9<\/a>\u306b\u3082\u516c\u958b\u6e08\u307f\u3067\u3059\u3002<\/p>\n<h3><a id=\"post-117552-_za0869mx71f6\"><\/a>\u8ffd\u52a0\u8cc7\u6599<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/new-defray-ransomware-targets-education-and-healthcare-verticals\">New Defray Ransomware Targets Education and Healthcare Verticals<\/a><\/li>\n<li><a href=\"https:\/\/www.speartip.com\/resources\/this-particular-ransomware-group-is-quickly-going-unnoticed\/\">This Particular Ransomware Group is Going Unnoticed<\/a><\/li>\n<li><a href=\"https:\/\/www.csoonline.com\/article\/3604599\/sprite-spider-emerging-as-one-of-the-most-destructive-ransomware-threat-actors.html\">Sprite Spider emerging as one of the most destructive ransomware threat actors<\/a><\/li>\n<li><a href=\"https:\/\/www.crowdstrike.com\/blog\/carbon-spider-sprite-spider-target-esxi-servers-with-ransomware\/\">Hypervisor Jackpotting: CARBON SPIDER and SPRITE SPIDER Target ESXI Servers With Ransomware to Maximize Impact<\/a><\/li>\n<li><a href=\"https:\/\/unit42.paloaltonetworks.jp\/vatet-pyxie-defray777\/3\/\">\u77e5\u3089\u308c\u3056\u308b\u30de\u30eb\u30a6\u30a7\u30a2\u30d5\u30a1\u30df\u30ea\u3001Vatet\u3001PyXie\u3001Defray777 \u306e\u8a73\u7d30<\/a><\/li>\n<\/ul>\n<p><strong><em><a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/\">\u30c8\u30c3\u30d7\u306b\u623b\u308b<\/a><\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This set of ransomware threat assessments is a companion to the Unit 42 Ransomware Threat Report, covering common ransomware families and IOCs.<\/p>\n","protected":false},"author":23,"featured_media":134366,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4332,4430,1974,3057,4432],"tags":[6071,6073,6075,5657,6077,6079,5223,5421,6080],"product_categories":[],"coauthors":[1025],"class_list":["post-117672","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trend-reports","category-trend-reports-ja","category-malware-ja","category-ransomware-ja","category-top-cyberthreats-ja","tag-defray777-ja","tag-dharma-ja","tag-doppelpaymer-ja","tag-gandcrab-ja","tag-netwalker-ja","tag-phobos-ja","tag-ransomware-threat-report-ja","tag-revil-ja","tag-zeppelin"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u8105\u5a01\u8a55\u4fa1:\u300e2021 Unit 42\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u30ec\u30dd\u30fc\u30c8\u300f\u306e\u624b\u5f15\u304d<\/title>\n<meta name=\"description\" content=\"This set of ransomware threat assessments is a companion to the Unit 42 Ransomware Threat Report, covering common ransomware families and IOCs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/unit42.paloaltonetworks.com\/ja\/ransomware-threat-assessments\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u8105\u5a01\u8a55\u4fa1:\u300e2021 Unit 42\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u30ec\u30dd\u30fc\u30c8\u300f\u306e\u624b\u5f15\u304d\" \/>\n<meta property=\"og:description\" content=\"This set of ransomware threat assessments is a companion to the Unit 42 Ransomware Threat Report, covering common ransomware families and IOCs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/unit42.paloaltonetworks.com\/ja\/ransomware-threat-assessments\/\" \/>\n<meta property=\"og:site_name\" content=\"Unit 42\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-17T10:00:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-18T06:51:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2024\/06\/05_Ransomware_Category_1920x900.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Unit 42\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u8105\u5a01\u8a55\u4fa1:\u300e2021 Unit 42\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u30ec\u30dd\u30fc\u30c8\u300f\u306e\u624b\u5f15\u304d","description":"This set of ransomware threat assessments is a companion to the Unit 42 Ransomware Threat Report, covering common ransomware families and IOCs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/unit42.paloaltonetworks.com\/ja\/ransomware-threat-assessments\/","next":"https:\/\/unit42.paloaltonetworks.com\/ja\/ransomware-threat-assessments\/2\/","og_locale":"ja_JP","og_type":"article","og_title":"\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u8105\u5a01\u8a55\u4fa1:\u300e2021 Unit 42\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u30ec\u30dd\u30fc\u30c8\u300f\u306e\u624b\u5f15\u304d","og_description":"This set of ransomware threat assessments is a companion to the Unit 42 Ransomware Threat Report, covering common ransomware families and IOCs.","og_url":"https:\/\/unit42.paloaltonetworks.com\/ja\/ransomware-threat-assessments\/","og_site_name":"Unit 42","article_published_time":"2021-03-17T10:00:50+00:00","article_modified_time":"2021-03-18T06:51:05+00:00","og_image":[{"width":1920,"height":900,"url":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2024\/06\/05_Ransomware_Category_1920x900.jpg","type":"image\/jpeg"}],"author":"Unit 42","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/ransomware-threat-assessments\/#article","isPartOf":{"@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/ransomware-threat-assessments\/"},"author":{"name":"Unit 42","@id":"https:\/\/unit42.paloaltonetworks.com\/#\/schema\/person\/a891f81d18648a1e0bab742238d31a63"},"headline":"\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u8105\u5a01\u8a55\u4fa1:\u300e2021 Unit 42\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u30ec\u30dd\u30fc\u30c8\u300f\u306e\u624b\u5f15\u304d","datePublished":"2021-03-17T10:00:50+00:00","dateModified":"2021-03-18T06:51:05+00:00","mainEntityOfPage":{"@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/ransomware-threat-assessments\/"},"wordCount":1643,"commentCount":0,"image":{"@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/ransomware-threat-assessments\/#primaryimage"},"thumbnailUrl":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2024\/06\/05_Ransomware_Category_1920x900.jpg","keywords":["Defray777","Dharma","DoppelPaymer","GandCrab","NetWalker","Phobos","ransomware threat report","REvil","Zeppelin"],"articleSection":["Trend Reports","\u30c8\u30ec\u30f3\u30c9 \u30ec\u30dd\u30fc\u30c8","\u30de\u30eb\u30a6\u30a7\u30a2","\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2","\u4e3b\u306a\u30b5\u30a4\u30d0\u30fc\u8105\u5a01"],"inLanguage":"ja","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/unit42.paloaltonetworks.com\/ja\/ransomware-threat-assessments\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/ransomware-threat-assessments\/","url":"https:\/\/unit42.paloaltonetworks.com\/ja\/ransomware-threat-assessments\/","name":"\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u8105\u5a01\u8a55\u4fa1:\u300e2021 Unit 42\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u30ec\u30dd\u30fc\u30c8\u300f\u306e\u624b\u5f15\u304d","isPartOf":{"@id":"https:\/\/unit42.paloaltonetworks.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/ransomware-threat-assessments\/#primaryimage"},"image":{"@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/ransomware-threat-assessments\/#primaryimage"},"thumbnailUrl":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2024\/06\/05_Ransomware_Category_1920x900.jpg","datePublished":"2021-03-17T10:00:50+00:00","dateModified":"2021-03-18T06:51:05+00:00","author":{"@id":"https:\/\/unit42.paloaltonetworks.com\/#\/schema\/person\/a891f81d18648a1e0bab742238d31a63"},"description":"This set of ransomware threat assessments is a companion to the Unit 42 Ransomware Threat Report, covering common ransomware families and IOCs.","inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/unit42.paloaltonetworks.com\/ja\/ransomware-threat-assessments\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/ransomware-threat-assessments\/#primaryimage","url":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2024\/06\/05_Ransomware_Category_1920x900.jpg","contentUrl":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2024\/06\/05_Ransomware_Category_1920x900.jpg","width":1920,"height":900,"caption":"A digital graphic of a U.S. dollar bill disintegrating into pixels, symbolizing digital transformation or the concept of cryptocurrency against a backdrop of a dark, tech-inspired visual theme."},{"@type":"WebSite","@id":"https:\/\/unit42.paloaltonetworks.com\/#website","url":"https:\/\/unit42.paloaltonetworks.com\/","name":"Unit 42","description":"Palo Alto Networks","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/unit42.paloaltonetworks.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Person","@id":"https:\/\/unit42.paloaltonetworks.com\/#\/schema\/person\/a891f81d18648a1e0bab742238d31a63","name":"Unit 42","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/unit42.paloaltonetworks.com\/#\/schema\/person\/image\/24dfba25c0e71d4de1836b78795bc2e5","url":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/09\/Insights_headshot-placeholder-300x300.jpg","contentUrl":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/09\/Insights_headshot-placeholder-300x300.jpg","caption":"Unit 42"},"url":"https:\/\/unit42.paloaltonetworks.com\/ja\/author\/unit42\/"}]}},"_links":{"self":[{"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/posts\/117672","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/comments?post=117672"}],"version-history":[{"count":11,"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/posts\/117672\/revisions"}],"predecessor-version":[{"id":117785,"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/posts\/117672\/revisions\/117785"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/media\/134366"}],"wp:attachment":[{"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/media?parent=117672"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/categories?post=117672"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/tags?post=117672"},{"taxonomy":"product_categories","embeddable":true,"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/product_categories?post=117672"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/coauthors?post=117672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}