
ã«ã¹ãã«ã¹ããŒã»ãã¥ãªãã£ã¢ããªã¹ããµãããã®ç¬¬4å幎次äŒè°ã2æ16æ¥ãš17æ¥ã«ã«ã³ã¯ã³ã§éå¬ãããŸããïŒããã¯ã¡ãã·ã³ã«ãããŸãïŒã ããã¯ã«ã¹ãã«ã¹ããŒã«ãšã£ãŠéåžžã«éèŠãªã€ãã³ãã§ããããã§ã¯ãç ç©¶ãå
±æããæ
å ±ã»ãã¥ãªãã£æ¥çã®ä»ã®äŒæ¥ã®ååãæåŸ
ããŠããŸãã Habréã§ã®2ã€ã®ãã¬ãŒã³ããŒã·ã§ã³ã¯ãã§ã«è°è«ãããŠããŸããTheEquation APTãšCarbanakã®ç ç©¶ã¯å€ãã®æ³šç®ãéããŸããïŒããããšãã
ç§ã¯
åãã§ã³ã¡ã³ã
ãèªãã§ãããã§è³ªåã«çããæºåãã§ããŠããŸãïŒã ãã®æçš¿ã§ã¯ãCarbanakãThe Equationã«ããç ç©¶ã®ãã¬ãŒã³ããŒã·ã§ã³ãããã³ãã¶ãŒããã¡ã«ã³ã³ãšåŒã°ããããããŸã§ç¥ãããŠããªãã£ãå¥ã®ã°ã«ãŒãã®æŽ»åã«é¢ããç°¡åãªã¬ããŒãã 3ã€ãã¹ãŠ-Securelist Webãµã€ãã®ç ç©¶è
ã®è©³çްãªã¬ããŒããžã®ãªã³ã¯ã ãŸããããã€ãã®åçã éèŠïŒã»ãŒãã¹ãŠã®ããã©ãŒãã³ã¹ã¯ããããªã®åŸåã§å©çšå¯èœã«ãªããŸããå¥ã®æçš¿ã§æçš¿ããŸãã
ã«ã«ãããã¯ã 匷çãSecurelistïŒrusïŒã®
èšäº ã æè¡çãªè©³çްãå«ã
å®å
šãªã¬ããŒã ïŒengïŒã
䟵害ã®ã€ã³ãžã±ãŒã¿ ïŒåœ¢åŒ
ãIOC ïŒã
ãã®æçš¿ã®è°è«ã§ã¯ãATMã®ãããã³ã°ã«æã泚æãæãããŸããã 確ãã«ãããã¯ããããCarbanakã®ç©èªã®æãå
±é³Žçãªéšåã§ããã³ãã³ããäžãããšãATMã¯ã«ãŒããPINã³ãŒããªãã§ãéãçºè¡ãå§ããŸãã

ããã«ã€ããŠãCarbanakã®äœæè
ã¯ç©ŽãéããŸãããATMãå€éšã®å¹²æžãªãã«ãã®ããã«åäœããªãããšã¯æããã§ãã ããã«èª¿æ»ãããšãããATMã§ã®ãããã³ã°ã¯ãéãåŒãåºãæ¹æ³ã®1ã€ã«ãããŸããã§ããã æ»æè
ã¯èªåã®å£åº§ã«è³éãæ¯ã蟌ã¿ãæ®é«ãæäœããŠãå€ãã®ã»ãã¥ãªãã£ã·ã¹ãã ãããã«æ°ä»ããªãããã«ããããšãã§ããŸãã åœå
ã®éè¡ã·ã¹ãã ãå®å
šã«å¶åŸ¡ããããšãã§ããªããã°ããã®ãããªæäœãéå§ããããšã¯äžå¯èœã§ããã ãã®ããã䟵å
¥åŸããããªé²ç»ãªã©ãéè¡ã®ã€ã³ãã©ã¹ãã©ã¯ãã£ã®é
眮ã«é¢ããæ
å ±ãåéããããã«ãããŸããŸãªæ¹æ³ã䜿çšãããŸããã

ãããŠãæ»æã¯éåžžã«åçŽã«ããŸãã¯ãããç¿æ
£çã«å§ãŸããŸããïŒ
ç¹ã«Microsoft OfficeïŒCVE-2012-0158; CVE-2013-3906ïŒããã³Microsoft WordïŒCVE-2014-1761ïŒã®è匱æ§ãæªçšããææããæ·»ä»ãã¡ã€ã«ä»ãã®æçŽã10åãã«ã¯ã©ãããæ¥ãã®ã§ããïŒCarbanakã®èª¿æ»ã¯ãããŸããŸãªåœã®æ³å·è¡æ©é¢ãšç·å¯ã«ååããŠå®æœãããŸããã National Hi-Tech Crime Unitã®Peter Zinnã¯ãSASã«ã³ãã¡ã¬ã³ã¹ã§äœæ¥ã®ãã®éšåã«ã€ããŠè©±ããŸããã

æ³å·è¡æ©é¢ããã®æ
å ±ã«ãããCarbanakã®è¢«å®³è
ã®åèšæ°-çŽ100ã®éèæ©é¢ãæšå®ããããšãã§ããŸããã åç ç²è
ã®æ»å·è
ã¯250äžãã1000äžãã«ã®ç¯å²ã§ãã£ãããšãèãããšãCarbanakããã®æå€§ã®æå®³ã¯ããã10åãã«ã«ãªããŸãã
ããã£ã·ã£ãææã®äºå®ããã§ã«ç¢ºèªãããŠãããææããã³ã³ãã¥ãŒã¿ãŒãç¹å®ããå¿
èŠããã調æ»äžã«è峿·±ã話ãèµ·ãããŸããã ããã¯ãå¯èœãªéãè¿
éã«è¡ãå¿
èŠããããŸããããŸããè
åšããããã¯ããæ¬¡ã«èª¿æ»çšã®ãµã³ãã«ãåéããŸãã ãã®ããã«ç°¡åãªã¹ã¯ãªãããäœæãããŸããã
æ¹çšåŒãŸãã¯ãã¹ã¿ãã¯ãç§ã¯ããªãã®ç¶èŠªã§ãããŸãã¯åž°å±ã®é£ãããSecurelistã®
èšäº ã
QïŒA ïŒè±èªïŒã
Fannyã¢ãžã¥ãŒã«ïŒengïŒã®ç ç©¶ã
ä»å¹Žã®ãã¹ãŠã®SASã²ã¹ãã«ã¯ãèè
ã«ãããµã€ã³å
¥ãã®Kim Zetter Stuxnetã®
æ¬ãèŽãããŸã
ã ã çè§£ããŠãããããã«ïŒããã¯500ããŒãžã®ã¿ã«ã ãŒãã§ãããZetterã«ãããšãåºçç€Ÿã¯æè¡çãªè©³çްãå¯èœãªéãæžããããã«èŠæ±ããŸããã The Equationã«ã€ããŠã®æ¬ãæžããããšãããã°ããã®å€§ãããåãã§ãã éèŠãªãã€ã³ãïŒçŸåšããã®æäœã®ç ç©¶ã¯åææ®µéã«ãããŸãã äžè¬çãªè©³çްã®ã¿ãå
¬éããã¢ãžã¥ãŒã«ã®1ã€ãè©³çŽ°ã«æ€èšããŸããã ãããªãç ç©¶ã«ã¯ãç 究宀ãšä»ã®äŒæ¥ã®äž¡æ¹ã§æéãšåŽåãå¿
èŠã«ãªããŸãã ãªãã§ïŒ Equation APTã®èåŸã«ãã人ã
ã¯ã10幎以äžããããã20幎以äžïŒCïŒCãµãŒããŒã®æåã®ãã¡ã€ã³ã®ç»é²æ¥ã§æ°ããå ŽåïŒä»äºãããŠããŸãã
SASã®æ¹çšåŒã«ã€ããŠèªã£ãKaspersky Labã®ç ç©¶è
ïŒIgor SumenkovãSergey MineevãVitaliy KamlyukãKostin RaiuãGrzegorz Brz BrczyszczykiewiczThe Equationã®500人以äžã®ç ç²è
ã確å®ã«ç¹å®ããããšãã§ããŸããã èªå·±ç Žå£ã¡ã«ããºã ãæäœã®æªæã®ããã¢ãžã¥ãŒã«ã«çµã¿èŸŒãŸããŠãããšããäºå®ãèæ
®ãããšã被害è
ã®ç·æ°ã¯æ°äžã«éããå¯èœæ§ããããŸãã ãã®äžã«ã¯ãæ¿åºæ©é¢ãéä¿¡äŒç€Ÿãèªç©ºæ©ç£æ¥ã®ä»£è¡šè
ãç³æ²¹ããã³ã¬ã¹éšéãªã©ããããŸãã ãããŠãç§ãã¡ã®èª¿æ»ã¯ã
Grzhegorzh Brzhezhishchichevichãšããååã®ç·ããCD-ROMãã©ã€ãã«ãã©ããã£ã¹ã¯ãæ¿å
¥ããåŸãæªæã®ããæ»æã®ç ç²è
ã§ãããšçãå§ãããšãã«å§ãŸããŸããã ãã®ãã£ã¹ã¯ã¯ã圌ã以ååå ãããã¥ãŒã¹ãã³ã§ã®ç§åŠäŒè°ãã圌ã«éãããŸããã
ãã¡ãããæ©å¯ä¿æã®ããã«ãã®äººç©ã®ååã倿ŽããŸããã ãã®ãããªã®ãããã§ããã®ãããªãšã€ãªã¢ã¹ãéžæãããå¯èœæ§ããããŸãã
æ¹çšåŒã«ã€ããŠä»äœãç¥ã£ãŠããŸããïŒ ãã¡ã€ã³ç»é²ãšã¢ãžã¥ãŒã«ã®ã³ã³ãã€ã«ã®æ¥ä»ãã倿ãããšããã£ã³ããŒã³ã¯äœå幎ãã®é掻çºã§ããã ç¹ã«ãæãå€ãã¢ãžã¥ãŒã«ã¯Windows 95/98ããµããŒãããŠããŸãã æ
å ±ãæ»æããã³åéããããã«ãããŸããŸãªã¢ãžã¥ãŒã«ãšããŸããŸãªæææ¹æ³ã䜿çšãããŸããïŒããšãã°ããã©ãŒã©ã ã®ææãéããŠïŒã FannyãšããŠç¥ãããã¢ãžã¥ãŒã«ã®1ã€ã¯ãã¢ãžã¢ããã³äžæ±ã®ç ç²è
ã«é¢ããæ
å ±ãåéããããã«äœ¿çšããã2008幎ã«äœæããã2ã€ã®ãŒããã€è匱æ§ãæªçšããŸããã åãè匱æ§ãåŸã§Stuxnetã§äœ¿çšãããŸããã ããã§ã®ããŒã¯ãŒãã¯ãåŸã§ãã§ãããã®äºå®ã¯ãä»ã®ããã€ãã®äºäŸãšåæ§ã«ãStuxnetãšThe Equationã®é¢ä¿ã瀺åããŠããŸãã

ãããŠããã®ãã©ã°ã€ã³ã¯ããããæãè峿·±ããã®ã§ãã ãã¡ã€ã«åïŒnls_933w.dllïŒã®ã¿ã§ç¥ãããŠããããããŸãã«ãã䜿çšãããŠããªãããã§ãäŸå€çãªã±ãŒã¹ã§ã¯ãããŒããã©ã€ãïŒãŸãã¯SSDïŒã®ãã¡ãŒã ãŠã§ã¢ã倿Žã§ããŸãã ãªãã§ïŒ ãŸããæ
å ±ããã©ã€ãããå®å
šã«åé€ãããå Žåã§ãã被害è
ã®ã³ã³ãã¥ãŒã¿ãŒã®å¶åŸ¡ãåãæ»ãããã«ã 第äºã«ãä¿¡é Œæ§ãé«ãæãæ©å¯æ§ã®é«ãããŒã¿ã¹ãã¬ãŒãžçšã§ãã ãã®æé ã®å¯Ÿè±¡ãšãªãå¯èœæ§ããã12ã®ãã©ã€ãã¢ãã«ã®èå¥åã¯ããã©ã°ã€ã³ã³ãŒãã§èŠã€ãããŸããã ãã¡ãŒã ãŠã§ã¢åæã®è€éããšããã®å Žåã®ã³ãŒãã®ãšã©ãŒãããŒããã©ã€ãã®å®å
šãªåäœäžèœã«ã€ãªãããšããäºå®ãèãããšããã®ã¢ãžã¥ãŒã«ã¯ããããäœæããã°ã«ãŒãã®å¯èœæ§ãã©ãã»ã©åºããã瀺ããŸãã
åž°å±ããã¯éåžžã«éèŠãªãã€ã³ãã§ããKasperskyLabã¯ãEquation APTã®èåŸã«ãã
人ç©ã«ã€ããŠã¯ãŸã
äœãèšããŸããã ãã®ãã£ã³ããŒã³ãžã®é¢äžãåççã«éé£ããããå°ãªããšãæè¡ãè¡ãããå°åãåœãç¹å®ãããããã®ã«ååãªäºå®ããããŸããã çŸæç¹ã§ä»ã®ãã¹ãŠã¯ææ©ãšææ©ã§ãããç§ãã¡ã¯ãããè¡ããŸããã ã³ãŒãïŒæ¹çšåŒã³ãŒãã§ã¯ãªããäžè¬çã«ïŒã§èŠã€ãã£ããã«ãŠã§ã¢ã®äœæè
ã®èµ·æºã«é¢ããæç€ºçãªãã³ãã§ãããç ç©¶è
ïŒãŸãã¯èª¿æ»è
ïŒãééã£ãæ¹åã«å°ãããã«æã
å°å
¥ããããããåž°å±ã¯äžè¬ã«éåžžã«é£ããã¿ã¹ã¯ã§ãã
2æ¥éã®Security Analyst Summitã§ãã¢ããªãã¥ãŒã·ã§ã³ã®è€éãã«ã€ããŠäœåºŠãè°è«ãããŠããŸãã ãžã¥ãããŒãããã¯ãŒã¯ã¹ã®ã¯ãªã¹ããã¡ãŒã»ããã«ãããã¬ãŒã³ããŒã·ã§ã³ã§ã®ææ©çã¢ãããŒãã®éžè©±çãªäŸïŒ
ã§ãããåž°å±ãã³ãŽã
ç æŒ ã®ãã¡ã«ã³ã³ïŒäžæ±ã§ã®æ°ããAPTãã£ã³ããŒã³Securelistã®
èšäº ã
詳现ãªèª¿æ» ïŒengãpdfïŒã

Dmitry Bestuzhevã®Desert Falconsãã£ã³ããŒã³ã«é¢ãã話ã§ãæ»æè
ãããã«ææ
®æ·±ããœãŒã·ã£ã«ãšã³ãžãã¢ãªã³ã°ææ³ã䜿çšããŠãããã«æãé©ããŸããã åœç¶ã圌ãã¯é»åã¡ãŒã«çµç±ã§æ»æããŸãã

ããããããã ãã§ã¯ãããŸããã Facebookã䜿çšããŸãã å人ã«ãªãããã©ã€ããŒãã§ãã£ãããã
æ°ãæã®æºåãããææãããã¡ã€ã«ãžã®ãªã³ã¯ãæçµçã«éä¿¡ããããã«ä¿¡é Œé¢ä¿ã«å
¥ããŸãã ãŸãã¯ãã£ãšç°¡åïŒåœŒãã¯åœ±é¿åã®ãã人ã
ãä»ã®ãŠãŒã¶ãŒããèªåã®å£ã«æçš¿ãéããªããšããäºå®ãå©çšããŸãã æœåšçãªè¢«å®³è
ã«ãšã£ãŠéèŠãªéèŠãªã€ãã³ãã«å³åº§ã«å¯Ÿå¿ããé»åã¡ãŒã«ã§ã¡ãã»ãŒãžãã¡ãŒã«ã調æŽããŸãã
ãã¶ãŒããã¡ã«ã³ã³ãºãã£ã³ããŒã³ã®èåŸã«ãã人ã
ã¯ãç ç²è
ãéåžžã«ããç¥ã£ãŠããŸãã æãå¯èœæ§ãé«ãã®ã¯ã圌ãèªèº«ãäžæ±ã®åœã®1ã€ã«äœãã§ããããã§ãã ããããŸãã«ãã®èª¿æ»ã§éèŠãªããšã§ããæ°ãããã¬ãŒã€ãŒããå°å
ã®é¢šæ¯ãããç¥ã£ãŠããïŒçåã䜿çšããã®ã§ã¯ãªãïŒæ
å ±ãæ»æããã³åéããããã®ç¬èªã®ããŒã«ãéçºããŠããŸãã æ¹çšåŒãšã¯ç°ãªããæäœã¯é·ããçŸåšã¯éã¢ã¯ãã£ãã§ããããç æŒ ã®ãã€ããµãã¯æ¯èŒçæè¿ïŒ2011幎以éïŒäœæ¥ãéå§ããçŸåšã§ã¯æé©ãªåœ¢ã«ãªã£ãŠããŸãã çµæïŒããŒã¿ãçãããã«ã³ã³ãã¥ãŒã¿ãŒãAndroidããŒã¹ã®ã¢ãã€ã«ããã€ã¹ã«ãã«ãŠã§ã¢ãææããããŒã¿ã«ãããšã
3,000人以äžã®ç ç²è
ããã®
100äžãè¶
ãããã¡ã€ã«ãšããã¥ã¡ã³ããæ»æè
ã®æã«æž¡ããŸããã
ããã«ããã°ã§ã Security Analyst Summitã§ã®ãã¬ãŒã³ããŒã·ã§ã³ã®çµæã«åºã¥ããŠãç¯çœªç®çã§ãç¹ã«æå·ããã«ãŒã§åæ³çãªãœãããŠã§ã¢ã䜿çšããæ©èœãªã©ãããã€ãã®ãããã¯ãæºåããŠããŸãã ã«ã¹ãã«ã¹ããŒãã€ãªãŒã®ãã®å£®å€§ãª
ã©ã€ãããã°ã§ãSASã§ã®ã»ãŒãã¹ãŠã®ããã©ãŒãã³ã¹ã®åŒçšããœãŒã·ã£ã«ãããã¯ãŒã¯ã§ã®èŠèŽè
ã®æãè峿·±ãçºèšãç¥ãããšãã§ããŸãã