ÇË»¤·¤¿Word¥Õ¥¡¥¤¥ë°ÍѤ¹¤ë¥Õ¥£¥Ã¥·¥ó¥°¹¶·âȯ¸«¡¢Ãí°Õ¤ò
Bleeping Computer¤Ï12·î1Æü(Êƹñ»þ´Ö)¡¢¡ÖNovel phishing campaign uses corrupted Word documents to evade security¡×¤Ë¤ª¤¤¤Æ¡¢ÇË»¤·¤¿Wordʸ½ñ¤ò°ÍѤ¹¤ë¿·¤·¤¤¥Õ¥£¥Ã¥·¥ó¥°¹¶·â¤¬È¯¸«¤µ¤ì¤¿¤ÈÊ󤸤¿¡£
¤³¤Î¹¶·â¤Ï¥Þ¥ë¥¦¥§¥¢Ê¬ÀÏ¥µ¡¼¥Ó¥¹¤ò¼ê³Ý¤±¤ëANY.RUN¤Ë¤è¤êȯ¸«¤µ¤ì¡¢11·î25Æü¤Ë¿Ê¹ÔÃæ¤Î¥¼¥í¥Ç¥¤¹¶·â¤È¤·¤ÆX¤Ë³µÍפ¬Åê¹Æ¤µ¤ì¤¿¤³¤È¤ÇÌÀ¤é¤«¤Ë¤Ê¤Ã¤¿(»²¹Í¡§¡ÖANY.RUN¤Ë¤è¤ëX¤Ø¤ÎÅê¹Æ¡×)¡£

Novel phishing campaign uses corrupted Word documents to evade security
.
¤³¤Î¹¶·â¤Ï¥Þ¥ë¥¦¥§¥¢Ê¬ÀÏ¥µ¡¼¥Ó¥¹¤ò¼ê³Ý¤±¤ëANY.RUN¤Ë¤è¤êȯ¸«¤µ¤ì¡¢11·î25Æü¤Ë¿Ê¹ÔÃæ¤Î¥¼¥í¥Ç¥¤¹¶·â¤È¤·¤ÆX¤Ë³µÍפ¬Åê¹Æ¤µ¤ì¤¿¤³¤È¤ÇÌÀ¤é¤«¤Ë¤Ê¤Ã¤¿(»²¹Í¡§¡ÖANY.RUN¤Ë¤è¤ëX¤Ø¤ÎÅê¹Æ¡×)¡£

.