Trend Micro¤Ï¤³¤Î¤Û¤É¡¢¡ÖCVE-2024-21412: DarkGate Operators Exploit Microsoft Windows SmartScreen Bypass in Zero-Day Campaign¡ÃTrend Micro (US)¡×¤Ë¤ª¤¤¤Æ¡¢Microsoft Defender SmartScreen¤Î¥»¥­¥å¥ê¥Æ¥£µ¡Ç½¤ò¥Ð¥¤¥Ñ¥¹¤¹¤ëÀȼåÀ­¡ÖCVE-2024-21412¡×¤¬2024ǯ1·î¤ËȯÀ¸¤·¤¿¥Þ¥ë¥¦¥§¥¢¡ÖDarkGate¡×ÇÛÉÛ¥­¥ã¥ó¥Ú¡¼¥ó¤Ë°­ÍѤµ¤ì¤¿¤ÈÊ󤸤¿¡£¤³¤ÎÀȼåÀ­¤Ï2024ǯ2·î¤Ë½¤Àµ¤µ¤ì¤Æ¤ª¤ê¡¢¥¼¥í¥Ç¥¤¤ÎÀȼåÀ­¤Î°­ÍѤÀ¤Ã¤¿¤È¤ß¤é¤ì¤Æ¤¤¤ë¡£

CVE-2024-21412: DarkGate Operators Exploit Microsoft Windows SmartScreen Bypass in Zero-Day Campaign¡ÃTrend Micro (US)

¡û¥Þ¥ë¥¦¥§¥¢¡ÖDarkGate¡×¤Î´¶À÷·ÐÏ©

¤³¤Î¥­¥ã¥ó¥Ú¡¼¥ó¤Ï¡¢Trend Micro¤¬±¿±Ä¤¹¤ëÀȼåÀ­È¯¸«¥³¥ß¥å¥Ë¥Æ¥£¡ÖZero Day Initiative¡×¤Ë¤è¤ê2024ǯ1·î¤Ëȯ¸«¤µ¤ì¤¿¡£¤³¤Î¥­¥ã¥ó¥Ú¡¼¥ó¤Ç¤ÏPDF¥Õ¥¡¥¤¥ë¤ò»ÈÍѤ·¤Æ¥æ¡¼¥¶¡¼¤òͶƳ¤·¡¢ÀȼåÀ­¡ÖCVE-2024-21412¡×¤ò¥Û¥¹¥È¤¹¤ë´í¸±¤ÊWeb¥µ¥¤¥È¤«¤é°­°Õ¤Î¤¢¤ë¥¢¥×¥ê¥±¡¼¥·¥ç¥ó¤ò¥À¥¦¥ó¥í¡¼¥É¤µ¤»¤ë¼êË¡¤¬»ÈÍѤµ¤ì¤¿¡£

¥Þ¥ë¥¦¥§¥¢¡ÖDarkGate¡×¤Î´¶À÷·ÐÏ©¡¡°úÍÑ¡§Trend Micro

ºÇ½é¤ËÇÛÉÛ¤µ¤ì¤ëPDF¥Õ¥¡¥¤¥ë¤Ï¡¢¥Õ¥£¥Ã¥·¥ó¥°¥á¡¼¥ë¤ÎźÉÕ¥Õ¥¡¥¤¥ë¤È¤·¤ÆÇÛÉÛ¤µ¤ì¤ë¡£¤³¤ÎPDF¥Õ¥¡¥¤¥ë¤Ë¤Ï¡¢Google¤¬µÛ¼ý¹çÊ»¤·¤¿¹­¹ð´ØÏ¢´ë¶È¡Ödoubleclick.net¡×¤Ø¤Î¥ê¥ó¥¯¤¬´Þ¤Þ¤ì¤Æ¤¤¤ë¡£¥æ¡¼¥¶¡¼¤¬¤³¤Î¥ê¥ó¥¯¤ò¥¯¥ê¥Ã¥¯¤¹¤ë¤ÈGoogle¤Î¹­¹ð¥·¥¹¥Æ¥à¤ò·Ðͳ¤·¤Æ°­°Õ¤Î¤¢¤ëWeb¥µ¥¤¥È¤Ø¥ê¥À¥¤¥ì¥¯¥È¤µ¤ì¤ë¡£

¥ê¥À¥¤¥ì¥¯¥ÈÀè¤Ï°­°Õ¤Î¤¢¤ë¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥·¥ç¡¼¥È¥«¥Ã¥È¥Õ¥¡¥¤¥ë(.url)¤Ç¡¢¤³¤Î¥·¥ç¡¼¥È¥«¥Ã¥È¥Õ¥¡¥¤¥ë¤«¤é¤µ¤é¤ËÊ̤Υ¤¥ó¥¿¡¼¥Í¥Ã¥È¥·¥ç¡¼¥È¥«¥Ã¥È¥Õ¥¡¥¤¥ë¤Ø¥ê¥À¥¤¥ì¥¯¥È¤µ¤ì¤ë¡£¤³¤Î2Ãʳ¬¤Î¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥·¥ç¡¼¥È¥«¥Ã¥È¥Õ¥¡¥¤¥ë¤Î»²¾È¼ê½ç¤¬ÀȼåÀ­¡ÖCVE-2024-21412¡×¤È¤Ê¤ë¡£¤³¤ì¤Ë¤è¤êMicrosoft Defender SmartScreen¤Î¥»¥­¥å¥ê¥Æ¥£µ¡Ç½¤¬¥Ð¥¤¥Ñ¥¹¤µ¤ì¤ë¡£

2ÅÙÌܤΥ·¥ç¡¼¥È¥«¥Ã¥È¥Õ¥¡¥¤¥ë¤Ï¥¢¥×¥ê¥±¡¼¥·¥ç¥ó¤Î¥¤¥ó¥¹¥È¡¼¥ë¥Õ¥¡¥¤¥ë¤ò»Ø¤·¤Æ¤ª¤ê¡¢CVE-2024-21412¤Î±Æ¶Á¤«¤é·Ù¹ð¤òɽ¼¨¤¹¤ë¤³¤È¤Ê¤¯¼Â¹Ô¤µ¤ì¤ë²ÄǽÀ­¤¬¤¢¤ë¡£¤Ê¤ª¡¢¤³¤Î2ÅÙÌܤΥ·¥ç¡¼¥È¥«¥Ã¥È¥Õ¥¡¥¤¥ë¤Ë¤Ï¡ÖCVE-2023-36025¡×¤ÎÀȼåÀ­¤¬»ÈÍѤµ¤ì¤Æ¤ª¤ê¡¢¥»¥­¥å¥ê¥Æ¥£µ¡Ç½¤Î¥Ð¥¤¥Ñ¥¹¤ò³Î¼Â¤Ë¤¹¤ë°Õ¿Þ¤¬¤¢¤ë¤â¤Î¤È¤ß¤é¤ì¤ë¡£

¡û¥Þ¥ë¥¦¥§¥¢¡ÖDarkGate¡×¤Î¼ÂÂÎ

¥¢¥×¥ê¥±¡¼¥·¥ç¥ó¤Î¥¤¥ó¥¹¥È¡¼¥ë¤¬³«»Ï¤µ¤ì¤ë¤È¡¢¥À¥¤¥Ê¥ß¥Ã¥¯¥ê¥ó¥¯¥é¥¤¥Ö¥é¥ê¡¼(DLL: Dynamic Link Library)¤Î¥µ¥¤¥É¥í¡¼¥Ç¥£¥ó¥°µ»½Ñ¤ò»ÈÍѤ·¤Æ°­°Õ¤Î¤¢¤ëDLL¥Õ¥¡¥¤¥ë¤¬¥í¡¼¥É¤µ¤ì¤ë¡£¤½¤Î¸å¡¢¤µ¤é¤ËÊ£¿ô¤Î¥Þ¥ë¥¦¥§¥¢¥í¡¼¥À¡¼¤ò·Ðͳ¤·¤ÆºÇ½ªÅª¤ËDarkGate¤¬¼Â¹Ô¤µ¤ì¤ë¡£

DarkGate¤ÏBorland Delphi¤Çµ­½Ò¤µ¤ì¤¿±ó³ÖÁàºî·¿¥È¥í¥¤¤ÎÌÚÇÏ(RAT: Remote Administration Trojan)¤È¤µ¤ì¡¢¥×¥í¥»¥¹¥¤¥ó¥¸¥§¥¯¥·¥ç¥ó¡¢¥Õ¥¡¥¤¥ë¤Î¥À¥¦¥ó¥í¡¼¥É¤È¼Â¹Ô¡¢¾ðÊóÀà¼è¡¢¥·¥§¥ë¥³¥Þ¥ó¥É¤Î¼Â¹Ô¡¢¥­¡¼¥í¥¬¡¼¤Ê¤É¤µ¤Þ¤¶¤Þ¤Êµ¡Ç½¤ò»ý¤Ä¡£

¡ûÂкö

ÀȼåÀ­¡ÖCVE-2024-21412¡×¤ª¤è¤Ó¡ÖCVE-2023-36025¡×¤Ï¥»¥­¥å¥ê¥Æ¥£¹¹¿·¥×¥í¥°¥é¥à¤¬¸ø³«¤µ¤ì¤Æ¤ª¤ê¡¢¤³¤ì¤é¤òŬÍѤ¹¤ë¤³¤È¤Ç¹¶·â¤ò·Ú¸º¤¹¤ë¤³¤È¤¬¤Ç¤­¤ë¡£¤Þ¤¿¡¢Trend Micro¤ÏÄ´ºº¤Î²áÄø¤ÇȽÌÀ¤·¤¿¥»¥­¥å¥ê¥Æ¥£¿¯³²¥¤¥ó¥¸¥±¡¼¥¿¡¼(IoC: Indicator of Compromise)¤ò¡Ötrendmicro.com/content/dam/trendmicro/global/en/research/24/c/cve-2024-21412--darkgate-operators-exploit-microsoft-windows-smartscreen-bypass-in-zero-day-campaign/DarkGate-IoCs.txt¡×¤Ë¤Æ¸ø³«¤·¤Æ¤ª¤ê¡¢É¬Íפ˱þ¤¸¤Æ³èÍѤ¹¤ë¤³¤È¤¬Ë¾¤Þ¤ì¤Æ¤¤¤ë¡£