Sygnia Consulting¤Ï6·î17Æü(¥¤¥¹¥é¥¨¥ë»þ´Ö)¡¢¡ÖIn-Depth Analysis: Velvet Ant's Prolonged Cyber Attack on a Large Organization¡×¤Ë¤ª¤¤¤Æ¡¢¡ÖVelvet Ant¡×¤È̾ÉÕ¤±¤é¤ì¤¿Ãæ¹ñ¤Î¹ñ²È»Ù±ç¤ò¼õ¤±¤Æ¤¤¤ë¤È¤ß¤é¤ì¤ë¶¼°Ò¥¢¥¯¥¿¡¼¤¬¡¢¾¯¤Ê¤¯¤È¤â2021ǯ¸åȾ¤«¤éF5 BIG-IP¥¢¥×¥é¥¤¥¢¥ó¥¹¤ò­¤¬¤«¤ê¤ËÂ絬ÌϤʥ¹¥Ñ¥¤³èÆ°¤ò¼Â»Ü¤·¤Æ¤¤¤¿¤ÈÊ󤸤¿¡£É¸Åª¤È¤Ê¤Ã¤¿ÁÈ¿¥Ì¾¤Ï¸ø³«¤·¤Æ¤¤¤Ê¤¤¤¬¡¢Âç´ë¶È¤¬Èï³²¤ËÁø¤Ã¤¿¤È»ØŦ¤·¤Æ¤¤¤ë¡£

In-Depth Analysis: Velvet Ant's Prolonged Cyber Attack on a Large Organization

¡ûF5 BIG-IP¥¢¥×¥é¥¤¥¢¥ó¥¹¤Î°­ÍÑ

F5¤Î¡ÖBIG-IP¡×À½ÉÊ·²¤Î°ì¤Ä¤Ë¡¢¥Í¥Ã¥È¥ï¡¼¥¯¥»¥°¥á¥ó¥È´Ö¤ËÇÛÃÖ¤µ¤ì¤ëBIG-IP¥¢¥×¥é¥¤¥¢¥ó¥¹¤¬¤¢¤ë¡£º£²óSygnia¤¬¿¯³²Ä´ºº¤ò¼Â»Ü¤·¤¿ÁÈ¿¥¤Ë¤ª¤¤¤Æ¤â¥Õ¥¡¥¤¥¢¥¦¥©¡¼¥ë¡¢Web¥¢¥×¥ê¥±¡¼¥·¥ç¥ó¥Õ¥¡¥¤¥¢¥¦¥©¡¼¥ë(WAF: Web Application Firewall)¡¢¥í¡¼¥É¥Ð¥é¥ó¥µ¡¼¡¢¥í¡¼¥«¥ë¥È¥é¥Õ¥£¥Ã¥¯´ÉÍý¤Ê¤É¤Îµ¡Ç½¤òÄ󶡤¹¤ë2Âæ¤ÎBIG-IP¥¢¥×¥é¥¤¥¢¥ó¥¹¤¬²ÔƯ¤·¤Æ¤¤¤¿¤È¤¤¤¦¡£

¤³¤ì¤é¥¢¥×¥é¥¤¥¢¥ó¥¹¤Ï¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤ËľÀÜÀܳ¤µ¤ì¤Æ¤ª¤ê¡¢Î¾Êý¤È¤â¿¯³²¤µ¤ì¤Æ¤¤¤¿¤³¤È¤¬³Îǧ¤µ¤ì¤Æ¤¤¤ë¡£¤³¤ì¤é¤Ï¸Å¤¯¤ÆÀȼå¤Ê¥ª¥Ú¥ì¡¼¥Æ¥£¥ó¥°¥·¥¹¥Æ¥à¤ò¼Â¹Ô¤·¤Æ¤¤¤¿¤¬¡¢¿¯³²·ÐÏ©¤ÏÆÃÄê¤Ç¤­¤Æ¤¤¤Ê¤¤¡£

Sygnia¤Ï¥Õ¥©¥ì¥ó¥¸¥Ã¥¯Ä´ºº¤ò¼Â»Ü¤·¡¢¤³¤ì¤é¥¢¥×¥é¥¤¥¢¥ó¥¹¤«¤éssh¤Ë¤è¤ë¥ê¥Ð¡¼¥¹¥È¥ó¥Í¥ë¤¬¹½ÃÛ¤µ¤ì¤Æ¤¤¤¿¤³¤È¤ò³Îǧ¤·¤Æ¤¤¤ë¡£¤Þ¤¿¡¢¶¼°Ò¥¢¥¯¥¿¡¼¤¬¤³¤Î¥È¥ó¥Í¥ë¤ò»ÈÍѤ·¡¢¥í¡¼¥«¥ë¥Í¥Ã¥È¥ï¡¼¥¯Æâ¤Î¥Õ¥¡¥¤¥ë¥µ¡¼¥Ð¾å¤ÇÆ°ºî¤·¤Æ¤¤¤¿±ó³ÖÁàºî·¿¥È¥í¥¤¤ÎÌÚÇÏ(RAT: Remote Administration Trojan)¤Î¡ÖPlugX¡×¤ÈÄÌ¿®¤·¤Æ¤¤¤¿¤³¤È¤â³Îǧ¤·¤Æ¤¤¤ë¡£

¥Õ¥¡¥¤¥ë¥µ¡¼¥Ð¡¼¾å¤ÎPlugX¤Ï¥í¡¼¥«¥ë¤Î¥³¥Þ¥ó¥É¡õ¥³¥ó¥È¥í¡¼¥ë(C2: Command and Control)¥µ¡¼¥Ð¤È¤·¤Æ¤âµ¡Ç½¤·¡¢¥Í¥Ã¥È¥ï¡¼¥¯¾å¤Î¤µ¤Þ¤¶¤Þ¤Ê¥Ç¥Ð¥¤¥¹¤Ø¤Î¹¶·â¤Ë»ÈÍѤµ¤ì¤¿¡£Sygnia¤Ï¤³¤ÎÄÌ¿®¤¬°Å¹æ²½¤µ¤ì¤Æ¤¤¤Ê¤¤¤³¤È¤òȯ¸«¤·¤Æ¤ª¤ê¡¢¶¼°Ò¥¢¥¯¥¿¡¼¤ÎÀï½Ñ¡¢µ»½Ñ¡¢¼ê½ç(TTPs: Tactics, Techniques, and Procedures)¤Î¾ÜºÙ¤òÌÀ¤é¤«¤Ë¤·¤Æ¤¤¤ë¡£

ÆâÉô¤Î¥³¥Þ¥ó¥É¡õ¥³¥ó¥È¥í¡¼¥ë(C2)¥µ¡¼¥Ð¤ò²ð¤·¤Æ¹¶·â¤ò³ÈÂ礹¤ë³µÇ°¿Þ¡¡°úÍÑ¡§Sygnia

¡ûÂкö

Sygnia¤ÏVelvet Ant¤Ë¤è¤ëƱÍͤι¶·â¤«¤éÁÈ¿¥¤Î¥Í¥Ã¥È¥ï¡¼¥¯¤òÊݸ¤ë¤¿¤á¡¢¼¡¤Î¤è¤¦¤ÊËɸæÀï½Ñ¤Î¹½ÃÛ¤ò¿ä¾©¤·¤Æ¤¤¤ë¡£

ÆâÉô¤Ë¹½ÃÛ¤µ¤ì¤¿C2¥µ¡¼¥Ð¤È¤ÎÀܳ¤ò˸³²¤¹¤ë¤¿¤á¡¢ÁÈ¿¥Æ⤹¤Ù¤Æ¤Î¥µ¡¼¥Ð¡¢¥ï¡¼¥¯¥¹¥Æ¡¼¥·¥ç¥ó¡¢¥¨¥Ã¥¸¥Ç¥Ð¥¤¥¹¤ÎÄÌ¿®¤ËÀ©¸Â¤ò¤«¤±¤ë¡£¤Þ¤¿¡¢¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤Ø¤ÎÀܳ¤¬É¬Í׺Ǿ®¸Â¤È¤Ê¤ë¤è¤¦¤Ë¥Õ¥¡¥¤¥¢¥¦¥©¡¼¥ë¤ò¹½À®¤·¡¢¥í¡¼¥É¥Ð¥é¥ó¥µ¡¼¤Ê¤É¤â¤³¤ÎÇظå¤ËÀßÃÖ¤¹¤ë

°ìÈÌŪ¤Ê´ÉÍý¥Ý¡¼¥È¤Î¥È¥é¥Õ¥£¥Ã¥¯¤ò¸·Ì©¤ËÀ©¸æ¤¹¤ë¡£¶ñÂÎŪ¤Ë¤ÏSMB(port 445)¡¢RPC(port 135)¡¢WinRM(port 5985¡¢5986)¡¢RDP(port 3389)¡¢SSH(port 22)¤Î¥¢¥¯¥»¥¹¤ò¸·Ì©¤ËÀ©¸Â¤¹¤ë¡£¤³¤Îºî¶È¤Ïº¤Æñ¤òȼ¤¦²ÄǽÀ­¤¬¤¢¤ë¤¬¡¢¤½¤ì¤Ë¸«¹ç¤¦¤À¤±¤Î¥»¥­¥å¥ê¥Æ¾å¤Î¥á¥ê¥Ã¥È¤¬¤¢¤ë

¥ì¥¬¥·¡¼¥Ç¥Ð¥¤¥¹¤Ï®¤ä¤«¤ËÇѻߤ·¤Æ¸ò´¹¤¹¤ë¡£¥ì¥¬¥·¡¼¥Ç¥Ð¥¤¥¹¤Ï¥µ¥¤¥Ð¡¼¹¶·â¤ÎɸŪ¤Ë¤Ê¤ê¤ä¤¹¤¤¡£¤É¤¦¤·¤Æ¤â¥ì¥¬¥·¡¼¥Ç¥Ð¥¤¥¹¤ò°Ý»ý¤¹¤ëɬÍפ¬¤¢¤ë¾ì¹ç¤Ï¡¢¥Ç¥Ð¥¤¥¹¤Î¥Í¥Ã¥È¥ï¡¼¥¯¤ò¥»¥°¥á¥ó¥È²½¤·¡¢¸Å¤¤¥·¥¹¥Æ¥à¤ò¥µ¥Ý¡¼¥È¤¹¤ëºÇ¿·¤Î¥»¥­¥å¥ê¥Æ¥£¥½¥ê¥å¡¼¥·¥ç¥ó¤òƳÆþ¤¹¤ë¡£¤Þ¤¿¡¢¥·¥¹¥Æ¥à¤Ë¥¢¥¯¥»¥¹¤Ç¤­¤ë¿Í°÷¤òÀ©¸Â¤·¡¢¥È¥é¥Õ¥£¥Ã¥¯¤ò¾ï¤Ë´Æ»ë¤¹¤ë

¥¨¥ó¥É¥Ý¥¤¥ó¥È¸¡½Ð±þÅú(EDR: Endpoint Detection and Response)¤òƳÆþ¤¹¤ë¡£¤Þ¤¿¡¢Ç§¾Ú¾ðÊó¤òÊݸ¤ë¤¿¤áWindows¤ÎLSASS(Local Security Authority Subsystem Service)¤ËPPL(Protected Process Light)¤òŬÍѤ·¡¢Windows Credential Guard¤òÍ­¸ú¤Ë¤¹¤ë(»²¹Í¡§¡ÖÄɲäΠLSA Êݸî¤ò¹½À®¤¹¤ë | Microsoft Learn¡×)

F5 BIG-IP¥¢¥×¥é¥¤¥¢¥ó¥¹¤Î¤è¤¦¤Ê¥Í¥Ã¥È¥ï¡¼¥¯¥¨¥Ã¥¸¥Ç¥Ð¥¤¥¹¤Î¥»¥­¥å¥ê¥Æ¥£¶¯²½¤Ë¤Ï¡¢¥×¥í¥¢¥¯¥Æ¥£¥Ö¤Ê¥»¥­¥å¥ê¥Æ¥£Àïά¤Î¹½ÃÛ¤¬É¬Íס£Sygnia¤Ï¤½¤Î¤è¤¦¤ÊËɸæÀïά¤ò³ÎΩ¤¹¤ë¤¿¤á¤ÎÊñ³çŪ¤Ê¥¬¥¤¥À¥ó¥¹¤È¤·¤Æ¡ÖDefending Your Network Edge Against the Next Zero-Day Exploit¡×¤ò¸ø³«¤·¤Æ¤ª¤ê¡¢¥Í¥Ã¥È¥ï¡¼¥¯¥¨¥Ã¥¸¥Ç¥Ð¥¤¥¹¤Î¥»¥­¥å¥ê¥Æ¥£¶¯²½¤ËÌòΩ¤Æ¤ë¤³¤È¤¬Ë¾¤Þ¤ì¤Æ¤¤¤ë¡£