¥é¥ó¥µ¥à¥¦¥§¥¢¡ÖPlay¡×¤¬À¤³¦Ãæ¤ÎÁÈ¿¥¤òÁÀ¤Ã¤Æ¤¤¤ë¡¢·Ù²ü¤ò
The Hacker News¤Ï12·î19Æü(¸½ÃÏ»þ´Ö)¡¢¡ÖDouble-Extortion Play Ransomware Strikes 300 Organizations Worldwide¡×¤Ë¤ª¤¤¤Æ¡¢¥é¥ó¥µ¥à¥¦¥§¥¢¡ÖPlay(ÊÌ̾¡§Playcrypt)¡×¤òÍѤ¤¤ë¶¼°Ò¥°¥ë¡¼¥×¤¬À¤³¦¤Î300¤ËµÚ¤ÖÁÈ¿¥¤ËÂФ·¹¶·â¤ò¼Â¹Ô¤·¤¿¤³¤È¤¬³Îǧ¤µ¤ì¤¿¤È¤·¤Æ·Ù¹ð¤·¤¿¡£
ÊƹñϢˮĴºº¶É(FBI: Federal Bureau of Investigation)¤ª¤è¤ÓÊƹñÅÚ°ÂÁ´Êݾã¾Ê¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£¡¦¥¤¥ó¥Õ¥é¥¹¥È¥é¥¯¥Á¥ã¥»¥¥å¥ê¥Æ¥£Ä£(CISA: Cybersecurity and Infrastructure Security Agency)¤Ï¡¢¥ª¡¼¥¹¥È¥é¥ê¥¢ÄÌ¿®ÅŻҶÉ(ASD: Australian Signals Directorate)¤Î¥ª¡¼¥¹¥È¥é¥ê¥¢¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£¥»¥ó¥¿¡¼(ACSC: Australian Cyber Security Centre)¤È¶¦Æ±¤Ç¡¢¡ÖPlay¡×¤Ë´Ø¤¹¤ë¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£¥¢¥É¥Ð¥¤¥¶¥ê(CSA: Cybersecurity Advisory)¤òȯɽ¤·¤Æ¤¤¤ë(»²¹Í¡§¡ÖFBI, CISA, and ASD¡Çs ACSC Release Advisory on Play Ransomware | CISA¡×)¡£
Double-Extortion Play Ransomware Strikes 300 Organizations Worldwide
¡û¥é¥ó¥µ¥à¥¦¥§¥¢¡ÖPlay¡×¤òÍѤ¤¤¿¹¶·â¤Î¼ÂÂÖ
¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£¥¢¥É¥Ð¥¤¥¶¥ê¤Ë¤è¤ë¤È¡¢Play¤òÁà¤ë¥é¥ó¥µ¥à¥¦¥§¥¢¥°¥ë¡¼¥×¤ÏËÌÊÆ¡¢ÆîÊÆ¡¢¥è¡¼¥í¥Ã¥Ñ¡¢¥ª¡¼¥¹¥È¥é¥ê¥¢¤ÎÉý¹¤¤´ë¶È¤ä½ÅÍ×¥¤¥ó¥Õ¥é¤Ë±Æ¶Á¤òÍ¿¤¨¤Æ¤¤¤ë¤È¤¤¤¦¡£¤½¤Î±Æ¶Á¤Ï2023ǯ10·î¤Î»þÅÀ¤Ç¡¢Ìó300¤ÎÁÈ¿¥¤Ë㤷¤Æ¤¤¤ë¤È¤Î¤³¤È¡£Ä̾ï¤Î¥é¥ó¥µ¥à¥¦¥§¥¢¤ÈƱÍͤËÆó½Å¤Î¶¼Ç÷¥·¥¹¥Æ¥à¤òºÎÍѤ·¤Æ¤ª¤ê¡¢¥Ç¡¼¥¿¤ÎÀà¼è¤È°Å¹æ²½¤ò¹Ô¤¤¿ÈÂå¶â¤òÍ׵᤹¤ë¡£¿ÈÂå¶â¤ÎÍ×µáÊýË¡¤ÏÄ̾ï¤È°Û¤Ê¤ê¡¢Èï³²¼Ô¤Ï¹¶·â¼Ô¤Ë¥á¡¼¥ë¤ÇÏ¢Íí¤¹¤ëɬÍפ¬¤¢¤ë¤È¤µ¤ì¤ë¡£
The Hacker News¤Ë¤è¤ë¤È¡¢¤³¤Î¥é¥ó¥µ¥à¥¦¥§¥¢¥°¥ë¡¼¥×¤ÏMicrosoft Exchange¥µ¡¼¥Ð¤ÈFortinet¥¢¥×¥é¥¤¥¢¥ó¥¹¤ÎÀȼåÀ¤ò°ÍѤ·¤Æ´ë¶È¤Ë¿¯Æþ¤·¡¢¥é¥ó¥µ¥à¥¦¥§¥¢¤òŸ³«¤¹¤ë¤È¤¤¤¦¡£¥»¥¥å¥ê¥Æ¥£´ë¶È¤Î¡ÖAdlumin¡×¤ÏÀè·îȯ¹Ô¤·¤¿¥ì¥Ý¡¼¥È¤Ç¡¢¥é¥ó¥µ¥à¥¦¥§¥¢¡ÖPlay¡×¤¬Â¾¤Î¶¼°Ò¥¢¥¯¥¿¡¼¤Ë¥µ¡¼¥Ó¥¹¤È¤·¤ÆÄ󶡤µ¤ì¡¢¥é¥ó¥µ¥à¥¦¥§¥¢¡¦¥¢¥º¡¦¥¢¡¦¥µ¡¼¥Ó¥¹(RaaS: Ransomware-as-a-Service)¤È¤·¤Æ¤Î±¿ÍѤ¬³«»Ï¤µ¤ì¤¿²ÄǽÀ¤¬¤¢¤ë¤È»ØŦ¤·¤Æ¤ª¤ê¡¢Èï³²¤Î¤µ¤é¤Ê¤ë³ÈÂ礬·üÇ°¤µ¤ì¤Æ¤¤¤ë¡£
¡û¥é¥ó¥µ¥à¥¦¥§¥¢¡ÖPlay¡×¤òÍѤ¤¤¿¹¶·â¤Ø¤ÎÂй³ºö
¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£¥¢¥É¥Ð¥¤¥¶¥ê¤Ç¤Ï¡¢¤³¤Î¹¶·â¤ËÂФ¹¤ë´ËϺö¤È¤·¤Æ°Ê²¼¤òÄ󼨤·¤Æ¤¤¤ë¡£
µ¡Ì©¥Ç¡¼¥¿¤äÆȼ«¥Ç¡¼¥¿¤È¥µ¡¼¥Ð¤Î¥¤¥ß¥å¡¼¥¿¥Ö¥ë¥Ð¥Ã¥¯¥¢¥Ã¥×¤òÊ£¿ôºîÀ®¤¹¤ë¡£¥Ð¥Ã¥¯¥¢¥Ã¥×¤ÏʪÍýŪ¤ËʬΥ¤µ¤ì¤¿°ÂÁ´¤Ê¾ì½ê¤ËÊݴɤ¹¤ë
¥í¥°¥¤¥ó¤òɬÍפȤ¹¤ë¤¹¤Ù¤Æ¤Î¥¢¥«¥¦¥ó¥È¤ËÂФ·¡¢¡ÖCPG Report | CISA¡×¤Î¹àÌÜ2.B¡¢2.C¡¢2.G¤òŬÍѤ¹¤ë¡£²Ã¤¨¤Æ¥Ñ¥¹¥ï¡¼¥É¥Þ¥Í¡¼¥¸¥ã¡¼¤Î»ÈÍÑ¡¢¥Ñ¥¹¥ï¡¼¥É¤Î¡Ö¥Ò¥ó¥È¡×¤ò̵¸ú²½¡¢¥Ñ¥¹¥ï¡¼¥É¤ÎºÆÍøÍѤζػߡ¢¥Ñ¥¹¥ï¡¼¥É¤ÎÄê´üŪ¤ÊÊѹ¹¤òÍ׵ᤷ¤Ê¤¤¤³¤È¤¬¿ä¾©¤µ¤ì¤ë
²Äǽ¤Ê¸Â¤ê¤¹¤Ù¤Æ¤Î¥µ¡¼¥Ó¥¹¤Ë¿Í×ÁÇǧ¾Ú(MFA: Multi-Factor Authentication)¤òÍ׵᤹¤ë
¤¹¤Ù¤Æ¤Î¥ª¥Ú¥ì¡¼¥Æ¥£¥ó¥°¥·¥¹¥Æ¥à¡¢¥½¥Õ¥È¥¦¥§¥¢¡¢¥Õ¥¡¡¼¥à¥¦¥§¥¢¤òºÇ¿·¤ËÊݤÄ
¥Í¥Ã¥È¥ï¡¼¥¯¤ò¥»¥°¥á¥ó¥È²½¤·¤Æ²£°ÜÆ°¤È¥é¥ó¥µ¥à¥¦¥§¥¢¤Î³È»¶¤òËɻߤ¹¤ë
¹âÅ٤ʥ¨¥ó¥É¥Ý¥¤¥ó¥È¸¡½Ð±þÅú(EDR: Endpoint Detection and Response)¤ò²Äǽ¤È¤¹¤ë¥»¥¥å¥ê¥Æ¥£¥½¥ê¥å¡¼¥·¥ç¥ó¤òƳÆþ¤¹¤ë
¥Í¥Ã¥È¥ï¡¼¥¯¥È¥é¥Õ¥£¥Ã¥¯¤ò¥Õ¥£¥ë¥¿¥ê¥ó¥°¤·¡¢ÆâÉô¥·¥¹¥Æ¥à¤È̤ÃΤޤ¿¤ÏÉÔ¿³¤Êȯ¿®¸µ¤È¤ÎÄÌ¿®¤ò¥Ö¥í¥Ã¥¯¤¹¤ë
¤¹¤Ù¤Æ¤ÎüËö¤Ë¥¢¥ó¥Á¥¦¥¤¥ë¥¹¥½¥Õ¥È¥¦¥§¥¢¤òƳÆþ¤·¡¢¥ê¥¢¥ë¥¿¥¤¥à¸¡½Ð¤ò͸ú¤Ë¤¹¤ë
¥É¥á¥¤¥ó¥³¥ó¥È¥í¡¼¥é¡¢¥µ¡¼¥Ð¡¢¥ï¡¼¥¯¥¹¥Æ¡¼¥·¥ç¥ó¡¢Active Directory¤ËÉÔ¿³¤Ê¥¢¥«¥¦¥ó¥È¤¬Â¸ºß¤·¤Ê¤¤¤³¤È¤ò³Îǧ¤¹¤ë
ºÇ¾®¸¢¸Â¤Î¸¶Â§¤Ë½¾¤Ã¤Æ¥¢¥¯¥»¥¹À©¸æ¤ò¹½À®¤¹¤ë
̤»ÈÍѤÎÄÌ¿®¥Ý¡¼¥È¤òÊĤ¸¤ë
¼õ¿®¤·¤¿¥á¡¼¥ë¤Î¥ê¥ó¥¯¤ò̵¸ú¤Ë¤¹¤ë
´ÉÍý¼Ô°Ê¾å¤Î¸¢¸Â¤ò¤â¤Ä¥¢¥«¥¦¥ó¥È¤Î¥¢¥¯¥»¥¹¤Ë»þ´ÖÀ©¸Â¤òÀߤ±¤ë
¤µ¤é¤Ë¡¢¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£¥¢¥É¥Ð¥¤¥¶¥ê¤Ç¤Ï¡¢¥¢¥É¥Ð¥¤¥¶¥ê¤ÇÄ󶡤·¤Æ¤¤¤ë¡ÖMITRE ATT&CK TACTICS AND TECHNIQUES¡×¤Ë¥Þ¥Ã¥Ô¥ó¥°¤µ¤ì¤Æ¤¤¤ë¶¼°Ò¤ÎÆ°ºî¤Ë¤Ä¤¤¤ÆÁÈ¿¥¤Î¥»¥¥å¥ê¥Æ¥£¥×¥í¥°¥é¥à¤ò¼Â¹Ô¡¢¥Æ¥¹¥È¡¢¸¡¾Ú¤¹¤ë¤³¤È¤ò¿ä¾©¤·¤Æ¤¤¤ë¡£¤Þ¤¿¡¢2023ǯ10·î¤Î»þÅÀ¤ÇÊƹñϢˮĴºº¶É¤«¤éÆÀ¤é¤ì¤¿¥»¥¥å¥ê¥Æ¥£¿¯³²¥¤¥ó¥¸¥±¡¼¥¿(IoC: Indicator of Compromise)¤ò¸ø³«¤·¤Æ¤ª¤ê¡¢É¬Íפ˱þ¤¸¤Æ³èÍѤ¹¤ë¤³¤È¤¬Ë¾¤Þ¤ì¤Æ¤¤¤ë¡£
ÊƹñϢˮĴºº¶É(FBI: Federal Bureau of Investigation)¤ª¤è¤ÓÊƹñÅÚ°ÂÁ´Êݾã¾Ê¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£¡¦¥¤¥ó¥Õ¥é¥¹¥È¥é¥¯¥Á¥ã¥»¥¥å¥ê¥Æ¥£Ä£(CISA: Cybersecurity and Infrastructure Security Agency)¤Ï¡¢¥ª¡¼¥¹¥È¥é¥ê¥¢ÄÌ¿®ÅŻҶÉ(ASD: Australian Signals Directorate)¤Î¥ª¡¼¥¹¥È¥é¥ê¥¢¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£¥»¥ó¥¿¡¼(ACSC: Australian Cyber Security Centre)¤È¶¦Æ±¤Ç¡¢¡ÖPlay¡×¤Ë´Ø¤¹¤ë¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£¥¢¥É¥Ð¥¤¥¶¥ê(CSA: Cybersecurity Advisory)¤òȯɽ¤·¤Æ¤¤¤ë(»²¹Í¡§¡ÖFBI, CISA, and ASD¡Çs ACSC Release Advisory on Play Ransomware | CISA¡×)¡£
¡û¥é¥ó¥µ¥à¥¦¥§¥¢¡ÖPlay¡×¤òÍѤ¤¤¿¹¶·â¤Î¼ÂÂÖ
¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£¥¢¥É¥Ð¥¤¥¶¥ê¤Ë¤è¤ë¤È¡¢Play¤òÁà¤ë¥é¥ó¥µ¥à¥¦¥§¥¢¥°¥ë¡¼¥×¤ÏËÌÊÆ¡¢ÆîÊÆ¡¢¥è¡¼¥í¥Ã¥Ñ¡¢¥ª¡¼¥¹¥È¥é¥ê¥¢¤ÎÉý¹¤¤´ë¶È¤ä½ÅÍ×¥¤¥ó¥Õ¥é¤Ë±Æ¶Á¤òÍ¿¤¨¤Æ¤¤¤ë¤È¤¤¤¦¡£¤½¤Î±Æ¶Á¤Ï2023ǯ10·î¤Î»þÅÀ¤Ç¡¢Ìó300¤ÎÁÈ¿¥¤Ë㤷¤Æ¤¤¤ë¤È¤Î¤³¤È¡£Ä̾ï¤Î¥é¥ó¥µ¥à¥¦¥§¥¢¤ÈƱÍͤËÆó½Å¤Î¶¼Ç÷¥·¥¹¥Æ¥à¤òºÎÍѤ·¤Æ¤ª¤ê¡¢¥Ç¡¼¥¿¤ÎÀà¼è¤È°Å¹æ²½¤ò¹Ô¤¤¿ÈÂå¶â¤òÍ׵᤹¤ë¡£¿ÈÂå¶â¤ÎÍ×µáÊýË¡¤ÏÄ̾ï¤È°Û¤Ê¤ê¡¢Èï³²¼Ô¤Ï¹¶·â¼Ô¤Ë¥á¡¼¥ë¤ÇÏ¢Íí¤¹¤ëɬÍפ¬¤¢¤ë¤È¤µ¤ì¤ë¡£
The Hacker News¤Ë¤è¤ë¤È¡¢¤³¤Î¥é¥ó¥µ¥à¥¦¥§¥¢¥°¥ë¡¼¥×¤ÏMicrosoft Exchange¥µ¡¼¥Ð¤ÈFortinet¥¢¥×¥é¥¤¥¢¥ó¥¹¤ÎÀȼåÀ¤ò°ÍѤ·¤Æ´ë¶È¤Ë¿¯Æþ¤·¡¢¥é¥ó¥µ¥à¥¦¥§¥¢¤òŸ³«¤¹¤ë¤È¤¤¤¦¡£¥»¥¥å¥ê¥Æ¥£´ë¶È¤Î¡ÖAdlumin¡×¤ÏÀè·îȯ¹Ô¤·¤¿¥ì¥Ý¡¼¥È¤Ç¡¢¥é¥ó¥µ¥à¥¦¥§¥¢¡ÖPlay¡×¤¬Â¾¤Î¶¼°Ò¥¢¥¯¥¿¡¼¤Ë¥µ¡¼¥Ó¥¹¤È¤·¤ÆÄ󶡤µ¤ì¡¢¥é¥ó¥µ¥à¥¦¥§¥¢¡¦¥¢¥º¡¦¥¢¡¦¥µ¡¼¥Ó¥¹(RaaS: Ransomware-as-a-Service)¤È¤·¤Æ¤Î±¿ÍѤ¬³«»Ï¤µ¤ì¤¿²ÄǽÀ¤¬¤¢¤ë¤È»ØŦ¤·¤Æ¤ª¤ê¡¢Èï³²¤Î¤µ¤é¤Ê¤ë³ÈÂ礬·üÇ°¤µ¤ì¤Æ¤¤¤ë¡£
¡û¥é¥ó¥µ¥à¥¦¥§¥¢¡ÖPlay¡×¤òÍѤ¤¤¿¹¶·â¤Ø¤ÎÂй³ºö
¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£¥¢¥É¥Ð¥¤¥¶¥ê¤Ç¤Ï¡¢¤³¤Î¹¶·â¤ËÂФ¹¤ë´ËϺö¤È¤·¤Æ°Ê²¼¤òÄ󼨤·¤Æ¤¤¤ë¡£
µ¡Ì©¥Ç¡¼¥¿¤äÆȼ«¥Ç¡¼¥¿¤È¥µ¡¼¥Ð¤Î¥¤¥ß¥å¡¼¥¿¥Ö¥ë¥Ð¥Ã¥¯¥¢¥Ã¥×¤òÊ£¿ôºîÀ®¤¹¤ë¡£¥Ð¥Ã¥¯¥¢¥Ã¥×¤ÏʪÍýŪ¤ËʬΥ¤µ¤ì¤¿°ÂÁ´¤Ê¾ì½ê¤ËÊݴɤ¹¤ë
¥í¥°¥¤¥ó¤òɬÍפȤ¹¤ë¤¹¤Ù¤Æ¤Î¥¢¥«¥¦¥ó¥È¤ËÂФ·¡¢¡ÖCPG Report | CISA¡×¤Î¹àÌÜ2.B¡¢2.C¡¢2.G¤òŬÍѤ¹¤ë¡£²Ã¤¨¤Æ¥Ñ¥¹¥ï¡¼¥É¥Þ¥Í¡¼¥¸¥ã¡¼¤Î»ÈÍÑ¡¢¥Ñ¥¹¥ï¡¼¥É¤Î¡Ö¥Ò¥ó¥È¡×¤ò̵¸ú²½¡¢¥Ñ¥¹¥ï¡¼¥É¤ÎºÆÍøÍѤζػߡ¢¥Ñ¥¹¥ï¡¼¥É¤ÎÄê´üŪ¤ÊÊѹ¹¤òÍ׵ᤷ¤Ê¤¤¤³¤È¤¬¿ä¾©¤µ¤ì¤ë
²Äǽ¤Ê¸Â¤ê¤¹¤Ù¤Æ¤Î¥µ¡¼¥Ó¥¹¤Ë¿Í×ÁÇǧ¾Ú(MFA: Multi-Factor Authentication)¤òÍ׵᤹¤ë
¤¹¤Ù¤Æ¤Î¥ª¥Ú¥ì¡¼¥Æ¥£¥ó¥°¥·¥¹¥Æ¥à¡¢¥½¥Õ¥È¥¦¥§¥¢¡¢¥Õ¥¡¡¼¥à¥¦¥§¥¢¤òºÇ¿·¤ËÊݤÄ
¥Í¥Ã¥È¥ï¡¼¥¯¤ò¥»¥°¥á¥ó¥È²½¤·¤Æ²£°ÜÆ°¤È¥é¥ó¥µ¥à¥¦¥§¥¢¤Î³È»¶¤òËɻߤ¹¤ë
¹âÅ٤ʥ¨¥ó¥É¥Ý¥¤¥ó¥È¸¡½Ð±þÅú(EDR: Endpoint Detection and Response)¤ò²Äǽ¤È¤¹¤ë¥»¥¥å¥ê¥Æ¥£¥½¥ê¥å¡¼¥·¥ç¥ó¤òƳÆþ¤¹¤ë
¥Í¥Ã¥È¥ï¡¼¥¯¥È¥é¥Õ¥£¥Ã¥¯¤ò¥Õ¥£¥ë¥¿¥ê¥ó¥°¤·¡¢ÆâÉô¥·¥¹¥Æ¥à¤È̤ÃΤޤ¿¤ÏÉÔ¿³¤Êȯ¿®¸µ¤È¤ÎÄÌ¿®¤ò¥Ö¥í¥Ã¥¯¤¹¤ë
¤¹¤Ù¤Æ¤ÎüËö¤Ë¥¢¥ó¥Á¥¦¥¤¥ë¥¹¥½¥Õ¥È¥¦¥§¥¢¤òƳÆþ¤·¡¢¥ê¥¢¥ë¥¿¥¤¥à¸¡½Ð¤ò͸ú¤Ë¤¹¤ë
¥É¥á¥¤¥ó¥³¥ó¥È¥í¡¼¥é¡¢¥µ¡¼¥Ð¡¢¥ï¡¼¥¯¥¹¥Æ¡¼¥·¥ç¥ó¡¢Active Directory¤ËÉÔ¿³¤Ê¥¢¥«¥¦¥ó¥È¤¬Â¸ºß¤·¤Ê¤¤¤³¤È¤ò³Îǧ¤¹¤ë
ºÇ¾®¸¢¸Â¤Î¸¶Â§¤Ë½¾¤Ã¤Æ¥¢¥¯¥»¥¹À©¸æ¤ò¹½À®¤¹¤ë
̤»ÈÍѤÎÄÌ¿®¥Ý¡¼¥È¤òÊĤ¸¤ë
¼õ¿®¤·¤¿¥á¡¼¥ë¤Î¥ê¥ó¥¯¤ò̵¸ú¤Ë¤¹¤ë
´ÉÍý¼Ô°Ê¾å¤Î¸¢¸Â¤ò¤â¤Ä¥¢¥«¥¦¥ó¥È¤Î¥¢¥¯¥»¥¹¤Ë»þ´ÖÀ©¸Â¤òÀߤ±¤ë
¤µ¤é¤Ë¡¢¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£¥¢¥É¥Ð¥¤¥¶¥ê¤Ç¤Ï¡¢¥¢¥É¥Ð¥¤¥¶¥ê¤ÇÄ󶡤·¤Æ¤¤¤ë¡ÖMITRE ATT&CK TACTICS AND TECHNIQUES¡×¤Ë¥Þ¥Ã¥Ô¥ó¥°¤µ¤ì¤Æ¤¤¤ë¶¼°Ò¤ÎÆ°ºî¤Ë¤Ä¤¤¤ÆÁÈ¿¥¤Î¥»¥¥å¥ê¥Æ¥£¥×¥í¥°¥é¥à¤ò¼Â¹Ô¡¢¥Æ¥¹¥È¡¢¸¡¾Ú¤¹¤ë¤³¤È¤ò¿ä¾©¤·¤Æ¤¤¤ë¡£¤Þ¤¿¡¢2023ǯ10·î¤Î»þÅÀ¤ÇÊƹñϢˮĴºº¶É¤«¤éÆÀ¤é¤ì¤¿¥»¥¥å¥ê¥Æ¥£¿¯³²¥¤¥ó¥¸¥±¡¼¥¿(IoC: Indicator of Compromise)¤ò¸ø³«¤·¤Æ¤ª¤ê¡¢É¬Íפ˱þ¤¸¤Æ³èÍѤ¹¤ë¤³¤È¤¬Ë¾¤Þ¤ì¤Æ¤¤¤ë¡£