Check Point Software Technologies¤Ï3·î7Æü(Êƹñ»þ´Ö)¡¢¡ÖPandas with a Soul: Chinese Espionage Attacks Against Southeast Asian Government Entities - Check Point Research¡×¤Ë¤ª¤¤¤Æ¡¢ÅìÆ¥¸¥¢¤ÎÀ¯Éܵ¡´Ø¤òɸŪ¤È¤¹¤ë¥µ¥¤¥Ð¡¼¥¹¥Ñ¥¤¥¥ã¥ó¥Ú¡¼¥ó¤Ë¤Ä¤¤¤ÆÅÁ¤¨¤¿¡£¡ÖSharp Panda¡×¤È¸Æ¤Ð¤ì¤Æ¤¤¤ëÃæ¹ñ¤Î¹¶·â¥°¥ë¡¼¥×¤¬¿·¤¿¤Ê¥Þ¥ë¥¦¥§¥¢¤ò»È¤¤¡¢¥¥ã¥ó¥Ú¡¼¥ó¤òŸ³«¤·¤Æ¤¤¤ë¤³¤È¤¬ÌÀ¤é¤«¤È¤Ê¤Ã¤¿¡£
Pandas with a Soul: Chinese Espionage Attacks Against Southeast Asian Government Entities - Check Point Research
Check Point Software Technologies¤Ï¡¢¤³¤Î¥¥ã¥ó¥Ú¡¼¥ó¤Ë¤Ä¤¤¤Æ¡¢Ãæ¹ñ¤Ë»Ù±ç¤µ¤ì¤¿¹âÅ٤ʹ¶·â¥°¥ë¡¼¥×¤Ë¤è¤Ã¤Æ±é½Ð¤µ¤ì¤¿¤â¤Î¤ÈʬÀϤ·¤Æ¤¤¤ë¡£¤Þ¤¿¤½¤Î¾¤Î¥Ä¡¼¥ë¤äµ¡Ç½¡¢¥¹¥Ñ¥¤³èÆ°¤Î¹ÈϰϤʥͥåȥ¥¯¤Ë¤Ä¤¤¤Æ¡¢¤Þ¤ÀÄ´ºº¤Ï¿Ê¤ó¤Ç¤¤¤Ê¤¤¤ÈÅÁ¤¨¤Æ¤¤¤ë¡£