Check Point Software Technologies¤Ï3·î7Æü(Êƹñ»þ´Ö)¡¢¡ÖPandas with a Soul: Chinese Espionage Attacks Against Southeast Asian Government Entities - Check Point Research¡×¤Ë¤ª¤¤¤Æ¡¢ÅìÆ¥¸¥¢¤ÎÀ¯Éܵ¡´Ø¤òɸŪ¤È¤¹¤ë¥µ¥¤¥Ð¡¼¥¹¥Ñ¥¤¥­¥ã¥ó¥Ú¡¼¥ó¤Ë¤Ä¤¤¤ÆÅÁ¤¨¤¿¡£¡ÖSharp Panda¡×¤È¸Æ¤Ð¤ì¤Æ¤¤¤ëÃæ¹ñ¤Î¹¶·â¥°¥ë¡¼¥×¤¬¿·¤¿¤Ê¥Þ¥ë¥¦¥§¥¢¤ò»È¤¤¡¢¥­¥ã¥ó¥Ú¡¼¥ó¤òŸ³«¤·¤Æ¤¤¤ë¤³¤È¤¬ÌÀ¤é¤«¤È¤Ê¤Ã¤¿¡£

Pandas with a Soul: Chinese Espionage Attacks Against Southeast Asian Government Entities - Check Point Research

¤³¤Î¥­¥ã¥ó¥Ú¡¼¥ó¤Ï¥¹¥Ô¥¢¥Õ¥£¥Ã¥·¥ó¥°¥á¡¼¥ë¤Ë¤è¤ëɸŪ¤Ø¤Î½é´ü¥¢¥¯¥»¥¹¤«¤é»Ï¤Þ¤ê¡¢¿¯Æþ¤ËÀ®¸ù¤¹¤ë¤ÈRoyalRoad¡¢5.t Downloader¡¢SoulSearcher¤È¿Ãʳ¬¤Î¥Ú¥¤¥í¡¼¥É¤¬¼Â¹Ô¤µ¤ì¡¢ºÇ½ªÅª¤ËSoul Framework¤È¸Æ¤Ð¤ì¤ë¥Þ¥ë¥¦¥§¥¢¤¬¼Â¹Ô¤µ¤ì¤ë¤³¤È¤¬È½ÌÀ¤·¤Æ¤¤¤ë¡£

The infection chain.- Check Point Research

¥­¥ã¥ó¥Ú¡¼¥ó¼«ÂΤϰÊÁ°¤«¤é¿Ê¹ÔÃæ¤Ç¡¢¤³¤ì¤Þ¤ÇVictoryDll¤È¸Æ¤Ð¤ì¤ëÆȼ«¤Î¥«¥¹¥¿¥à¥Ð¥Ã¥¯¥É¥¢¤Ë¤è¤ë¥¹¥Ñ¥¤³èÆ°¤¬¹Ô¤ï¤ì¤Æ¤¤¤¿¡£º£²ó¿·¤¿¤Ë¥À¥¦¥ó¥í¡¼¥À¤È¤·¤ÆSoulSearcher¤¬»È¤ï¤ì¡¢¥Þ¥ë¥¦¥§¥¢¤È¤·¤ÆSoul Framework¤¬ºÎÍѤµ¤ì¤Æ¤¤¤ë¤³¤È¤¬³Îǧ¤µ¤ì¤Æ¤¤¤ë¡£

Soul Framework¤Ï¤³¤ì¤Þ¤ÇÅìÆ¥¸¥¢¤ÎËɱҡ¢°åÎÅ¡¢ITʬÌî¤òɸŪ¤È¤·¤¿¥µ¥¤¥Ð¡¼¥¹¥Ñ¥¤¥­¥ã¥ó¥Ú¡¼¥ó¤Ç»È¤ï¤ì¤Æ¤ª¤ê¡¢Ãæ¹ñ¤Ë´ØÏ¢¤¹¤ë»ý³ŪɸŪ·¿¹¶·â(APT: Advanced Persistent Threat)¥°¥ë¡¼¥×¤Î´Ö¤ÇÍøÍѤµ¤ì¤Æ¤¤¤ë¥Þ¥ë¥¦¥§¥¢¤È¹Í¤¨¤é¤ì¤Æ¤ë¡£

Check Point Software Technologies¤Ï¡¢¤³¤Î¥­¥ã¥ó¥Ú¡¼¥ó¤Ë¤Ä¤¤¤Æ¡¢Ãæ¹ñ¤Ë»Ù±ç¤µ¤ì¤¿¹âÅ٤ʹ¶·â¥°¥ë¡¼¥×¤Ë¤è¤Ã¤Æ±é½Ð¤µ¤ì¤¿¤â¤Î¤ÈʬÀϤ·¤Æ¤¤¤ë¡£¤Þ¤¿¤½¤Î¾¤Î¥Ä¡¼¥ë¤äµ¡Ç½¡¢¥¹¥Ñ¥¤³èÆ°¤Î¹­ÈϰϤʥͥåȥ¥¯¤Ë¤Ä¤¤¤Æ¡¢¤Þ¤ÀÄ´ºº¤Ï¿Ê¤ó¤Ç¤¤¤Ê¤¤¤ÈÅÁ¤¨¤Æ¤¤¤ë¡£