{"id":124687,"date":"2022-08-24T18:12:09","date_gmt":"2022-08-25T01:12:09","guid":{"rendered":"https:\/\/unit42.paloaltonetworks.com\/?p=124687"},"modified":"2022-08-29T17:36:17","modified_gmt":"2022-08-30T00:36:17","slug":"threat-assessment-black-basta-ransomware","status":"publish","type":"post","link":"https:\/\/unit42.paloaltonetworks.com\/ja\/threat-assessment-black-basta-ransomware\/","title":{"rendered":"\u8105\u5a01\u306e\u8a55\u4fa1\uff1aBlack Basta\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2"},"content":{"rendered":"<h2><a id=\"post-124687-_n41yi9jwwr88\"><\/a>\u6982\u8981<\/h2>\n<p>Black Basta\u306f2022\u5e744\u6708\u306b\u521d\u3081\u3066\u767b\u5834\u3057\u305fRaaS(\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30fb\u30a2\u30ba\u30fb\u30a2\u30fb\u30b5\u30fc\u30d3\u30b9)\u3067\u3059\u304c\u3001\u30a8\u30d3\u30c7\u30f3\u30b9\u304b\u3089\u306f2\u6708\u306b\u306f\u3059\u3067\u306b\u958b\u767a\u4e2d\u3067\u3042\u3063\u305f\u3053\u3068\u304c\u3046\u304b\u304c\u308f\u308c\u307e\u3059\u3002Black Basta\u306e\u30aa\u30da\u30ec\u30fc\u30bf\u306f\u300c\u4e8c\u91cd\u6050\u559d\u300d\u306e\u6280\u8853\u3092\u4f7f\u3044\u307e\u3059\u3002\u3064\u307e\u308a\u3001\u6a19\u7684\u7d44\u7e54\u306e\u30b7\u30b9\u30c6\u30e0\u4e0a\u306e\u30d5\u30a1\u30a4\u30eb\u3092\u6697\u53f7\u5316\u3057\u3066\u300c\u5fa9\u53f7\u3057\u305f\u3051\u308c\u3070\u8eab\u4ee3\u91d1\u3092\u6255\u3048\u300d\u3068\u8981\u6c42\u3059\u308b\u307b\u304b\u3001\u30c0\u30fc\u30af\u30a6\u30a7\u30d6\u4e0a\u3067\u30ea\u30fc\u30af\u30b5\u30a4\u30c8\u3092\u7ba1\u7406\u3057\u3066\u300c\u8eab\u4ee3\u91d1\u3092\u652f\u6255\u308f\u306a\u3044\u306a\u3089\u3053\u3053\u306b\u6a5f\u5bc6\u60c5\u5831\u3092\u63b2\u8f09\u3059\u308b\u300d\u3068\u8105\u3057\u307e\u3059\u3002<\/p>\n<p>Black Basta\u306e\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u306b\u3088\u308bBlack Basta\u306e\u5c55\u958b\u3084\u7d44\u7e54\u306e\u8105\u8feb\u306f\u540c\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u51fa\u73fe\u5f53\u521d\u304b\u3089\u975e\u5e38\u306b\u6d3b\u767a\u3067\u3059\u3002\u6d3b\u52d5\u306f\u3053\u30532\u30013\u30f6\u6708\u9593\u3057\u304b\u884c\u308f\u308c\u3066\u3044\u306a\u3044\u306b\u3082\u304b\u304b\u308f\u3089\u305a\u3001\u30ea\u30fc\u30af\u30b5\u30a4\u30c8\u306b\u63b2\u8f09\u3055\u308c\u305f\u60c5\u5831\u304b\u3089\u306f\u3001\u672c\u7a3f\u57f7\u7b46\u6642\u70b9\u3067\u3059\u3067\u306b75\u4ee5\u4e0a\u306e\u7d44\u7e54\u304c\u4fb5\u5bb3\u3055\u308c\u3066\u3044\u307e\u3059\u3002Unit 42\u3082\u3053\u308c\u307e\u3067\u306b\u8907\u6570\u306eBlack Basta\u306e\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u30ec\u30b9\u30dd\u30f3\u30b9\u6848\u4ef6\u3092\u51e6\u7406\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u3053\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306fC++\u3067\u66f8\u304b\u308c\u3066\u304a\u308a\u3001Windows\u3068Linux\u306e\u4e21\u30aa\u30da\u30ec\u30fc\u30c6\u30a3\u30f3\u30b0\u30b7\u30b9\u30c6\u30e0\u306b\u5f71\u97ff\u3057\u307e\u3059\u3002\u3053\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306f\u3001ChaCha20\u3068RSA-4096\u3092\u7d44\u307f\u5408\u308f\u305b\u3066\u30e6\u30fc\u30b6\u30fc\u30c7\u30fc\u30bf\u3092\u6697\u53f7\u5316\u3057\u307e\u3059\u3002\u6697\u53f7\u5316\u51e6\u7406\u3092\u9ad8\u901f\u5316\u3059\u308b\u305f\u3081\u300164\u30d0\u30a4\u30c8\u306e\u30c1\u30e3\u30f3\u30af\u5358\u4f4d\u3067\u6697\u53f7\u5316\u3057\u3001\u6697\u53f7\u5316\u3057\u305f\u30c1\u30e3\u30f3\u30af\u306e\u9593\u306b\u306f128\u30d0\u30a4\u30c8\u5206\u306e\u30c7\u30fc\u30bf\u3092\u6697\u53f7\u5316\u305b\u305a\u306b\u6b8b\u3057\u307e\u3059\u3002\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u6697\u53f7\u5316\u901f\u5ea6\u304c\u901f\u3051\u308c\u3070\u3001\u9632\u5fa1\u767a\u52d5\u304c\u5f8c\u624b\u306b\u307e\u308f\u3063\u3066\u591a\u304f\u306e\u30b7\u30b9\u30c6\u30e0\u304c\u4fb5\u5bb3\u3055\u308c\u308b\u304a\u305d\u308c\u304c\u3042\u308a\u307e\u3059\u3002\u3053\u308c\u3053\u305d\u304c\u3001\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30fb\u30a2\u30ba\u30fb\u30a2\u30fb\u30b5\u30fc\u30d3\u30b9(RaaS)\u30b0\u30eb\u30fc\u30d7\u306b\u53c2\u52a0\u3059\u308b\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u304c\u91cd\u8996\u3059\u308b\u30dd\u30a4\u30f3\u30c8\u3067\u3059\u3002<\/p>\n<p>\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306e\u304a\u5ba2\u69d8\u306f\u3001<a href=\"https:\/\/www.paloaltonetworks.jp\/cortex\/cortex-xdr\">Cortex XDR<\/a>\u3084<a href=\"https:\/\/www.paloaltonetworks.jp\/network-security\/next-generation-firewall\">WildFire<\/a>\u306a\u3069\u306e<a href=\"https:\/\/www.paloaltonetworks.jp\/network-security\/security-subscriptions\">\u30af\u30e9\u30a6\u30c9\u63d0\u4f9b\u578b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30d6\u30b9\u30af\u30ea\u30d7\u30b7\u30e7\u30f3<\/a>\u30b5\u30fc\u30d3\u30b9\u3092\u6709\u52b9\u5316\u3057\u305f<a href=\"https:\/\/www.paloaltonetworks.jp\/network-security\/next-generation-firewall\">\u6b21\u4e16\u4ee3\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb<\/a>\u88fd\u54c1\u30fb\u30b5\u30fc\u30d3\u30b9\u3092\u901a\u3058\u3001Black Basta\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u691c\u51fa\u30fb\u9632\u6b62\u306b\u5bfe\u3059\u308b\u652f\u63f4\u3092\u53d7\u3051\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u4fb5\u5bb3\u306e\u61f8\u5ff5\u304c\u3042\u308a\u5f0a\u793e\u306b\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u30ec\u30b9\u30dd\u30f3\u30b9\u306b\u95a2\u3059\u308b\u3054\u76f8\u8ac7\u3092\u306a\u3055\u308a\u305f\u3044\u5834\u5408\u306f\u3001infojapan@paloaltonetworks.com \u307e\u3067\u96fb\u5b50\u30e1\u30fc\u30eb\u306b\u3066\u3054\u9023\u7d61\u304f\u3060\u3055\u3044 (\u3054\u76f8\u8ac7\u306f\u5f0a\u793e\u88fd\u54c1\u306e\u304a\u5ba2\u69d8\u306b\u306f\u9650\u5b9a\u3055\u308c\u307e\u305b\u3093)\u3002\u307e\u305f\u5f0a\u793e<a href=\"https:\/\/www.paloaltonetworks.com\/unit42\/assess\">\u30b5\u30a4\u30d0\u30fc\u30ea\u30b9\u30af\u30de\u30cd\u30b8\u30e1\u30f3\u30c8\u30b5\u30fc\u30d3\u30b9<\/a>\u3092\u30ea\u30af\u30a8\u30b9\u30c8\u3044\u305f\u3060\u3051\u308c\u3070\u4e88\u9632\u7684\u63aa\u7f6e\u3092\u8b1b\u3058\u308b\u3053\u3068\u3082\u3067\u304d\u307e\u3059\u3002<\/p>\n<table>\n<tbody>\n<tr>\n<td>Unit 42\u306e\u95a2\u9023\u30c8\u30d4\u30c3\u30af<\/td>\n<td><a href=\"https:\/\/unit42.paloaltonetworks.jp\/category\/ransomware-ja\/\">Ransomware<\/a>, <a href=\"https:\/\/unit42.paloaltonetworks.jp\/tag\/threat-assessment-ja\/\">Threat Assessments<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><a id=\"post-124687-_jk4hwu21xe1k\"><\/a>\u76ee\u6b21<\/h2>\n<ul>\n<li><a href=\"#post-124687-_v32di15632mz\">Black Basta\u306e\u6982\u8981<\/a><\/li>\n<li><a href=\"#post-124687-_7gth3kgjopeu\">\u6280\u8853\u7684\u8a73\u7d30<\/a><\/li>\n<li><a href=\"#post-124687-_2x9n84rg8t6g\">TTP(\u6226\u8853\u3001\u6280\u8853\u3001\u304a\u3088\u3073\u624b\u9806)<\/a><\/li>\n<li><a href=\"#post-124687-_hcs41w34sodw\">\u72d9\u308f\u308c\u3084\u3059\u3044\u7d44\u7e54<\/a><\/li>\n<li><a href=\"#post-124687-_uht0xos2b4zh\">\u884c\u52d5\u6307\u91dd<\/a><\/li>\n<li><a href=\"#post-124687-_5ke50eq39xq0\">\u7d50\u8ad6<\/a><\/li>\n<li><a href=\"#post-124687-_b88wszsrtyea\">\u8ffd\u52a0\u30ea\u30bd\u30fc\u30b9<\/a><\/li>\n<\/ul>\n<h2><a id=\"post-124687-_v32di15632mz\"><\/a>Black Basta\u306e\u6982\u8981<\/h2>\n<p>Black Basta\u306f\u653b\u6483\u306b<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2022\/04\/ransomware-trends-demands-dark-web-leak-sites\/?lang=ja\">\u4e8c\u91cd\u6050\u559d<\/a>\u3092\u4f7f\u3046RaaS(\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30fb\u30a2\u30ba\u30fb\u30a2\u30fb\u30b5\u30fc\u30d3\u30b9)\u3067\u3059\u3002\u653b\u6483\u8005\u306f\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3092\u5b9f\u884c\u3059\u308b\u3060\u3051\u3067\u306a\u304f\u3001\u6a5f\u5bc6\u30c7\u30fc\u30bf\u3092\u6f0f\u51fa\u3055\u305b\u3066\u300c\u8eab\u4ee3\u91d1\u3092\u652f\u6255\u308f\u306a\u3051\u308c\u3070\u30c7\u30fc\u30bf\u3092\u516c\u958b\u3059\u308b\u300d\u3068\u8105\u3057\u307e\u3059\u3002\u80cc\u5f8c\u306b\u3044\u308b\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306f\u3001\u8eab\u4ee3\u91d1\u3092\u652f\u6255\u308f\u306a\u304b\u3063\u305f\u88ab\u5bb3\u7d44\u7e54\u3092Tor\u30b5\u30a4\u30c8\u300cBasta News\u300d\u306b\u8a18\u8f09\u3057\u3066\u88ab\u5bb3\u8005\u3092\u540d\u6307\u3057\u3067\u8fb1\u3081\u308b\u300c\u30cd\u30fc\u30e0\u30fb\u30a2\u30f3\u30c9\u30fb\u30b7\u30a7\u30a4\u30e0\u300d\u624b\u6cd5\u3092\u4f7f\u3044\u307e\u3059\u3002<\/p>\n<p>\u3053\u308c\u307e\u3067\u306eBlack Basta\u306eRaaS\u306e\u6d3b\u52d5\u671f\u9593\u306f\u307e\u3060\u307b\u3093\u306e\u6570\u30f6\u6708\u3067\u3059\u304c\u3001\u305d\u306e\u30ea\u30fc\u30af\u30b5\u30a4\u30c8\u306b\u3088\u308b\u3068\u3001\u672c\u7a3f\u57f7\u7b46\u6642\u70b9\u3067\u3059\u3067\u306b75\u4ee5\u4e0a\u306e\u7d44\u7e54\u3092\u4fb5\u5bb3\u3057\u305f\u3088\u3046\u3067\u3059\u3002\u6700\u521d\u306e2\u9031\u9593\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30f3\u3067\u3053\u306e\u30ea\u30fc\u30af\u30b5\u30a4\u30c8\u306b\u306f20\u306e\u88ab\u5bb3\u7d44\u7e54\u304c\u63b2\u8f09\u3055\u308c\u3066\u3044\u307e\u3057\u305f\u3002\u3053\u306e\u3053\u3068\u304b\u3089\u3001\u540c\u30b0\u30eb\u30fc\u30d7\u306f\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d3\u30b8\u30cd\u30b9\u306e\u7d4c\u9a13\u304c\u8c4a\u5bcc\u3067\u3001\u5b89\u5b9a\u3057\u305f\u521d\u671f\u30a2\u30af\u30bb\u30b9\u3092\u78ba\u4fdd\u3057\u3066\u3044\u308b\u3053\u3068\u304c\u3046\u304b\u304c\u3048\u307e\u3059\u3002<\/p>\n<p>Black Basta\u306f\u5b9f\u969b\u306b\u306f\u65b0\u305f\u306a\u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30f3\u3067\u306f\u306a\u304f\u3001\u5f93\u6765\u304b\u3089\u3042\u308b\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30b0\u30eb\u30fc\u30d7\u304c\u30d6\u30e9\u30f3\u30c7\u30a3\u30f3\u30b0\u3092\u5909\u66f4\u3057\u3066\u305d\u306e\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u3092\u5f15\u304d\u3064\u3044\u3060\u53ef\u80fd\u6027\u3082\u3042\u308a\u307e\u3059\u3002\u88ab\u5bb3\u8005\u3092\u540d\u6307\u3057\u3067\u8fb1\u3081\u308b\u30d6\u30ed\u30b0\u3084\u5fa9\u53f7\u7528\u306e\u30dd\u30fc\u30bf\u30eb\u30b5\u30a4\u30c8\u3001\u4ea4\u6e09\u6226\u8853\u3001\u88ab\u5bb3\u8005\u306e\u6025\u5897\u306a\u3069\u3001\u6226\u8853\u30fb\u6280\u8853\u30fb\u624b\u9806(TTP)\u306b\u304a\u3044\u3066\u8907\u6570\u306e\u985e\u4f3c\u70b9\u304c\u898b\u3089\u308c\u308b\u3053\u3068\u304b\u3089\u3001Black Basta\u30b0\u30eb\u30fc\u30d7\u306b\u306fConti\u30b0\u30eb\u30fc\u30d7\u306e\u73fe\u5728\u3082\u3057\u304f\u306f\u65e7\u6765\u306e\u30e1\u30f3\u30d0\u30fc\u304c\u542b\u307e\u308c\u3066\u3044\u308b\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<p>Unit 42\u306f\u3001Black Basta\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30b0\u30eb\u30fc\u30d7\u304c\u6700\u521d\u306e\u4fb5\u5165\u53e3\u3068\u3057\u3066QBot\u3092\u4f7f\u3044\u3001\u4fb5\u5bb3\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u5185\u3067\u30e9\u30c6\u30e9\u30eb\u30e0\u30fc\u30d6\u3092\u884c\u3046\u3088\u3046\u3059\u3092\u78ba\u8a8d\u3057\u3066\u3044\u307e\u3059\u3002QBot (\u5225\u540d<a href=\"https:\/\/unit42.paloaltonetworks.jp\/tutorial-qakbot-infection\/\">Qakbot<\/a>)\u306f\u3001\u5f53\u521d\u30d0\u30f3\u30ad\u30f3\u30b0\u30c8\u30ed\u30a4\u306e\u6728\u99ac\u3060\u3063\u305f\u3082\u306e\u304c\u30de\u30eb\u30a6\u30a7\u30a2\u30c9\u30ed\u30c3\u30d1\u30fc\u306b\u9032\u5316\u3057\u305fWindows\u30de\u30eb\u30a6\u30a7\u30a2\u306e1\u3064\u3067\u3059\u3002QBot\u306fMegaCortex\u3084ProLock\u3001<a href=\"https:\/\/unit42.paloaltonetworks.jp\/ransomware-threat-assessments\/4\/\">DoppelPaymer<\/a>\u3001<a href=\"https:\/\/unit42.paloaltonetworks.jp\/egregor-ransomware-courses-of-action\/\">Egregor<\/a>\u306a\u3069\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30b0\u30eb\u30fc\u30d7\u3067\u3082\u4f7f\u7528\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u3089\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30b0\u30eb\u30fc\u30d7\u3067\u306fQBot\u3092\u521d\u671f\u30a2\u30af\u30bb\u30b9\u306b\u4f7f\u7528\u3057\u3066\u3044\u307e\u3057\u305f\u304c\u3001Black Basta\u30b0\u30eb\u30fc\u30d7\u306f\u521d\u671f\u30a2\u30af\u30bb\u30b9\u7528\u9014\u306e\u307b\u304b\u3001\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u5168\u4f53\u3078\u306e\u30e9\u30c6\u30e9\u30eb\u30e0\u30fc\u30d6\u306b\u3082QBot\u3092\u4f7f\u3063\u3066\u3044\u305f\u3088\u3046\u3059\u304c\u78ba\u8a8d\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u56f31\u306fBlack Basta\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3067\u89b3\u6e2c\u3055\u308c\u305f\u6a19\u6e96\u7684\u306a\u653b\u6483\u30e9\u30a4\u30d5\u30b5\u30a4\u30af\u30eb\u3092\u793a\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<figure id=\"attachment_124691\" aria-describedby=\"caption-attachment-124691\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-124691 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2022\/08\/word-image-84-ja.png\" alt=\"\u56f31\u306fUnit 42\u306e\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u30ec\u30b9\u30dd\u30f3\u30b9\u4e8b\u4f8b\u306b\u57fa\u3065\u304fBlack Basta\u306e\u653b\u6483\u30e9\u30a4\u30d5\u30b5\u30a4\u30af\u30eb\u3092\u793a\u3057\u305f\u3082\u306e\u3067\u3059\u3002\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30e1\u30fc\u30eb\u306b\u306f\u3001ZIP\u30d5\u30a1\u30a4\u30eb\u304bURL\u304b\u304c\u542b\u307e\u308c\u3066\u3044\u307e\u3059\u3002ZIP\u30d5\u30a1\u30a4\u30eb\u306fXLS\u30d5\u30a1\u30a4\u30eb\u3092\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3066\u5c55\u958b\u3057\u307e\u3059\u3002\u30de\u30af\u30ed\u306b\u3088\u308aQAKBOT DLL\u30d5\u30a1\u30a4\u30eb\u306eHTTP\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u304c\u6709\u52b9\u306b\u306a\u308a\u307e\u3059\u3002QAKBOT\u306eC2\u6d3b\u52d5\u306fCobalt strike\u3092\u5c55\u958b\u3057\u307e\u3059\u3002\u3053\u308c\u306b\u3088\u308a\u3001RDP\u304bPsexec\u3092\u4f7f\u3063\u3066\u30b7\u30b9\u30c6\u30e0\u767a\u898b\u3084\u30e9\u30c6\u30e9\u30eb\u30e0\u30fc\u30d6\u3092\u884c\u3048\u308b\u3088\u3046\u306b\u3057\u307e\u3059\u3002\u6700\u7d42\u7684\u306bBlack Basta\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u304c\u5c55\u958b\u3055\u308c\u307e\u3059\u3002\" width=\"900\" height=\"251\" \/><figcaption id=\"caption-attachment-124691\" class=\"wp-caption-text\">\u56f31. Unit 42\u306e\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u30ec\u30b9\u30dd\u30f3\u30b9\u4e8b\u4f8b\u306b\u3082\u3068\u3065\u304fBlack Basta\u306e\u653b\u6483\u30e9\u30a4\u30d5\u30b5\u30a4\u30af\u30eb<\/figcaption><\/figure>\n<h2><a id=\"post-124687-_7gth3kgjopeu\"><\/a>\u6280\u8853\u7684\u8a73\u7d30<\/h2>\n<p>Black Basta\u306fC++\u3067\u66f8\u304b\u308c\u305f\u30af\u30ed\u30b9\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u578b\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3067Windows\u3068Linux\u306e\u4e21\u30aa\u30da\u30ec\u30fc\u30c6\u30a3\u30f3\u30b0\u30b7\u30b9\u30c6\u30e0\u306b\u5f71\u97ff\u3057\u307e\u3059\u30022022\u5e746\u6708\u3001Black Basta\u306eVMware ESXi\u7248\u306e\u4e9c\u7a2e\u304c\u3001\u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba\u5411\u3051Linux\u30b5\u30fc\u30d0\u30fc\u4e0a\u3067\u7a3c\u50cd\u3059\u308b\u4eee\u60f3\u30de\u30b7\u30f3\u3092\u6a19\u7684\u3068\u3057\u3066\u3044\u308b\u3088\u3046\u3059\u304c\u78ba\u8a8d\u3055\u308c\u307e\u3057\u305f\u3002<\/p>\n<p>\u3053\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306b\u306f\u89e3\u6790\u5bfe\u7b56\u6280\u8853\u304c\u542b\u307e\u308c\u3066\u304a\u308a\u3001\u30b3\u30fc\u30c9\u30a8\u30df\u30e5\u30ec\u30fc\u30b7\u30e7\u30f3\u3084\u30b5\u30f3\u30c9\u30dc\u30c3\u30af\u30b9\u5316\u3092\u691c\u77e5\u3057\u3066\u4eee\u60f3\u30de\u30b7\u30f3\u74b0\u5883\u3084\u89e3\u6790\u30de\u30b7\u30f3\u74b0\u5883\u3092\u56de\u907f\u3057\u3088\u3046\u3068\u3057\u307e\u3059\u3002\u307e\u305f\u3001\u6307\u5b9a\u30c7\u30a3\u30ec\u30af\u30c8\u30ea\u306e\u30d5\u30a1\u30a4\u30eb\u3092\u6697\u53f7\u5316\u3059\u308b\u30b3\u30de\u30f3\u30c9\u30e9\u30a4\u30f3\u5f15\u6570 <span style=\"font-family: 'courier new', courier, monospace;\">-forcepath<\/span>\u3082\u30b5\u30dd\u30fc\u30c8\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u30b3\u30de\u30f3\u30c9\u30e9\u30a4\u30f3\u5f15\u6570\u304c\u6307\u5b9a\u3055\u308c\u3066\u3044\u306a\u3044\u5834\u5408\u306f\u7279\u5b9a\u306e\u91cd\u8981\u30c7\u30a3\u30ec\u30af\u30c8\u30ea\u3092\u9664\u304f\u30b7\u30b9\u30c6\u30e0\u5168\u4f53\u304c\u6697\u53f7\u5316\u3055\u308c\u307e\u3059\u3002<\/p>\n<p>\u3053\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306f\u3001\u540c\u6642\u5b9f\u884c\u3055\u308c\u308b\u30de\u30eb\u30a6\u30a7\u30a2\u30a4\u30f3\u30b9\u30bf\u30f3\u30b9\u304c1\u3064\u3060\u3051\u306b\u306a\u308b\u3088\u3046\u3001<span style=\"font-family: 'courier new', courier, monospace;\">dsajdhas.0<\/span>\u3068\u3044\u3046\u6587\u5b57\u5217\u3092\u542b\u3080mutex\u3092\u751f\u6210\u3057\u307e\u3059\u3002\u305d\u306e\u5f8c\u3001\u30d5\u30a1\u30a4\u30eb\u30b7\u30b9\u30c6\u30e0\u5168\u4f53\u3092\u9806\u306b\u6697\u53f7\u5316\u3057\u3066\u3044\u304d\u3001\u6697\u53f7\u5316\u3057\u305f\u30d5\u30a1\u30a4\u30eb\u306e\u62e1\u5f35\u5b50\u3092<span style=\"font-family: 'courier new', courier, monospace;\">.basta<\/span>\u306b\u3057\u307e\u3059\u3002<\/p>\n<p>Black Basta\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306f\u3001ChaCha20\u3068RSA-4096\u306e\u7d44\u307f\u5408\u308f\u305b\u3066\u30e6\u30fc\u30b6\u30fc\u30c7\u30fc\u30bf\u3092\u6697\u53f7\u5316\u3057\u307e\u3059\u3002\u6697\u53f7\u5316\u51e6\u7406\u3092\u9ad8\u901f\u5316\u3059\u308b\u305f\u3081\u300164\u30d0\u30a4\u30c8\u306e\u30c1\u30e3\u30f3\u30af\u5358\u4f4d\u3067\u6697\u53f7\u5316\u3057\u3001\u6697\u53f7\u5316\u3057\u305f\u30c1\u30e3\u30f3\u30af\u306e\u9593\u306b\u306f128\u30d0\u30a4\u30c8\u5206\u306e\u30c7\u30fc\u30bf\u3092\u6697\u53f7\u5316\u305b\u305a\u306b\u6b8b\u3057\u307e\u3059\u3002\u307e\u305f<span style=\"font-family: 'courier new', courier, monospace;\"><a href=\"https:\/\/docs.microsoft.com\/ja-jp\/windows-server\/administration\/windows-commands\/vssadmin\">vssadmin.exe<\/a><\/span>\u3068\u3044\u3046\u30dc\u30ea\u30e5\u30fc\u30e0 \u30b7\u30e3\u30c9\u30a6 \u30b3\u30d4\u30fc \u30b5\u30fc\u30d3\u30b9(VSS)\u306e\u7ba1\u7406\u7528\u30b3\u30de\u30f3\u30c9\u30e9\u30a4\u30f3\u30c4\u30fc\u30eb\u3092\u4f7f\u3044\u3001\u30b7\u30e3\u30c9\u30a6\u30b3\u30d4\u30fc\u3084\u305d\u306e\u4ed6\u306e\u30d5\u30a1\u30a4\u30eb\u306e\u30d0\u30c3\u30af\u30a2\u30c3\u30d7\u3092\u524a\u9664\u3057\u3088\u3046\u3068\u3057\u307e\u3059\u3002VSS\u306f\u3001\u7a3c\u50cd\u4e2d\u306e\u30b7\u30b9\u30c6\u30e0\u306e\u30d0\u30c3\u30af\u30a2\u30c3\u30d7\u306e\u305f\u3081\u3001\u30b9\u30ca\u30c3\u30d7\u30b7\u30e7\u30c3\u30c8\u3092\u3068\u3063\u3066\u30b9\u30c6\u30fc\u30d6\u30eb\u306a\u30d0\u30c3\u30af\u30a2\u30c3\u30d7\u30a4\u30e1\u30fc\u30b8\u3092\u4f5c\u6210\u3059\u308b\u30b5\u30fc\u30d3\u30b9\u3067\u3059\u3002<\/p>\n<p>\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306f<span style=\"font-family: 'courier new', courier, monospace;\">Random-letters.ico<\/span>\u3001<span style=\"font-family: 'courier new', courier, monospace;\">Random-letters.jpg<\/span>\u3068\u3044\u3046\u30d5\u30a1\u30a4\u30eb\u3092<span style=\"font-family: 'courier new', courier, monospace;\">%TEMP%<\/span>\u30c7\u30a3\u30ec\u30af\u30c8\u30ea\u306b\u66f8\u304d\u8fbc\u307f\u307e\u3059\u3002\u3053\u306e<span style=\"font-family: 'courier new', courier, monospace;\">.jpg<\/span>\u30d5\u30a1\u30a4\u30eb\u3092\u4f7f\u3063\u3066\u30c7\u30b9\u30af\u30c8\u30c3\u30d7\u306e\u58c1\u7d19\u3092\u4e0a\u66f8\u304d\u3057\u3001\u4ee5\u4e0b\u3092\u8868\u793a\u3057\u307e\u3059\u3002<\/p>\n<figure id=\"attachment_124693\" aria-describedby=\"caption-attachment-124693\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-124693 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2022\/08\/word-image-85.png\" alt=\"\u56f32\u306fBlack Basta\u306e\u58c1\u7d19\u3067\u3001\u300cYour network is encrypted by the Black Basta group. Instructions in the file readme.txt\u300d\u3068\u66f8\u304b\u308c\u3066\u3044\u307e\u3059\u3002 \" width=\"900\" height=\"335\" \/><figcaption id=\"caption-attachment-124693\" class=\"wp-caption-text\">\u56f32. Black Basta\u306e\u30c7\u30b9\u30af\u30c8\u30c3\u30d7\u58c1\u7d19<\/figcaption><\/figure>\n<p>\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306f<span style=\"font-family: 'courier new', courier, monospace;\">.basta<\/span>\u30a2\u30a4\u30b3\u30f3(\u56f33)\u306b\u5bfe\u5fdc\u3059\u308b\u30ab\u30b9\u30bf\u30e0\u30a2\u30a4\u30b3\u30f3\u3092\u30ec\u30b8\u30b9\u30c8\u30ea\u306b\u8ffd\u52a0\u3057\u307e\u3059\u3002<\/p>\n<figure id=\"attachment_124695\" aria-describedby=\"caption-attachment-124695\" style=\"width: 166px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-124695 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2022\/08\/word-image-86.png\" alt=\"\u56f33\u306fBlack Basta\u306e\u30a2\u30a4\u30b3\u30f3\u306e\u767d\u9ed2\u3067\u63cf\u304b\u308c\u305f\u7acb\u65b9\u4f53\u3067\u3059\u3002\" width=\"166\" height=\"163\" \/><figcaption id=\"caption-attachment-124695\" class=\"wp-caption-text\">\u56f33. Black Basta\u306e\u30a2\u30a4\u30b3\u30f3<\/figcaption><\/figure>\n<p>\u305d\u306e\u5f8c\u3001\u30bb\u30fc\u30d5\u30e2\u30fc\u30c9\u3067\u30b7\u30b9\u30c6\u30e0\u3092\u8d77\u52d5\u3057\u3001\u30d5\u30a1\u30a4\u30eb\u306e\u6697\u53f7\u5316\u306b\u9032\u307f\u307e\u3059\u3002\u6697\u53f7\u5316\u306b\u6210\u529f\u3059\u308b\u3068\u3001\u30d5\u30a1\u30a4\u30eb\u62e1\u5f35\u5b50\u306f<span style=\"font-family: 'courier new', courier, monospace;\">.basta<\/span>\u306b\u7f6e\u304d\u63db\u308f\u308a\u3001\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306f\u4ee5\u4e0b\u306e\u8eab\u4ee3\u91d1\u8981\u6c42\u30e1\u30e2\u3092\u542b\u3080<span style=\"font-family: 'courier new', courier, monospace;\">readme.txt<\/span>\u3092\u591a\u6570\u66f8\u304d\u8fbc\u307f\u307e\u3059\u3002<\/p>\n<figure id=\"attachment_124697\" aria-describedby=\"caption-attachment-124697\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-124697 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2022\/08\/word-image-87.png\" alt=\"\u56f34\u306freadme.txt\u30d5\u30a1\u30a4\u30eb\u5185\u306eBlack Basta\u306e\u8eab\u4ee3\u91d1\u8981\u6c42\u30e1\u30e2\u3067\u3059\u3002\u30e1\u30e2\u306b\u306f\u300cYour data are stolen and encrypted. The data will be published on TOR website if you do not pay the ransom. You can contact us and decrypt one file for free on this TOR site.\u300d\u3068\u66f8\u304b\u308c\u3001.onion\u306e\u30a2\u30c9\u30ec\u30b9\u304c\u8a18\u8f09\u3055\u308c\u3066\u3044\u307e\u3059\u3002\" width=\"900\" height=\"212\" \/><figcaption id=\"caption-attachment-124697\" class=\"wp-caption-text\">\u56f34. Black Basta\u306e\u8eab\u4ee3\u91d1\u8981\u6c42\u30e1\u30e2<\/figcaption><\/figure>\n<h2><a id=\"post-124687-_2x9n84rg8t6g\"><\/a>TTP(\u6226\u8853\u3001\u6280\u8853\u3001\u304a\u3088\u3073\u624b\u9806)<\/h2>\n<p>Black Bast\u306e\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u306f\u4ee5\u4e0b\u306eTTP(\u6226\u8853\u30fb\u6280\u8853\u30fb\u624b\u9806)\u3092\u7528\u3044\u308b\u3053\u3068\u304c\u78ba\u8a8d\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<table style=\"width: 100%; height: 1584px;\">\n<tbody>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><strong>\u6226\u8853\/\u6280\u8853<\/strong><\/td>\n<td style=\"height: 24px;\"><strong>\u5099\u8003<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\" colspan=\"2\"><strong>TA0001 Initial Access<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"height: 48px;\">T1566.001. Phishing: Spear phishing Attachment<\/td>\n<td style=\"height: 48px;\">\u88ab\u5bb3\u8005\u306f\u3001\u60aa\u610f\u306e\u3042\u308bZIP\u30d5\u30a1\u30a4\u30eb\u304c\u6dfb\u4ed8\u3055\u308c\u305f\u30b9\u30d4\u30a2\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30e1\u30fc\u30eb\u3092\u53d7\u3051\u53d6\u308a\u307e\u3059\u3002\u901a\u5e38\u3001\u3053\u306eZIP\u30d5\u30a1\u30a4\u30eb\u306f\u30d1\u30b9\u30ef\u30fc\u30c9\u3067\u4fdd\u8b77\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u3053\u306eZIP\u30d5\u30a1\u30a4\u30eb\u306b\u306f<span style=\"font-family: 'courier new', courier, monospace;\">.doc<\/span>\u3001<span style=\"font-family: 'courier new', courier, monospace;\">.pdf<\/span>\u3001<span style=\"font-family: 'courier new', courier, monospace;\">.xls<\/span>\u306a\u3069\u306e\u60aa\u610f\u306e\u3042\u308b\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u304c\u542b\u307e\u308c\u3066\u3044\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\" colspan=\"2\"><strong>TA0002 Execution<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">T1569.002. System Services: Service Execution<\/td>\n<td style=\"height: 24px;\">Black Basta\u306f\u30ea\u30e2\u30fc\u30c8\u30db\u30b9\u30c8\u4e0a\u306e\u30da\u30a4\u30ed\u30fc\u30c9\u3092\u5b9f\u884c\u3059\u308b\u305f\u3081\u306b<span style=\"font-family: 'courier new', courier, monospace;\">PsExec<\/span>\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3057\u3066\u4f7f\u3044\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">T1047. Windows Management Instrumentation<\/td>\n<td style=\"height: 24px;\"><span style=\"font-family: 'courier new', courier, monospace;\">Invoke-TotalExec<\/span>\u3092\u4f7f\u3063\u3066\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d0\u30a4\u30ca\u30ea\u3092\u30d7\u30c3\u30b7\u30e5\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"height: 48px;\">T1059.001. Command and Scripting Interpreter: PowerShell<\/td>\n<td style=\"height: 48px;\">Black Basta\u306fPowerShell\u30b9\u30af\u30ea\u30d7\u30c8\u3092\u30a8\u30f3\u30b3\u30fc\u30c9\u3059\u308b\u3053\u3068\u3067\u8ffd\u52a0\u306e\u30b9\u30af\u30ea\u30d7\u30c8\u3092\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3067\u304d\u308b\u3088\u3046\u306b\u3057\u3066\u3044\u307e\u3057\u305f\u3002<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\" colspan=\"2\"><strong>TA0003 Persistence<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">T1136. Create Account<\/td>\n<td style=\"height: 24px;\">Black Basta\u306e\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306f<span style=\"font-family: 'courier new', courier, monospace;\">temp<\/span>\u3001<span style=\"font-family: 'courier new', courier, monospace;\">r<\/span>\u3001<span style=\"font-family: 'courier new', courier, monospace;\">admin<\/span>\u3068\u3044\u3063\u305f\u540d\u524d\u306e\u30a2\u30ab\u30a6\u30f3\u30c8\u3092\u4f5c\u6210\u3057\u3066\u3044\u307e\u3057\u305f\u3002<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">T1098. Account Manipulation<\/td>\n<td style=\"height: 24px;\">\u65b0\u898f\u306b\u4f5c\u6210\u3057\u305f\u30a2\u30ab\u30a6\u30f3\u30c8\u3092\u7ba1\u7406\u8005\u30b0\u30eb\u30fc\u30d7\u306b\u8ffd\u52a0\u3059\u308b\u3053\u3068\u3067\u6607\u683c\u3057\u305f\u30a2\u30af\u30bb\u30b9\u6a29\u3092\u7dad\u6301\u3057\u3066\u3044\u307e\u3057\u305f\u3002<\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"height: 48px;\">T1543.003. Create or Modify System Process: Windows Service<\/td>\n<td style=\"height: 48px;\">\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d0\u30a4\u30ca\u30ea\u7528\u306b\u826f\u6027\u3092\u88c5\u3063\u305f\u30b5\u30fc\u30d3\u30b9\u3092\u4f5c\u6210\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"height: 48px;\">T1574.001. Hijack Execution Flow: DLL Search Order Hijacking<\/td>\n<td style=\"height: 48px;\">Black Basta\u306fWindows 7\u306e\u8a08\u7b97\u6a5f\u30d7\u30ed\u30b0\u30e9\u30e0\u3092\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u3057\u3066\u60aa\u610f\u306e\u3042\u308b\u30da\u30a4\u30ed\u30fc\u30c9\u3092\u5b9f\u884c\u3059\u308b\u6a5f\u80fd\u3092\u6301\u3064Qakbot\u3092\u4f7f\u7528\u3057\u3066\u3044\u307e\u3057\u305f\u3002<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\" colspan=\"2\"><strong>TA0004 Privilege Escalation<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"height: 48px;\">T1484.001. Domain Policy Modification: Group Policy Modification<\/td>\n<td style=\"height: 48px;\">Black Basta\u306f\u30b0\u30eb\u30fc\u30d7\u30dd\u30ea\u30b7\u30fc\u3092\u5909\u66f4\u3057\u3066\u7279\u6a29\u6607\u683c\u30fb\u9632\u5fa1\u56de\u907f\u3092\u884c\u3048\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"height: 48px;\">T1574.001. Hijack Execution Flow: DLL Search Order Hijacking<\/td>\n<td style=\"height: 48px;\">Black Basta\u306fWindows 7\u306e\u8a08\u7b97\u6a5f\u30d7\u30ed\u30b0\u30e9\u30e0\u3092\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u3057\u3066\u60aa\u610f\u306e\u3042\u308b\u30da\u30a4\u30ed\u30fc\u30c9\u3092\u5b9f\u884c\u3059\u308b\u6a5f\u80fd\u3092\u6301\u3064Qakbot\u3092\u4f7f\u7528\u3057\u3066\u3044\u307e\u3057\u305f\u3002<\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"height: 48px;\">T1543.003. Create or Modify System Process: Windows Service<\/td>\n<td style=\"height: 48px;\">\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30d0\u30a4\u30ca\u30ea\u7528\u306b\u826f\u6027\u3092\u88c5\u3063\u305f\u30b5\u30fc\u30d3\u30b9\u3092\u4f5c\u6210\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\" colspan=\"2\"><strong>TA0005 Defense Evasion<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"height: 48px;\">T1484.001. Domain Policy Modification: Group Policy Modification<\/td>\n<td style=\"height: 48px;\">Black Basta\u306f\u30b0\u30eb\u30fc\u30d7\u30dd\u30ea\u30b7\u30fc\u3092\u5909\u66f4\u3057\u3066\u7279\u6a29\u6607\u683c\u30fb\u9632\u5fa1\u56de\u907f\u3092\u884c\u3048\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"height: 48px;\">T1218.010. System Binary Proxy Execution: Regsvr32<\/td>\n<td style=\"height: 48px;\">Black Basta\u306f<span style=\"font-family: 'courier new', courier, monospace;\">regsvr32.exe<\/span>\u3092\u4f7f\u3063\u3066\u60aa\u610f\u306e\u3042\u308bDLL\u3092\u5b9f\u884c\u3057\u3066\u3044\u307e\u3057\u305f\u3002<\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"height: 48px;\">T1070.004. Indicator Removal on Host: File Deletion<\/td>\n<td style=\"height: 48px;\">\u60aa\u610f\u306e\u3042\u308b\u30d0\u30c3\u30c1\u30d5\u30a1\u30a4\u30eb\u3092\u524a\u9664\u3057\u3088\u3046\u3068\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">T1112. Modify Registry<\/td>\n<td style=\"height: 24px;\">Black Basta\u306f\u30ec\u30b8\u30b9\u30c8\u30ea\u3092\u6539\u3056\u3093\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">T1140. Deobfuscate\/Decode Files or Information<\/td>\n<td style=\"height: 24px;\">\u6700\u521d\u306e\u60aa\u610f\u306e\u3042\u308b<span style=\"font-family: 'courier new', courier, monospace;\">.zip<\/span>\u30d5\u30a1\u30a4\u30eb\u3092\u30d1\u30b9\u30ef\u30fc\u30c9\u3067\u4fdd\u8b77\u3059\u308b\u3053\u3068\u3067\u3001\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9\u306b\u3088\u308b\u691c\u51fa\u3092\u4e00\u90e8\u56de\u907f\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"height: 48px;\">T1562.001. Impair Defenses: Disable or Modify Tools<\/td>\n<td style=\"height: 48px;\"><span style=\"font-family: 'courier new', courier, monospace;\">d.bat<\/span>\u3084<span style=\"font-family: 'courier new', courier, monospace;\">defof.bat<\/span>\u306a\u3069\u306e\u30d0\u30c3\u30c1\u30b9\u30af\u30ea\u30d7\u30c8\u3067Windows Defender\u3092\u7121\u52b9\u5316\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"height: 48px;\">T1562.004. Impair Defenses: Disable or Modify System Firewall<\/td>\n<td style=\"height: 48px;\"><span style=\"font-family: 'courier new', courier, monospace;\">rdp.bat<\/span>\u3084<span style=\"font-family: 'courier new', courier, monospace;\">SERVI.bat<\/span>\u306a\u3069\u306e\u30d0\u30c3\u30c1\u30b9\u30af\u30ea\u30d7\u30c8\u3067\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u30eb\u30fc\u30eb\u3092\u5909\u66f4\u3057\u3001\u30ea\u30e2\u30fc\u30c8\u304b\u3089\u306e\u7ba1\u7406\u3084RDP\u3092\u8a31\u53ef\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">T1562.009. Impair Defenses: Safe Boot Mode<\/td>\n<td style=\"height: 24px;\"><span style=\"font-family: 'courier new', courier, monospace;\">bcdedit<\/span>\u3092\u4f7f\u3063\u3066\u30bb\u30fc\u30d5\u30e2\u30fc\u30c9\u3067\u30c7\u30d0\u30a4\u30b9\u3092\u8d77\u52d5\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"height: 48px;\">T1574.001. Hijack Execution Flow: DLL Search Order Hijacking<\/td>\n<td style=\"height: 48px;\">Black Basta\u306fWindows 7\u306e\u8a08\u7b97\u6a5f\u30d7\u30ed\u30b0\u30e9\u30e0\u3092\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u3057\u3066\u60aa\u610f\u306e\u3042\u308b\u30da\u30a4\u30ed\u30fc\u30c9\u3092\u5b9f\u884c\u3059\u308b\u6a5f\u80fd\u3092\u6301\u3064Qakbot\u3092\u4f7f\u7528\u3057\u3066\u3044\u307e\u3057\u305f\u3002<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">T1622. Debugger Evasion<\/td>\n<td style=\"height: 24px;\"><span style=\"font-family: 'courier new', courier, monospace;\">IsDebuggerPresent<\/span>\u3067\u30d7\u30ed\u30bb\u30b9\u304c\u30c7\u30d0\u30c3\u30b0\u74b0\u5883\u4e0b\u306b\u304a\u304b\u308c\u3066\u3044\u308b\u304b\u3069\u3046\u304b\u3092\u78ba\u8a8d\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\" colspan=\"2\"><strong>TA0006 Credential Access<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">T1555. Credentials from Password Stores<\/td>\n<td style=\"height: 24px;\">Black Basta\u306fMimikatz\u3092\u4f7f\u3063\u3066\u30d1\u30b9\u30ef\u30fc\u30c9\u3092\u30c0\u30f3\u30d7\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\" colspan=\"2\"><strong>TA0007 Discovery<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">T1087.002. Account Discovery: Domain Account<\/td>\n<td style=\"height: 24px;\"><span style=\"font-family: 'courier new', courier, monospace;\">net user \/domain<\/span>\u3084<span style=\"font-family: 'courier new', courier, monospace;\">net group \/domain<\/span>\u306a\u3069\u306e\u30b3\u30de\u30f3\u30c9\u3092\u4f7f\u3063\u3066\u3044\u307e\u3057\u305f\u3002<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">T1016. System Network Configuration Discovery<\/td>\n<td style=\"height: 24px;\">\u6a19\u7684\u7d44\u7e54\u5185\u306eIP\u30a2\u30c9\u30ec\u30b9\u3092<span style=\"font-family: 'courier new', courier, monospace;\">C:\\Windows\\pc_list.txt<\/span> \u306b\u5217\u6319\u3057\u307e\u3059\u3002\u3053\u306e\u30d5\u30a1\u30a4\u30eb\u306f\u901a\u5e38\u3001\u30c9\u30e1\u30a4\u30f3\u30b3\u30f3\u30c8\u30ed\u30fc\u30e9\u4e0a\u306b\u7f6e\u304b\u308c\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">T1082. System Information Discovery<\/td>\n<td style=\"height: 24px;\"><span style=\"font-family: 'courier new', courier, monospace;\">GetComputerName<\/span>\u3067\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u540d\u306b\u3064\u3044\u3066\u306e\u30af\u30a8\u30ea\u3092\u767a\u884c\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">T1622. Debugger Evasion<\/td>\n<td style=\"height: 24px;\"><span style=\"font-family: 'courier new', courier, monospace;\">IsDebuggerPresent<\/span>\u3067\u30d7\u30ed\u30bb\u30b9\u304c\u30c7\u30d0\u30c3\u30b0\u74b0\u5883\u4e0b\u306b\u304a\u304b\u308c\u3066\u3044\u308b\u304b\u3069\u3046\u304b\u3092\u78ba\u8a8d\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\" colspan=\"2\"><strong>TA0008 Lateral Movement<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"height: 48px;\">T1021.001. Remote Services: Remote Desktop Protocol<\/td>\n<td style=\"height: 48px;\">Black Basta\u306f\u30e9\u30c6\u30e9\u30eb\u30e0\u30fc\u30d6\u306bRDP\u3092\u4f7f\u3063\u3066\u3044\u307e\u3057\u305f\u3002<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\" colspan=\"2\"><strong>TA0009 Collection<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"height: 48px;\">T1560.001. Archive Collected Data: Archive via Utility<\/td>\n<td style=\"height: 48px;\"><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\" colspan=\"2\"><strong>TA0010 Exfiltration<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">T1567. Exfiltration over Web Service<\/td>\n<td style=\"height: 24px;\"><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\" colspan=\"2\"><strong>TA0011 Command and Control<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">T1219. Remote Access Software<\/td>\n<td style=\"height: 24px;\">Black Basta\u306f\u3001TeamViewer\u3084AnyConnect\u306a\u3069\u306e\u6b63\u898f\u306e\u30c4\u30fc\u30eb\u3092\u6a19\u7684\u30b7\u30b9\u30c6\u30e0\u306b\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3057\u3066\u4f7f\u3063\u3066\u3044\u307e\u3057\u305f\u3002<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">T1573. Encrypted Channel<\/td>\n<td style=\"height: 24px;\">\u4e3b\u306bQakbot\u3068Cobalt Strike\u3092\u4f7f\u3044\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\" colspan=\"2\"><strong>TA0040 Impact<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 120px;\">\n<td style=\"height: 120px;\">T1486. Data Encrypted for Impact<\/td>\n<td style=\"height: 120px;\">Black Basta\u306f<span style=\"font-family: 'courier new', courier, monospace;\">C:\\Temp<\/span>\u306b<span style=\"font-family: 'courier new', courier, monospace;\">.jpg<\/span> \u30921\u3064\u8ffd\u52a0\u3057\u3066\u30c7\u30b9\u30af\u30c8\u30c3\u30d7\u306e\u58c1\u7d19\u3092\u5909\u66f4\u3057\u307e\u3059\u3002\u307e\u305f\u3001\u30ec\u30b8\u30b9\u30c8\u30ea\u30ad\u30fc<span style=\"font-family: 'courier new', courier, monospace;\">HKCU\\Control Panel\\Desktop<\/span>\u3092\u4f5c\u6210\u3057\u307e\u3059\u3002\u3055\u3089\u306b\u30ec\u30b8\u30b9\u30c8\u30ea\u3092\u5909\u66f4\u3057\u3066\u6697\u53f7\u5316\u3055\u308c\u305f\u30d5\u30a1\u30a4\u30eb\u306e\u30a2\u30a4\u30b3\u30f3\u3092\u5909\u66f4\u3057\u307e\u3059\u3002<\/p>\n<p>\u62e1\u5f35\u5b50\u304c<span style=\"font-family: 'courier new', courier, monospace;\">.exe<\/span>\u3001<span style=\"font-family: 'courier new', courier, monospace;\">.cmd<\/span>\u3001<span style=\"font-family: 'courier new', courier, monospace;\">.bat<\/span>\u3001<span style=\"font-family: 'courier new', courier, monospace;\">.com<\/span>\u306e\u30d5\u30a1\u30a4\u30eb\u4ee5\u5916\u3092\u6697\u53f7\u5316\u3057\u307e\u3059\u3002<span style=\"font-family: 'courier new', courier, monospace;\">ChaCha20<\/span>\u307e\u305f\u306f<span style=\"font-family: 'courier new', courier, monospace;\">RSA-4096<\/span>\u3092\u4f7f\u3063\u3066\u88ab\u5bb3\u7aef\u672b\u3092\u6697\u53f7\u5316\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">T1489. Service Stop<\/td>\n<td style=\"height: 24px;\"><span style=\"font-family: 'courier new', courier, monospace;\">sc stop<\/span>\u3068<span style=\"font-family: 'courier new', courier, monospace;\">taskkill<\/span>\u3092\u4f7f\u3063\u3066\u30b5\u30fc\u30d3\u30b9\u3092\u505c\u6b62\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\">T1490. Inhibit System Recovery<\/td>\n<td style=\"height: 24px;\">Black Basta\u306f<span style=\"font-family: 'courier new', courier, monospace;\">vssadmin<\/span>\u3067\u30dc\u30ea\u30e5\u30fc\u30e0 \u30b7\u30e3\u30c9\u30fc \u30b3\u30d4\u30fc\u3092\u524a\u9664\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: center;\"><span style=\"font-size: 10pt;\"><em>\u88681 Black Basta\u306e\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u306b\u304a\u3051\u308bTTP(\u6226\u8853\u3001\u6280\u8853\u3001\u304a\u3088\u3073\u624b\u9806)<\/em><\/span><\/p>\n<h2><a id=\"post-124687-_hcs41w34sodw\"><\/a>\u72d9\u308f\u308c\u3084\u3059\u3044\u7d44\u7e54<\/h2>\n<p>\u3053\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30b0\u30eb\u30fc\u30d7\u3068\u305d\u306e\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u30d7\u30ed\u30b0\u30e9\u30e0\u306f\u3001\u30b3\u30f3\u30b7\u30e5\u30fc\u30de\u88fd\u54c1\u304a\u3088\u3073\u5de5\u696d\u88fd\u54c1\u3001\u30a8\u30cd\u30eb\u30ae\u30fc\u30fb\u8cc7\u6e90\u304a\u3088\u3073\u8fb2\u696d\u3001\u88fd\u9020\u696d\u3001\u516c\u76ca\u4e8b\u696d\u3001\u904b\u8f38\u3001\u653f\u5e9c\u6a5f\u95a2\u3001\u5c02\u9580\u30b5\u30fc\u30d3\u30b9\u304a\u3088\u3073\u30b3\u30f3\u30b5\u30eb\u30c6\u30a3\u30f3\u30b0\u3001\u4e0d\u52d5\u7523\u306a\u3069\u306e\u5206\u91ce\u3067\u3001\u8907\u6570\u306e\u5927\u898f\u6a21\u306a\u7d44\u7e54\u3092\u4fb5\u5bb3\u3057\u305f\u3068\u5831\u544a\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>Black Basta\u306e\u30aa\u30da\u30ec\u30fc\u30bf\u306f\u3001\u30aa\u30fc\u30b9\u30c8\u30e9\u30ea\u30a2\u3001\u30ab\u30ca\u30c0\u3001\u30cb\u30e5\u30fc\u30b8\u30fc\u30e9\u30f3\u30c9\u3001\u82f1\u56fd\u3001\u7c73\u56fd\u306b\u62e0\u70b9\u3092\u7f6e\u304f\u7d44\u7e54\u3078\u306e\u653b\u6483\u306b\u95a2\u5fc3\u304c\u3042\u308b\u3068\u30c0\u30fc\u30af\u30a6\u30a7\u30d6\u30d5\u30a9\u30fc\u30e9\u30e0\u306b\u6295\u7a3f\u3057\u3066\u3044\u307e\u3057\u305f\u3002\u3053\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3092\u4f7f\u3046\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306f\u3001\u7c73\u56fd\u3001\u30c9\u30a4\u30c4\u3001\u30b9\u30a4\u30b9\u3001\u30a4\u30bf\u30ea\u30a2\u3001\u30d5\u30e9\u30f3\u30b9\u3001\u30aa\u30e9\u30f3\u30c0\u306e\u7d44\u7e54\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u3066\u3044\u307e\u3057\u305f(\u4fb5\u5165\u3057\u305f\u3068\u3055\u308c\u308b\u7d44\u7e54\u6570\u5225\u3067\u964d\u9806\u3067\u8a18\u8f09)\u3002<\/p>\n<figure id=\"attachment_124699\" aria-describedby=\"caption-attachment-124699\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-124699 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2022\/08\/word-image-88.png\" alt=\"\u56f35\u306f\u3001\u30c0\u30fc\u30af\u30a6\u30a7\u30d6\u30d5\u30a9\u30fc\u30e9\u30e0\u306b\u304a\u3051\u308bBlack Basta\u306e\u6295\u7a3f\u3067\u3059\u3002\u300cWe buy and monetize for a share of profits corporate network access credentials from the following countries: the USA, Canada, the UK, Australia, and New Zealand.\u300d\u3068\u3044\u3046\u5185\u5bb9\u3067\u3059\u3002 \" width=\"900\" height=\"110\" \/><figcaption id=\"caption-attachment-124699\" class=\"wp-caption-text\">\u56f35. Black Basta\u304c\u30c0\u30fc\u30af\u30a6\u30a7\u30d6\u306e\u30d5\u30a9\u30fc\u30e9\u30e0\u306b\u6295\u7a3f\u3057\u305f\u5185\u5bb9<\/figcaption><\/figure>\n<p>Black Basta\u306e\u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30f3\u306e\u80cc\u5f8c\u306b\u3044\u308b\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u72af\u7f6a\u306e\u30de\u30fc\u30b1\u30c3\u30c8\u30d7\u30ec\u30a4\u30b9\u3084\u3001\u88ab\u5bb3\u7d44\u7e54\u306e\u540d\u524d\u3092\u6652\u3057\u3066\u8fb1\u3081\u308b\u300c\u30cd\u30fc\u30e0\u30fb\u30a2\u30f3\u30c9\u30fb\u30b7\u30a7\u30a4\u30e0\u300d\u30d6\u30ed\u30b0\u3092\u904b\u55b6\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u30b5\u30a4\u30c8\u306fTor Onion Service\u3068\u3057\u3066\u30db\u30b9\u30c8\u3055\u308c\u3066\u3044\u3066\u3001\u305d\u3053\u306b\u88ab\u5bb3\u7d44\u7e54\u540d\u3068\u305d\u306e\u8aac\u660e\u3001\u7a83\u53d6\u3055\u308c\u305f\u30c7\u30fc\u30bf\u306e\u3046\u3061\u516c\u958b\u3055\u308c\u3066\u3044\u308b\u5272\u5408\u3001\u30a2\u30af\u30bb\u30b9\u6570\u3001\u6f0f\u51fa\u30c7\u30fc\u30bf\u304c\u63b2\u8f09\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u672c\u7a3f\u57f7\u7b46\u6642\u70b9\u3067\u306f75\u306e\u88ab\u5bb3\u7d44\u7e54\u304c\u30ea\u30fc\u30af\u30b5\u30a4\u30c8\u306b\u63b2\u8f09\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<figure id=\"attachment_124701\" aria-describedby=\"caption-attachment-124701\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-124701 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2022\/08\/word-image-89.png\" alt=\"\u56f36\u306f\u3001\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u304c\u4fb5\u5165\u3057\u305f\u3068\u3055\u308c\u308b\u7d44\u7e54(\u8a73\u7d30\u306f\u4f0f\u305b\u3066\u3042\u308a\u307e\u3059)\u306e\u60c5\u5831\u3092\u63b2\u8f09\u3057\u3066\u3044\u308b\u300cBlack Basta News\u300d\u30b5\u30a4\u30c8\u3068\u305d\u306e\u30a2\u30af\u30bb\u30b9\u6570\u3092\u793a\u3057\u305f\u3082\u306e\u3067\u3059\u3002\" width=\"900\" height=\"559\" \/><figcaption id=\"caption-attachment-124701\" class=\"wp-caption-text\">\u56f36. \u8105\u5a01\u30a2\u30af\u30bf\u30fc\u304c\u4fb5\u5165\u3057\u305f\u3068\u3055\u308c\u308b\u7d44\u7e54(\u8a73\u7d30\u306f\u4f0f\u305b\u3066\u3042\u308a\u307e\u3059)\u306e\u60c5\u5831\u3092\u63b2\u8f09\u3057\u3066\u3044\u308b\u300cBlack Basta News\u300d\u30b5\u30a4\u30c8\u3068\u305d\u306e\u30a2\u30af\u30bb\u30b9\u6570\u3092\u793a\u3057\u305f\u3082\u306e<\/figcaption><\/figure>\n<h2><a id=\"post-124687-_uht0xos2b4zh\"><\/a>\u884c\u52d5\u6307\u91dd<\/h2>\n<p>Black Basta\u306b\u95a2\u9023\u3059\u308b\u6d3b\u52d5\u3067\u306f\u8907\u6570\u306e\u653b\u6483\u30c6\u30af\u30cb\u30c3\u30af\u304c\u78ba\u8a8d\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306e\u88fd\u54c1\u30fb\u30b5\u30fc\u30d3\u30b9\u3067\u306f\u3001\u4ee5\u4e0b\u306e\u5bfe\u7b56\u3092\u53d6\u308b\u3053\u3068\u3067\u3001Black Basta\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306a\u3089\u3073\u306b\u985e\u4f3c\u624b\u6cd5\u306e\u30de\u30eb\u30a6\u30a7\u30a2\u306b\u95a2\u9023\u3059\u308b\u8105\u5a01\u3092\u7de9\u548c\u3059\u308b\u3053\u3068\u3092\u63a8\u5968\u3057\u307e\u3059\u3002<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>\u88fd\u54c1\/\u30b5\u30fc\u30d3\u30b9<\/strong><\/td>\n<td><strong>\u884c\u52d5\u6307\u91dd<\/strong><\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\"><strong>\u521d\u671f\u30a2\u30af\u30bb\u30b9<\/strong><\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\">\u4ee5\u4e0b\u306e\u4e00\u9023\u306e\u884c\u52d5\u6307\u91dd\u306f\u6b21\u306e\u30c6\u30af\u30cb\u30c3\u30af\u3092\u7de9\u548c\u3057\u307e\u3059\u3002<\/p>\n<p>Spear Phishing Attachment [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1566\/001\">T1566.001<\/a>]<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\">\u8105\u5a01\u9632\u5fa1<\/td>\n<td>imap\u3001pop3\u3092\u9664\u304f\u3059\u3079\u3066\u306e\u30c7\u30b3\u30fc\u30c0\u3067\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u30d6\u30ed\u30c3\u30af\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td>\u95a2\u9023\u3059\u308b\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u306b\u5b89\u5168\u306a\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u9069\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td>\u6b21\u4e16\u4ee3\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb<\/td>\n<td>\u30d5\u30a1\u30a4\u30eb\u30d6\u30ed\u30c3\u30af\u3092\u8a2d\u5b9a\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td>Cortex XDR Prevent<\/td>\n<td>\u30de\u30eb\u30a6\u30a7\u30a2 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3092\u69cb\u6210\u3059\u308b<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\">Cortex XSOAR<\/td>\n<td>XSOAR \u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u30c7\u30d7\u30ed\u30a4 - Endpoint Malware Investigation<\/td>\n<\/tr>\n<tr>\n<td>XSOAR \u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u30c7\u30d7\u30ed\u30a4 - Phishing Investigation - Generic V2<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\"><strong>\u5b9f\u884c<\/strong><\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\">\u4ee5\u4e0b\u306e\u4e00\u9023\u306e\u884c\u52d5\u6307\u91dd\u306f\u6b21\u306e\u30c6\u30af\u30cb\u30c3\u30af\u3092\u7de9\u548c\u3057\u307e\u3059\u3002<\/p>\n<p>Service Execution [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1569\/002\">T1569.002<\/a>], Windows Management Instrumentation [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1047\">T1047<\/a>], PowerShell [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1059\/001\">T1059.001<\/a>]<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"9\">\u6b21\u4e16\u4ee3\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb<\/td>\n<td>User-ID\u30b5\u30fc\u30d3\u30b9\u30a2\u30ab\u30a6\u30f3\u30c8\u306e\u30ea\u30e2\u30fc\u30c8\u30a2\u30af\u30bb\u30b9\u6a5f\u80fd\u304c\u7981\u6b62\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td>User-ID\u304c\u5185\u90e8\u306e\u4fe1\u983c\u3067\u304d\u308b\u30a4\u30f3\u30bf\u30fc\u30d5\u30a7\u30fc\u30b9\u306b\u5bfe\u3057\u3066\u306e\u307f\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td>\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3067\u30b5\u30fc\u30d3\u30b9\u306b\u300cany\u300d\u304c\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3082\u306e\u304c\u306a\u3044\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td>User-ID\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u304cuntrust\u30be\u30fc\u30f3\u306b\u5165\u308b\u306e\u3092\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3067\u5236\u9650\u3057\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td>User-ID\u30b5\u30fc\u30d3\u30b9\u30a2\u30ab\u30a6\u30f3\u30c8\u306b\u5bfe\u8a71\u578b\u30ed\u30b0\u30aa\u30f3\u6a29\u9650\u304c\u306a\u3044\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td>User-ID\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u5834\u5408\u306f\u300c\u8a31\u53ef\/\u9664\u5916\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u300d\u304c\u4f7f\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td>\u4fe1\u983c\u3055\u308c\u305f\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u30bd\u30fc\u30b9\u306eIP\u30a2\u30c9\u30ec\u30b9\u3068\u306e\u9593\u306e\u3059\u3079\u3066\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u62d2\u5426\u3059\u308b\u300c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u300d\u304c\u5b58\u5728\u3059\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td>User-ID\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u5834\u5408\u306fUser-ID\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306b\u6700\u5c0f\u9650\u306e\u6a29\u9650\u3092\u8a2d\u5b9a\u3057\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td>\u4fe1\u983c\u3055\u308c\u3066\u3044\u306a\u3044untrust\u30be\u30fc\u30f3\u304b\u3089\u3088\u308a\u4fe1\u983c\u3055\u308c\u3066\u3044\u308btrust\u30be\u30fc\u30f3\u3078\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u5834\u5408\u306f\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u304c\u5b58\u5728\u3059\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td>Cortex XDR Prevent<\/td>\n<td>Restriction\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3092\u69cb\u6210\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\"><strong>Persistence, Privilege Escalation, Defense Evasion<\/strong><\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\">\u4ee5\u4e0b\u306e\u4e00\u9023\u306e\u884c\u52d5\u6307\u91dd\u306f\u6b21\u306e\u30c6\u30af\u30cb\u30c3\u30af\u3092\u7de9\u548c\u3057\u307e\u3059\u3002<\/p>\n<p>Create Account [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1136\">T1136<\/a>], Account Manipulation [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1098\">T1098<\/a>], Regsvr32 [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1218\/010\">T1218.010<\/a>], File Deletion [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1070\/004\">T1070.004<\/a>], Disable or Modify Tools [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1562\/001\">T1562.001<\/a>], Modify Registry [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1112\">T1112<\/a>], Deobfuscate\/Decode Files or Information [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1140\">T1140<\/a>], Disable or Modify System Firewall [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1562\/004\">T1562.004<\/a>], Windows Service [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1543\/003\">T1543.003<\/a>], DLL Search Order Hijacking [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1574\/001\">T1574.001<\/a>], Group Policy Modification [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1484\/001\">T1484.001<\/a>]<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"6\">\u6b21\u4e16\u4ee3\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb<\/td>\n<td>User-ID\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u5834\u5408\u306fUser-ID\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306b\u6700\u5c0f\u9650\u306e\u6a29\u9650\u3092\u8a2d\u5b9a\u3057\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td>User-ID\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u304cuntrust\u30be\u30fc\u30f3\u306b\u5165\u308b\u306e\u3092\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3067\u5236\u9650\u3057\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td>User-ID\u30b5\u30fc\u30d3\u30b9\u30a2\u30ab\u30a6\u30f3\u30c8\u306b\u5bfe\u8a71\u578b\u30ed\u30b0\u30aa\u30f3\u6a29\u9650\u304c\u306a\u3044\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td>User-ID\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u5834\u5408\u306f\u300c\u8a31\u53ef\/\u9664\u5916\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u300d\u304c\u4f7f\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td>User-ID\u30b5\u30fc\u30d3\u30b9\u30a2\u30ab\u30a6\u30f3\u30c8\u306e\u30ea\u30e2\u30fc\u30c8\u30a2\u30af\u30bb\u30b9\u6a5f\u80fd\u304c\u7981\u6b62\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td>User-ID\u304c\u5185\u90e8\u306e\u4fe1\u983c\u3067\u304d\u308b\u30a4\u30f3\u30bf\u30fc\u30d5\u30a7\u30fc\u30b9\u306b\u5bfe\u3057\u3066\u306e\u307f\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\">Cortex XSOAR<\/td>\n<td>XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Access Investigation Playbook<\/td>\n<\/tr>\n<tr>\n<td>XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Block Account Generic<\/td>\n<\/tr>\n<tr>\n<td>XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Impossible Traveler<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"5\">Cortex XDR Prevent<\/td>\n<td>\u30db\u30b9\u30c8 \u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb \u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3092\u69cb\u6210\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td>\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u5bfe\u7b56\u6a5f\u80fd\u3092\u6709\u52b9\u306b\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td>Restriction\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3092\u69cb\u6210\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td>\u30de\u30eb\u30a6\u30a7\u30a2\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3067Behavioral Threat Protection (BTP \u632f\u308b\u821e\u3044\u8105\u5a01\u9632\u5fa1)\u3092\u8a2d\u5b9a\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td>\u30de\u30eb\u30a6\u30a7\u30a2\u5bfe\u7b56\u6a5f\u80fd\u3092\u6709\u52b9\u306b\u3057\u307e\u3059<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\"><strong>\u8cc7\u683c\u60c5\u5831\u3078\u306e\u30a2\u30af\u30bb\u30b9<\/strong><\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\">\u4ee5\u4e0b\u306e\u4e00\u9023\u306e\u884c\u52d5\u6307\u91dd\u306f\u6b21\u306e\u30c6\u30af\u30cb\u30c3\u30af\u3092\u7de9\u548c\u3057\u307e\u3059\u3002<\/p>\n<p>Credentials from Password Stores [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1555\">T1555<\/a>]<\/td>\n<\/tr>\n<tr>\n<td>CORTEX XDR<\/td>\n<td>Cortex XDR\u3067\u8cc7\u683c\u60c5\u5831\u306e\u30a2\u30af\u30bb\u30b9\u3084\u6301\u3061\u51fa\u3057\u306b\u95a2\u9023\u3059\u308b\u632f\u308b\u821e\u3044\u30a4\u30d9\u30f3\u30c8\u3068\u30d5\u30a1\u30a4\u30eb\u3092\u76e3\u8996\u3059\u308b<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\"><a id=\"post-124687-_pwywsdbch9bv\"><\/a><strong><span style=\"font-size: 12pt;\">\u63a2\u7d22<\/span><\/strong><\/td>\n<\/tr>\n<tr style=\"height: 131px;\">\n<td style=\"height: 131px;\" colspan=\"2\"><span style=\"font-size: 12pt;\">\u4ee5\u4e0b\u306e\u4e00\u9023\u306e\u884c\u52d5\u6307\u91dd\u306f\u6b21\u306e\u30c6\u30af\u30cb\u30c3\u30af\u3092\u7de9\u548c\u3057\u307e\u3059\u3002<\/span><\/p>\n<p><span style=\"font-size: 12pt;\">System Network Configuration Discovery [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1016\">T1016<\/a>], System Information Discovery [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1082\">T1082<\/a>], Domain Account [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1087\/002\">T1087.002<\/a>]<\/span><\/td>\n<\/tr>\n<tr style=\"height: 75px;\">\n<td style=\"height: 75px;\"><span style=\"font-size: 12pt;\">CORTEX XDR<\/span><\/td>\n<td style=\"height: 75px;\"><span style=\"font-size: 12pt;\">Cortex XDR\u3067\u56e0\u679c\u95a2\u4fc2\u30c1\u30a7\u30fc\u30f3\u306b\u3057\u305f\u304c\u3063\u3066\u884c\u52d5\u30a4\u30d9\u30f3\u30c8\u3092\u76e3\u8996\u3001\u63a2\u7d22\u884c\u52d5\u3092\u8b58\u5225\u3059\u308b<\/span><\/td>\n<\/tr>\n<tr style=\"height: 75px;\">\n<td style=\"height: 75px;\" colspan=\"2\"><a id=\"post-124687-_r4a5xsr7cij8\"><\/a><span style=\"font-size: 12pt;\"><strong>\u30e9\u30c6\u30e9\u30eb\u30e0\u30fc\u30d6<\/strong><\/span><\/td>\n<\/tr>\n<tr style=\"height: 131px;\">\n<td style=\"height: 131px;\" colspan=\"2\"><span style=\"font-size: 12pt;\">\u4ee5\u4e0b\u306e\u4e00\u9023\u306e\u884c\u52d5\u6307\u91dd\u306f\u6b21\u306e\u30c6\u30af\u30cb\u30c3\u30af\u3092\u7de9\u548c\u3057\u307e\u3059\u3002<\/span><\/p>\n<p><span style=\"font-size: 12pt;\">Remote Desktop Protocol [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1021\/001\">T1021.001<\/a>]<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 240px;\" rowspan=\"10\"><span style=\"font-size: 12pt;\">\u6b21\u4e16\u4ee3\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb<\/span><\/td>\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3067\u30b5\u30fc\u30d3\u30b9\u306b\u300cany\u300d\u304c\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3082\u306e\u304c\u306a\u3044\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">User-ID\u30b5\u30fc\u30d3\u30b9\u30a2\u30ab\u30a6\u30f3\u30c8\u306e\u30ea\u30e2\u30fc\u30c8\u30a2\u30af\u30bb\u30b9\u6a5f\u80fd\u304c\u7981\u6b62\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">User-ID\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u5834\u5408\u306fUser-ID\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306b\u6700\u5c0f\u9650\u306e\u6a29\u9650\u3092\u8a2d\u5b9a\u3057\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">User-ID\u304c\u5185\u90e8\u306e\u4fe1\u983c\u3067\u304d\u308b\u30a4\u30f3\u30bf\u30fc\u30d5\u30a7\u30fc\u30b9\u306b\u5bfe\u3057\u3066\u306e\u307f\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">\u4fe1\u983c\u3055\u308c\u3066\u3044\u306a\u3044untrust\u30be\u30fc\u30f3\u304b\u3089\u3088\u308a\u4fe1\u983c\u3055\u308c\u3066\u3044\u308btrust\u30be\u30fc\u30f3\u3078\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u5834\u5408\u306f\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u304c\u5b58\u5728\u3059\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">User-ID\u30b5\u30fc\u30d3\u30b9\u30a2\u30ab\u30a6\u30f3\u30c8\u306b\u5bfe\u8a71\u578b\u30ed\u30b0\u30aa\u30f3\u6a29\u9650\u304c\u306a\u3044\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">\u3059\u3079\u3066\u306e\u30be\u30fc\u30f3\u306b\u3001Reconnaissance Protection(\u5075\u5bdf\u884c\u70ba\u306e\u9632\u5fa1)\u306e\u8a2d\u5b9a\u3092\u3059\u3079\u3066\u6709\u52b9\u5316\u3057\u3001\u8abf\u6574\u3057\u3001\u9069\u5207\u306a\u51e6\u7406\u3092\u8a2d\u5b9a\u3057\u305f\u30be\u30fc\u30f3\u30d7\u30ed\u30c6\u30af\u30b7\u30e7\u30f3\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u3042\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">User-ID\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u5834\u5408\u306f\u300c\u8a31\u53ef\/\u9664\u5916\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u300d\u304c\u4f7f\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">User-ID\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u304cuntrust\u30be\u30fc\u30f3\u306b\u5165\u308b\u306e\u3092\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3067\u5236\u9650\u3057\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">\u4fe1\u983c\u3055\u308c\u305f\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u30bd\u30fc\u30b9\u306eIP\u30a2\u30c9\u30ec\u30b9\u3068\u306e\u9593\u306e\u3059\u3079\u3066\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u62d2\u5426\u3059\u308b\u300c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u300d\u304c\u5b58\u5728\u3059\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">Cortex XDR Prevent<\/span><\/td>\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">\u30db\u30b9\u30c8 \u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb \u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3092\u69cb\u6210\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 48px;\" rowspan=\"2\"><span style=\"font-size: 12pt;\">Cortex XSOAR<\/span><\/td>\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Access Investigation Playbook<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Block Account Generic<\/span><\/td>\n<\/tr>\n<tr style=\"height: 75px;\">\n<td style=\"height: 75px;\" colspan=\"2\"><span style=\"font-size: 12pt;\"><strong>\u53ce\u96c6<\/strong><\/span><\/td>\n<\/tr>\n<tr style=\"height: 131px;\">\n<td style=\"height: 131px;\" colspan=\"2\"><span style=\"font-size: 12pt;\">\u4ee5\u4e0b\u306e\u4e00\u9023\u306e\u884c\u52d5\u6307\u91dd\u306f\u6b21\u306e\u30c6\u30af\u30cb\u30c3\u30af\u3092\u7de9\u548c\u3057\u307e\u3059\u3002<\/span><\/p>\n<p><span style=\"font-size: 12pt;\">Archive via Utility [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1560\/001\">T1560.001<\/a>]<\/span><\/td>\n<\/tr>\n<tr style=\"height: 75px;\">\n<td style=\"height: 75px;\"><span style=\"font-size: 12pt;\">CORTEX XDR<\/span><\/td>\n<td style=\"height: 75px;\"><span style=\"font-size: 12pt;\">BIOC\u306b\u3088\u308aZIP\u30a2\u30fc\u30ab\u30a4\u30d6\u306e\u4f5c\u6210\u3092\u542b\u3080\u884c\u52d5\u30a4\u30d9\u30f3\u30c8\u3092\u76e3\u8996\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 75px;\">\n<td style=\"height: 75px;\" colspan=\"2\"><a id=\"post-124687-_1pf4tjazo6tp\"><\/a><span style=\"font-size: 12pt;\"><strong>\u30b3\u30de\u30f3\u30c9&amp;\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb<\/strong><\/span><\/td>\n<\/tr>\n<tr style=\"height: 131px;\">\n<td style=\"height: 131px;\" colspan=\"2\"><span style=\"font-size: 12pt;\">\u4ee5\u4e0b\u306e\u4e00\u9023\u306e\u884c\u52d5\u6307\u91dd\u306f\u6b21\u306e\u30c6\u30af\u30cb\u30c3\u30af\u3092\u7de9\u548c\u3057\u307e\u3059\u3002<\/span><\/p>\n<p><span style=\"font-size: 12pt;\">Remote Access Software [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1219\">T1219<\/a>], Encrypted Channel [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1573\">T1573<\/a>]<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 72px;\" rowspan=\"3\"><span style=\"font-size: 12pt;\">Cortex XSOAR<\/span><\/td>\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 - PAN-OS Query Logs for Indicators<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Block URL<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 \u2013 Block IP<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 144px;\" rowspan=\"6\"><span style=\"font-size: 12pt;\">\u6b21\u4e16\u4ee3\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb<\/span><\/td>\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">\u5fa9\u53f7\u7528\u306e\u8a3c\u660e\u66f8\u304c\u4fe1\u983c\u3067\u304d\u308b\u3082\u306e\u3067\u3042\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">\u4fe1\u983c\u3055\u308c\u3066\u3044\u306a\u3044untrust\u30be\u30fc\u30f3\u304b\u3089\u3088\u308a\u4fe1\u983c\u3055\u308c\u3066\u3044\u308btrust\u30be\u30fc\u30f3\u3078\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u5834\u5408\u306f\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u304c\u5b58\u5728\u3059\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">\u4fe1\u983c\u3055\u308c\u305f\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u30bd\u30fc\u30b9\u306eIP\u30a2\u30c9\u30ec\u30b9\u3068\u306e\u9593\u306e\u3059\u3079\u3066\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u62d2\u5426\u3059\u308b\u300c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u300d\u304c\u5b58\u5728\u3059\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u5b9b\u3066\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u306e [SSL\u30d5\u30a9\u30ef\u30fc\u30c9 \u30d7\u30ed\u30ad\u30b7] \u30dd\u30ea\u30b7\u30fc\u304c\u69cb\u6210\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">SSL\u307e\u305f\u306fTLS\u3092\u4f7f\u7528\u3059\u308b\u30b5\u30fc\u30d0\u30fc\u5b9b\u3066\u306e\u3059\u3079\u3066\u306e\u4fe1\u983c\u3067\u304d\u306a\u3044\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u306b\u5bfe\u3057\u3066 [SSL\u30a4\u30f3\u30d0\u30a6\u30f3\u30c9 \u30a4\u30f3\u30b9\u30da\u30af\u30b7\u30e7\u30f3] \u304c\u8981\u6c42\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3067\u30b5\u30fc\u30d3\u30b9\u306b\u300cany\u300d\u304c\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3082\u306e\u304c\u306a\u3044\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 144px;\" rowspan=\"6\"><span style=\"font-size: 12pt;\">\u8105\u5a01\u9632\u5fa1<\/span><\/td>\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">\u4f7f\u7528\u4e2d\u306e\u3059\u3079\u3066\u306e\u30a2\u30f3\u30c1\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3067DNS\u30b7\u30f3\u30af\u30db\u30fc\u30eb\u304c\u69cb\u6210\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">\u4f7f\u7528\u4e2d\u306e\u3059\u3079\u3066\u306e\u30a2\u30f3\u30c1\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u3067\u30d1\u30c3\u30b7\u30d6DNS\u30e2\u30cb\u30bf\u30ea\u30f3\u30b0\u304c\u6709\u52b9\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u3078\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u306b\u3001\u5b89\u5168\u306a\u30a2\u30f3\u30c1\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u9069\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">imap\u3001pop3\u3092\u9664\u304f\u3059\u3079\u3066\u306e\u30c7\u30b3\u30fc\u30c0\u3067\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u30d6\u30ed\u30c3\u30af\u306b\u8a2d\u5b9a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">\u30a2\u30f3\u30c1\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u3001\u3059\u3079\u3066\u306e\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u306e\u91cd\u5927\u5ea6\u30ec\u30d9\u30eb\u3001\u30ab\u30c6\u30b4\u30ea\u3001\u304a\u3088\u3073\u8105\u5a01\u3092\u30d6\u30ed\u30c3\u30af\u3059\u308b\u3088\u3046\u306b\u69cb\u6210\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">\u95a2\u9023\u3059\u308b\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u306b\u5b89\u5168\u306a\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u304c\u9069\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 120px;\" rowspan=\"5\"><span style=\"font-size: 12pt;\">URL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0<\/span><\/td>\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u3078\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u8a31\u53ef\u3059\u308b\u3059\u3079\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3067\u5b89\u5168\u306aURL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">\u3059\u3079\u3066\u306eHTTP\u30d8\u30c3\u30c0\u30ed\u30b0\u30aa\u30d7\u30b7\u30e7\u30f3\u304c\u6709\u52b9\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">PAN-DB URL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0\u304c\u4f7f\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">URL\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0\u304cURL\u30ab\u30c6\u30b4\u30ea\u306b\u300c\u30d6\u30ed\u30c3\u30af\u300d\u307e\u305f\u306f\u300c\u30aa\u30fc\u30d0\u30fc\u30e9\u30a4\u30c9\u300d\u306e\u30a2\u30af\u30b7\u30e7\u30f3\u3092\u4f7f\u7528\u3057\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">\u3059\u3079\u3066\u306eURL\u3078\u306e\u30a2\u30af\u30bb\u30b9\u304c\u30ed\u30b0\u306b\u8a18\u9332\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3057\u307e\u3059<\/span><\/td>\n<\/tr>\n<tr style=\"height: 75px;\">\n<td style=\"height: 75px;\" colspan=\"2\"><span style=\"font-size: 12pt;\"><strong>\u5f71\u97ff<\/strong><\/span><\/td>\n<\/tr>\n<tr style=\"height: 131px;\">\n<td style=\"height: 131px;\" colspan=\"2\"><span style=\"font-size: 12pt;\">\u4ee5\u4e0b\u306e\u4e00\u9023\u306e\u884c\u52d5\u6307\u91dd\u306f\u6b21\u306e\u30c6\u30af\u30cb\u30c3\u30af\u3092\u7de9\u548c\u3057\u307e\u3059\u3002<\/span><\/p>\n<p><a id=\"post-124687-_w8lpokitpb03\"><\/a><span style=\"font-size: 12pt;\">Data Encrypted for Impact [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1486\">T1486<\/a>], Service Stop [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1489\">T1489<\/a>], Inhibit System Recovery [<a href=\"https:\/\/attack.mitre.org\/techniques\/T1490\">T1490<\/a>]<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 48px;\" rowspan=\"2\"><span style=\"font-size: 12pt;\">Cortex XSOAR<\/span><\/td>\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 - Ransomware Manual for incident response<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\"><span style=\"font-size: 12pt;\">XSOAR\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u3092\u30c7\u30d7\u30ed\u30a4 - Palo Alto Networks Endpoint Malware Investigation<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><a id=\"post-124687-_5ke50eq39xq0\"><\/a>\u7d50\u8ad6<\/h2>\n<p>Black Basta\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u30aa\u30da\u30ec\u30fc\u30bf\u306f\u3001\u5c11\u306a\u304f\u3068\u30822022\u5e744\u6708\u304b\u3089\u6d3b\u52d5\u3092\u958b\u59cb\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u307e\u3067\u306e\u540cRaaS\u306e\u6d3b\u52d5\u671f\u9593\u306f\u307b\u3093\u306e\u6570\u30f6\u6708\u3067\u3059\u304c\u3001\u672c\u7a3f\u57f7\u7b46\u6642\u70b9\u3067\u3059\u3067\u306b\u5c11\u306a\u304f\u3068\u308275\u306e\u7d44\u7e54\u3092\u4fb5\u5bb3\u3057\u305f\u3088\u3046\u3067\u3059\u30022022\u5e74\u306b\u4e16\u754c\u4e2d\u3067\u78ba\u8a8d\u3055\u308c\u305fBlack Basta\u306e\u653b\u6483\u306f\u6ce8\u76ee\u5ea6\u304c\u9ad8\u304f\u3001\u307e\u305f\u5b89\u5b9a\u3057\u3066\u78ba\u8a8d\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u304b\u3089\u3001\u3053\u306eRaaS\u306e\u80cc\u5f8c\u306b\u3044\u308b\u30aa\u30da\u30ec\u30fc\u30bf\u3084\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u306f\u4eca\u5f8c\u3082\u7d44\u7e54\u3078\u306e\u653b\u6483\u3084\u6050\u559d\u3092\u7d9a\u3051\u308b\u53ef\u80fd\u6027\u304c\u9ad8\u3044\u3068\u8003\u3048\u3089\u308c\u307e\u3059\u3002<\/p>\n<p>\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306fBlack Basta\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u691c\u51fa\/\u9632\u6b62\u3092\u6b21\u306e\u65b9\u6cd5\u3067\u652f\u63f4\u3057\u307e\u3059\u3002<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/products\/secure-the-network\/wildfire\">WildFire<\/a>: \u65e2\u77e5\u306e\u30b5\u30f3\u30d7\u30eb\u306f\u3059\u3079\u3066\u30de\u30eb\u30a6\u30a7\u30a2\u3068\u3057\u3066\u8b58\u5225\u3055\u308c\u307e\u3059\u3002<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/cortex\/cortex-xdr\">Cortex XDR<\/a>:\n<ul>\n<li>Black Basta\u306b\u95a2\u9023\u3059\u308b\u30a4\u30f3\u30b8\u30b1\u30fc\u30bf(\u6307\u6a19)\u3092\u8b58\u5225\u3057\u307e\u3059\u3002<\/li>\n<li>\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u5bfe\u7b56\u30e2\u30b8\u30e5\u30fc\u30eb\u3067Windows\u4e0a\u3067\u306eBlack Basta\u306b\u3088\u308b\u6697\u53f7\u5316\u306e\u632f\u308b\u821e\u3044\u3092\u691c\u51fa\u3057\u307e\u3059\u3002<\/li>\n<li>Windows\u304a\u3088\u3073Linux\u4e0a\u3067\u306e\u30ed\u30fc\u30ab\u30eb\u5206\u6790\u306b\u3088\u308aBlack Basta\u30d0\u30a4\u30ca\u30ea\u3092\u691c\u51fa\u3057\u307e\u3059\u3002<\/li>\n<li>BTP(\u632f\u308b\u821e\u3044\u8105\u5a01\u9632\u5fa1)\u304cBlack Basta\u306e\u632f\u308b\u821e\u3044\u3092\u9632\u6b62\u3057\u307e\u3059\u3002<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.jp\/network-security\/next-generation-firewall\">NGFW\u306e\u5404\u30b7\u30ea\u30fc\u30ba<\/a>: DNS\u30b7\u30b0\u30cd\u30c1\u30e3\u304c\u65e2\u77e5\u306eC2\u30c9\u30e1\u30a4\u30f3\u3092\u691c\u51fa\u3057\u3001<a href=\"https:\/\/www.paloaltonetworks.jp\/network-security\/advanced-url-filtering\">Advanced URL Filtering<\/a>\u304a\u3088\u3073<a href=\"https:\/\/www.paloaltonetworks.jp\/products\/threat-detection-and-prevention\/web-security\">URL Filtering<\/a>\u304c\u540c\u30c9\u30e1\u30a4\u30f3\u3092\u300c\u30de\u30eb\u30a6\u30a7\u30a2\u300d\u3068\u3057\u3066\u5206\u985e\u3057\u307e\u3059\u3002<\/li>\n<\/ul>\n<p>\u4fb5\u5bb3\u306e\u61f8\u5ff5\u304c\u3042\u308a\u5f0a\u793e\u306b\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u30ec\u30b9\u30dd\u30f3\u30b9\u306b\u95a2\u3059\u308b\u3054\u76f8\u8ac7\u3092\u306a\u3055\u308a\u305f\u3044\u5834\u5408\u306f\u3001<a href=\"mailto:infojapan@paloaltonetworks.com\">infojapan@paloaltonetworks.com<\/a> \u307e\u3067\u96fb\u5b50\u30e1\u30fc\u30eb\u306b\u3066\u3054\u9023\u7d61\u304f\u3060\u3055\u3044(\u3054\u76f8\u8ac7\u306f\u5f0a\u793e\u88fd\u54c1\u306e\u304a\u5ba2\u69d8\u306b\u306f\u9650\u5b9a\u3055\u308c\u307e\u305b\u3093)\u3002<\/p>\n<p>IoC(\u4fb5\u5bb3\u6307\u6a19)\u3068Black Basta\u306b\u95a2\u3059\u308bTTP\u306fUnit 42\u306b\u3088\u308bBlackBasta\u306e<a href=\"https:\/\/unit42.paloaltonetworks.com\/atoms\/blackbasta-ransomware\/\">ATOM<\/a>\u30d3\u30e5\u30fc\u30a2\u304b\u3089\u3054\u78ba\u8a8d\u304f\u3060\u3055\u3044\u3002<\/p>\n<p>\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306f\u30d5\u30a1\u30a4\u30eb\u30b5\u30f3\u30d7\u30eb\u3084\u4fb5\u5bb3\u306e\u5146\u5019\u306a\u3069\u3092\u3075\u304f\u3080\u3053\u308c\u3089\u306e\u8abf\u67fb\u7d50\u679c\u3092Cyber Threat Alliance (CTA \u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9) \u306e\u30e1\u30f3\u30d0\u30fc\u3068\u5171\u6709\u3057\u307e\u3057\u305f\u3002CTA \u306e\u30e1\u30f3\u30d0\u30fc\u306f\u3053\u306e\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u3092\u4f7f\u7528\u3057\u3066\u3001\u304a\u5ba2\u69d8\u306b\u4fdd\u8b77\u3092\u8fc5\u901f\u306b\u63d0\u4f9b\u3057\u3001\u60aa\u610f\u306e\u3042\u308b\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u8005\u3092\u4f53\u7cfb\u7684\u306b\u963b\u5bb3\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u8a73\u7d30\u306b\u3064\u3044\u3066\u306f <a href=\"https:\/\/www.cyberthreatalliance.org\">Cyber Threat Alliance <\/a>\u304b\u3089\u3054\u89a7\u304f\u3060\u3055\u3044\uff61<\/p>\n<h2><a id=\"post-124687-_b88wszsrtyea\"><\/a>\u8ffd\u52a0\u30ea\u30bd\u30fc\u30b9<\/h2>\n<ul>\n<li><a href=\"https:\/\/start.paloaltonetworks.jp\/unit-42-ransomware-threat-report.html\">2022Unit 42 \u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u30ec\u30dd\u30fc\u30c8\u304b\u3089\u306e\u6ce8\u76ee\u30dd\u30a4\u30f3\u30c8: \u4f9d\u7136\u3068\u3057\u3066\u4e3b\u8981\u306a\u8105\u5a01<\/a><\/li>\n<li><a href=\"https:\/\/start.paloaltonetworks.com\/2022-unit42-incident-response-report\">2022Unit 42 \u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u5bfe\u5fdc\u30ec\u30dd\u30fc\u30c8<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Black Basta is ransomware as a service (RaaS) that first emerged in April 2022. However, evidence suggests that it has been in development since February. The Black Basta operator(s) use the double extortion technique, meaning that in addition to encrypting files on the systems of targeted organizations and demanding ransom to make decryption possible, they also maintain a dark web leak site where they threaten to post sensitive information if an organization chooses not to pay ransom.<\/p>\n","protected":false},"author":323,"featured_media":134368,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4327,3057,4432,4428],"tags":[5259,5264],"product_categories":[4443,4444,4446,4448,4456,4344,4465],"coauthors":[3154],"class_list":["post-124687","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-top-cyberthreats","category-ransomware-ja","category-top-cyberthreats-ja","category-threat-research-ja","tag-black-basta-ransomware-ja","tag-dark-scorpius","product_categories-advanced-url-filtering-ja","product_categories-advanced-wildfire-ja","product_categories-cloud-delivered-security-services-ja","product_categories-cortex-xdr-ja","product_categories-next-generation-firewall-ja","product_categories-unit-42-incident-response","product_categories-unit-42-incident-response-ja"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u8105\u5a01\u306e\u8a55\u4fa1\uff1aBlack Basta\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2<\/title>\n<meta name=\"description\" content=\"\u3053\u3053\u6570\u30f6\u6708\u3067\u6025\u6fc0\u306b\u88ab\u5bb3\u7d44\u7e54\u3092\u5897\u3084\u3057\u3066\u3044\u308bBlack Basta\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306f\u4e8c\u91cd\u6050\u559d\u3092\u4f7f\u3046RaaS\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u30d7\u30ed\u30b0\u30e9\u30e0\u3067\u3059\u3002\u6d3b\u52d5\u671f\u9593\u306f\u77ed\u3044\u3067\u3059\u304c\u3001\u672c\u7a3f\u57f7\u7b46\u6642\u70b9\u306775\u4ee5\u4e0a\u306e\u7d44\u7e54\u304c\u30ea\u30fc\u30af\u30b5\u30a4\u30c8\u306b\u3055\u3089\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u672c\u8105\u5a01\u306e\u5f71\u97ff\u529b\u306b\u9451\u307f\u3053\u308c\u307e\u3067\u308f\u304b\u3063\u3066\u3044\u308b\u60c5\u5831\u3092\u307e\u3068\u3081\u307e\u3059\u3002\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/unit42.paloaltonetworks.com\/ja\/threat-assessment-black-basta-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u8105\u5a01\u306e\u8a55\u4fa1\uff1aBlack Basta\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\" \/>\n<meta property=\"og:description\" content=\"\u3053\u3053\u6570\u30f6\u6708\u3067\u6025\u6fc0\u306b\u88ab\u5bb3\u7d44\u7e54\u3092\u5897\u3084\u3057\u3066\u3044\u308bBlack Basta\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306f\u4e8c\u91cd\u6050\u559d\u3092\u4f7f\u3046RaaS\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u30d7\u30ed\u30b0\u30e9\u30e0\u3067\u3059\u3002\u6d3b\u52d5\u671f\u9593\u306f\u77ed\u3044\u3067\u3059\u304c\u3001\u672c\u7a3f\u57f7\u7b46\u6642\u70b9\u306775\u4ee5\u4e0a\u306e\u7d44\u7e54\u304c\u30ea\u30fc\u30af\u30b5\u30a4\u30c8\u306b\u3055\u3089\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u672c\u8105\u5a01\u306e\u5f71\u97ff\u529b\u306b\u9451\u307f\u3053\u308c\u307e\u3067\u308f\u304b\u3063\u3066\u3044\u308b\u60c5\u5831\u3092\u307e\u3068\u3081\u307e\u3059\u3002\" \/>\n<meta property=\"og:url\" content=\"https:\/\/unit42.paloaltonetworks.com\/ja\/threat-assessment-black-basta-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Unit 42\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-25T01:12:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-30T00:36:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2024\/06\/06_Ransomware_Category_1920x900.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Amer Elsad\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u8105\u5a01\u306e\u8a55\u4fa1\uff1aBlack Basta\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2","description":"\u3053\u3053\u6570\u30f6\u6708\u3067\u6025\u6fc0\u306b\u88ab\u5bb3\u7d44\u7e54\u3092\u5897\u3084\u3057\u3066\u3044\u308bBlack Basta\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306f\u4e8c\u91cd\u6050\u559d\u3092\u4f7f\u3046RaaS\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u30d7\u30ed\u30b0\u30e9\u30e0\u3067\u3059\u3002\u6d3b\u52d5\u671f\u9593\u306f\u77ed\u3044\u3067\u3059\u304c\u3001\u672c\u7a3f\u57f7\u7b46\u6642\u70b9\u306775\u4ee5\u4e0a\u306e\u7d44\u7e54\u304c\u30ea\u30fc\u30af\u30b5\u30a4\u30c8\u306b\u3055\u3089\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u672c\u8105\u5a01\u306e\u5f71\u97ff\u529b\u306b\u9451\u307f\u3053\u308c\u307e\u3067\u308f\u304b\u3063\u3066\u3044\u308b\u60c5\u5831\u3092\u307e\u3068\u3081\u307e\u3059\u3002","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/unit42.paloaltonetworks.com\/ja\/threat-assessment-black-basta-ransomware\/","og_locale":"ja_JP","og_type":"article","og_title":"\u8105\u5a01\u306e\u8a55\u4fa1\uff1aBlack Basta\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2","og_description":"\u3053\u3053\u6570\u30f6\u6708\u3067\u6025\u6fc0\u306b\u88ab\u5bb3\u7d44\u7e54\u3092\u5897\u3084\u3057\u3066\u3044\u308bBlack Basta\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306f\u4e8c\u91cd\u6050\u559d\u3092\u4f7f\u3046RaaS\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u30d7\u30ed\u30b0\u30e9\u30e0\u3067\u3059\u3002\u6d3b\u52d5\u671f\u9593\u306f\u77ed\u3044\u3067\u3059\u304c\u3001\u672c\u7a3f\u57f7\u7b46\u6642\u70b9\u306775\u4ee5\u4e0a\u306e\u7d44\u7e54\u304c\u30ea\u30fc\u30af\u30b5\u30a4\u30c8\u306b\u3055\u3089\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u672c\u8105\u5a01\u306e\u5f71\u97ff\u529b\u306b\u9451\u307f\u3053\u308c\u307e\u3067\u308f\u304b\u3063\u3066\u3044\u308b\u60c5\u5831\u3092\u307e\u3068\u3081\u307e\u3059\u3002","og_url":"https:\/\/unit42.paloaltonetworks.com\/ja\/threat-assessment-black-basta-ransomware\/","og_site_name":"Unit 42","article_published_time":"2022-08-25T01:12:09+00:00","article_modified_time":"2022-08-30T00:36:17+00:00","og_image":[{"width":1920,"height":900,"url":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2024\/06\/06_Ransomware_Category_1920x900.jpg","type":"image\/jpeg"}],"author":"Amer Elsad","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/threat-assessment-black-basta-ransomware\/#article","isPartOf":{"@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/threat-assessment-black-basta-ransomware\/"},"author":{"name":"Ayako Kimijima","@id":"https:\/\/unit42.paloaltonetworks.com\/#\/schema\/person\/5502567dd627cdd5a306432cd651a90e"},"headline":"\u8105\u5a01\u306e\u8a55\u4fa1\uff1aBlack Basta\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2","datePublished":"2022-08-25T01:12:09+00:00","dateModified":"2022-08-30T00:36:17+00:00","mainEntityOfPage":{"@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/threat-assessment-black-basta-ransomware\/"},"wordCount":807,"commentCount":0,"image":{"@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/threat-assessment-black-basta-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2024\/06\/06_Ransomware_Category_1920x900.jpg","keywords":["Black Basta ransomware","Dark Scorpius"],"articleSection":["High Profile Threats","\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2","\u4e3b\u306a\u30b5\u30a4\u30d0\u30fc\u8105\u5a01","\u8105\u5a01\u30ea\u30b5\u30fc\u30c1"],"inLanguage":"ja","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/unit42.paloaltonetworks.com\/ja\/threat-assessment-black-basta-ransomware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/threat-assessment-black-basta-ransomware\/","url":"https:\/\/unit42.paloaltonetworks.com\/ja\/threat-assessment-black-basta-ransomware\/","name":"\u8105\u5a01\u306e\u8a55\u4fa1\uff1aBlack Basta\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2","isPartOf":{"@id":"https:\/\/unit42.paloaltonetworks.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/threat-assessment-black-basta-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/threat-assessment-black-basta-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2024\/06\/06_Ransomware_Category_1920x900.jpg","datePublished":"2022-08-25T01:12:09+00:00","dateModified":"2022-08-30T00:36:17+00:00","author":{"@id":"https:\/\/unit42.paloaltonetworks.com\/#\/schema\/person\/5502567dd627cdd5a306432cd651a90e"},"description":"\u3053\u3053\u6570\u30f6\u6708\u3067\u6025\u6fc0\u306b\u88ab\u5bb3\u7d44\u7e54\u3092\u5897\u3084\u3057\u3066\u3044\u308bBlack Basta\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306f\u4e8c\u91cd\u6050\u559d\u3092\u4f7f\u3046RaaS\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u30d7\u30ed\u30b0\u30e9\u30e0\u3067\u3059\u3002\u6d3b\u52d5\u671f\u9593\u306f\u77ed\u3044\u3067\u3059\u304c\u3001\u672c\u7a3f\u57f7\u7b46\u6642\u70b9\u306775\u4ee5\u4e0a\u306e\u7d44\u7e54\u304c\u30ea\u30fc\u30af\u30b5\u30a4\u30c8\u306b\u3055\u3089\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u672c\u8105\u5a01\u306e\u5f71\u97ff\u529b\u306b\u9451\u307f\u3053\u308c\u307e\u3067\u308f\u304b\u3063\u3066\u3044\u308b\u60c5\u5831\u3092\u307e\u3068\u3081\u307e\u3059\u3002","breadcrumb":{"@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/threat-assessment-black-basta-ransomware\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/unit42.paloaltonetworks.com\/ja\/threat-assessment-black-basta-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/threat-assessment-black-basta-ransomware\/#primaryimage","url":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2024\/06\/06_Ransomware_Category_1920x900.jpg","contentUrl":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2024\/06\/06_Ransomware_Category_1920x900.jpg","width":1920,"height":900,"caption":"An illustration of a digital security concept featuring a transparent padlock superimposed over multiple hard drives illuminated by blue and red lights. The padlock displays coding and binary numbers, symbolizing data encryption and cybersecurity measures. The image is set against a dark background to enhance the glowing technological elements."},{"@type":"BreadcrumbList","@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/threat-assessment-black-basta-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/unit42.paloaltonetworks.com\/ja\/"},{"@type":"ListItem","position":2,"name":"\u8105\u5a01\u306e\u8a55\u4fa1\uff1aBlack Basta\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2"}]},{"@type":"WebSite","@id":"https:\/\/unit42.paloaltonetworks.com\/#website","url":"https:\/\/unit42.paloaltonetworks.com\/","name":"Unit 42","description":"Palo Alto Networks","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/unit42.paloaltonetworks.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Person","@id":"https:\/\/unit42.paloaltonetworks.com\/#\/schema\/person\/5502567dd627cdd5a306432cd651a90e","name":"Ayako Kimijima","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/unit42.paloaltonetworks.com\/#\/schema\/person\/image\/4ffb3c2d260a0150fb91b3715442f8b3","url":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2018\/11\/unit-news-meta.svg","contentUrl":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2018\/11\/unit-news-meta.svg","caption":"Ayako Kimijima"},"url":"https:\/\/unit42.paloaltonetworks.com\/ja\/author\/akimijima\/"}]}},"_links":{"self":[{"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/posts\/124687","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/users\/323"}],"replies":[{"embeddable":true,"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/comments?post=124687"}],"version-history":[{"count":26,"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/posts\/124687\/revisions"}],"predecessor-version":[{"id":124778,"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/posts\/124687\/revisions\/124778"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/media\/134368"}],"wp:attachment":[{"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/media?parent=124687"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/categories?post=124687"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/tags?post=124687"},{"taxonomy":"product_categories","embeddable":true,"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/product_categories?post=124687"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/coauthors?post=124687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}