ãã«ãŒããã€ã³ãã®Cybersecurity Stop of the Monthã«ããããããã®æ°ããããã°ã·ãªãŒãºã§ã¯ãçŸåšã®ãµã€ããŒç¯çœªè ã®é²åãç¶ããæŠè¡ãæ¢ã£ãŠãããŸãããŸããç¹ã«ã¡ãŒã«è åšã®åéã«ãããåµå¯æŽ»åãšæåã®äŸµå®³ãšãã£ããæ»æãã§ãŒã³ã«ãããéèŠãªæåã®æ®µéã«ãçŠç¹ãåœãŠãŸãã
ãã®ã·ãªãŒãºã®ç®çã¯ãé²åŸ¡ã匷åããæ¹æ³ãçè§£ã§ãããããµããŒãããããšã§ããããã«ããã仿¥ã®ãã€ãããã¯ãªããžã¿ã«äžçã«ãããŠæ°ããè åšã«å¯Ÿãä¿è·ããããšãã§ããŸãã

æ»æãã§ãŒã³ã®æåã®2ã€ã®æ®µéïŒåµå¯ãšæåã®äŸµå®³
ååã®èšäºã§ã¯ãBECãšãµãã©ã€ãã§ãŒã³æ»æã«ã€ããŠèª¬æããŸãããä»åã®èšäºã§ã¯ãEvilProxyãšããŠç¥ãããé°æ¹¿ãªè åšã«ã€ããŠèŠãŠãããŸãã
ã·ããªãª
ãã«ãŒããã€ã³ããæè¿è¡ã£ãã¡ãŒã«è åšã¢ã»ã¹ã¡ã³ãã«ãããŠã1,500瀟ã®é¡§å®¢ãæ±ãããã¯ãããžãŒäŒæ¥ããEvilProxyã«äŸµå®³ãããŠããããšãçºèŠããŸãããæ¢åã®ã¡ãŒã«ã»ãã¥ãªã㣠ãœãªã¥ãŒã·ã§ã³ã§ã¯ããã®è åšãæ€ç¥ã§ããŠããŸããã§ããã
EvilProxyãšã¯äœã§ããããïŒEvilProxyã¯ãèªèšŒæ å ±ãšå€èŠçŽ èªèšŒïŒMFAïŒããŒã¯ã³ãçãèœåããã€ãã£ãã·ã³ã° ããŒã«ãããã§ããã¿ãŒã²ãããšæ£èŠã®WebããŒãžã®éã«å ¥ã蟌ãã§æ»æã仿ããŸãã
被害è ããã£ãã·ã³ã°ããŒãžã«æ¥ç¶ãããšãå®éã®ãã°ã€ã³ããŒã¿ã«ãšåãå€èгã§ãåãããã«åäœãããåœã®ãã°ã€ã³ããŒãžã衚瀺ãããŸããEvilProxyã¯ãŠãŒã¶ãŒã®èªèšŒæ å ±ãšèªèšŒã»ãã·ã§ã³ããŒã¯ã³ãçã¿ãŸããæ»æè ã¯ç¶ããŠMFAä¿è·ãåé¿ããªããããŠãŒã¶ãŒã®ä»£ããã«ãã°ã€ã³ããŸãã
è åšïŒæ»æã¯ã©ã®ããã«èµ·ãã£ãã®ãïŒ
ãã®æ»æãã©ã®ããã«å±éãããã詳ããèŠãŠãããŸãããã
1. åœã®ã¡ãã»ãŒãžïŒæ»æã¯ãææžã®çœ²åãæ±ããæ£èŠã®DocuSignã«ããéç¥ã®ããã«èŠããã¡ãŒã«ã§å§ãŸããŸããããã®äžèŠç¡å®³ãªã¡ãã»ãŒãžã¯ãå®ã¯å·§åŠãªãµã€ããŒæ»æãžã®å ¥å£ã§ããã

顧客ãåãåã£ãæåã®åœã¡ãŒã«
2. æªæã®ããURLïŒè¢«å®³è ãã¡ãŒã«ã«èšèŒãããURLãã¯ãªãã¯ãããšã被害è ã®Microsoftãã°ã€ã³ããŒãžã«èªå°ãããŸããããã®èåŸã«ã¯æ»æè ã®ãããã·ãèšå®ãããŠããŸããããã®ããŒãžã§æ»æè ã¯ããŠãŒã¶ãŒãéšãããŠèªãèªèšŒæ å ±ãå ¥åããŠããŸãããšãããã£ãŠããŸããã

æªæã®ããMicrosoftãµã€ã³ã€ã³ããŒãž
3. EvilProxyãã£ãã·ã³ã° ãã¬ãŒã ã¯ãŒã¯ïŒãã®æ»æã®åååã¯EvilProxyãã£ãã·ã³ã° ãã¬ãŒã ã¯ãŒã¯ã§ãããæ»æè ã¯ãªããŒã¹ãããã·ã®ææ³ã䜿çšããæ¬ç©ã®Microsoftãµã€ã³ã€ã³ããŒãžã§ã®ãŠãŒã¶ãŒã®ãã°ã€ã³è©Šè¡ãååããŸããããã®ããã«ããŠã²ããã«MFAã³ãŒããšãŠãŒã¶ãŒèªèšŒæ å ±ãæãåã£ãã®ã§ãã
4. MFAã«ããèªèšŒã®åŒ±äœåïŒMFAã³ãŒããšãã°ã€ã³èªèšŒæ å ±ãæã«å ¥ããæ»æè ã¯ããã®äŸµå®³ããã¢ã«ãŠã³ãã«èªç±ã«ã¢ã¯ã»ã¹ã§ããããã«ãªããŸãããMFAã«ãã確èªãåé¿ããããšã§å®å šã«ã³ã³ãããŒã«ããããšãã§ããŸããã€ãŸãããã®ãã¯ãããžãŒäŒæ¥ãš1,500瀟ã®ãšã³ããŠãŒã¶ãŒã«ãšã£ãŠé倧ãªè åšãšãªã£ãã®ã§ãã
æ€ç¥ïŒãã«ãŒããã€ã³ãã®ãœãªã¥ãŒã·ã§ã³ã§ã©ã®ããã«æ»æãæ€ç¥ã§ãããïŒ
æ»æè ã匷åãããã»ãã¥ãªãã£å¶åŸ¡ã«ã察å¿ã§ããããã«ãªã£ãŠããããšãããEvilProxyããMFAãåé¿ãããã®ä»ã®è åšã¯ãŸããŸã䜿çšãããããã«ãªã£ãŠããŸããIPã¢ãã¬ã¹ãŸãã¯URLã®ã¬ãã¥ããŒã·ã§ã³ãšãã£ãåŸæ¥ã®æ¹æ³ã§ã¯ãããããè åšãååã«é»æ¢ã§ããŸããã
ãã«ãŒããã€ã³ãã¯é«åºŠãªæ©æ¢°åŠç¿ã䜿çšããèªèšŒæ å ±ã®ãã£ãã·ã³ã°æ»æã§ãã°ãã°èŠãããè¡åãã¡ãã»ãŒãžã®ç¹æ§ãç¹å®ããããšãã§ããŸãããŸããã¡ãã»ãŒãžããµã³ãããã¯ã¹è§£æããŠè©³çްã«èª¿æ»ããããšã«ãããæªæã®ããURLãªãã€ã¬ã¯ããã¿ãŒã³ãEvilProxyãã¬ãŒã ã¯ãŒã¯ã«çŠç¹ãåœãŠãããšãã§ããŸãã

ãã«ãŒããã€ã³ãã§ã®æªæã®ããURLã®æ€ç¥ãšãªãã€ã¬ã¯ããã§ãŒã³

ãã«ãŒããã€ã³ãã§ã®EvilProxyãã£ãã·ã³ã° ãã¬ãŒã ã¯ãŒã¯ã®æ€ç¥
察åŠïŒæèšã¯ïŒ
EvilProxyãªã©ã®è åšããä¿è·ããããã«ã以äžãªã©ã®ããã¢ã¯ãã£ããªå¯Ÿçãå®è£ ããããšãéèŠã§ãã
- ãŠãŒã¶ãŒæè²ïŒåŸæ¥å¡ã¯ãµã€ããŒæ»æã«å¯ŸããæåŸã®ç ŠãšãªãããŸããåœã®ã¡ãŒã«ããã°ã€ã³ããŒãžãªã©ããããããã£ãã·ã³ã°æ»æã«é¢ããã»ãã¥ãªãã£æèåäžãã¬ãŒãã³ã°ãæäŸããŸããããããã«ãã被害ã«ããå¯èœæ§ã倧ããæžããããšãã§ããŸãã
- å ç¢ãªã¡ãŒã«ã»ãã¥ãªãã£ïŒé«åºŠãªã¡ãŒã«ã»ãã¥ãªã㣠ãœãªã¥ãŒã·ã§ã³ã¯ããŠãŒã¶ãŒã®åä¿¡ç®±ã«å±ãåã«ãã£ãã·ã³ã°æ»æãæ€ç¥ãã黿¢ããããšãã§ããŸãããã«ãŒããã€ã³ãã®è åšæ€ç¥ãã©ãããã©ãŒã ã®ãããªãæ©æ¢°åŠç¿ã䜿çšããŠããããè åšãæ€ç¥ãã黿¢ãããœãªã¥ãŒã·ã§ã³ãããããã§ãã
- ã¯ã©ãŠãã»ãã¥ãªãã£ïŒåªããã¯ã©ãŠãã»ãã¥ãªã㣠ãã©ãããã©ãŒã ã¯ãã¢ã«ãŠã³ãä¹ã£åãïŒATOïŒæ»æãç¹å®ããæ©å¯ã®ã¯ã©ãŠããªãœãŒã¹ãžã®èš±å¯ãããŠããªãã¢ã¯ã»ã¹ã鲿¢ããããšãã§ããŸããããã¯æåã®äŸµå®³ããã³äŸµå®³åŸã®æŽ»åã«ã察å¿ããŸãããŸããããã«ããã»ãã¥ãªãã£ããŒã ã¯ãæ»æè ã«ãã£ãŠæªçšãããŠãããµãŒãã¹ãã¢ããªã±ãŒã·ã§ã³ã«ã€ããŠè©³ãã確èªããããšãã§ããŸãã察åŠãèªååãããœãªã¥ãŒã·ã§ã³ãããããã§ããããã«ããæ»æè ã®æ»åšæéãæžããã被害ãæå°éã«æããããšãã§ããŸãã
- ãµãã©ã€ãã§ãŒã³ã®ä¿è·ïŒã¡ãŒã«ã«èµ·å ããæ»æãããµãã©ã€ãã§ãŒã³ãä¿è·ããŸããProofpoint Supplier Threat Protectionã¯é«åºŠãªAIãšææ°ã®è åšã€ã³ããªãžã§ã³ã¹ã䜿çšãã䟵害ããããµãã©ã€ã€ãŒã¢ã«ãŠã³ããæ€ç¥ãã調æ»ãå¿ èŠãªã¢ã«ãŠã³ããåªå ãããŸãã
- å€èŠçŽ èªèšŒïŒMFAïŒïŒMFAã®ãããªåŒ·åãªèªèšŒæè¡ã«ãããã»ãã¥ãªãã£äœå¶ãå€§å¹ ã«åäžãããããšãã§ããŸããããããå ã»ã©ç޹ä»ããã·ããªãªã®ããã«ãåŸæ¥ã®MFAãœãªã¥ãŒã·ã§ã³ã§ã¯ããŸã广ããªãããšã«ã泚æãã ããããã®ããããã®ãããªã€ã³ã·ãã³ããéããã«ä¿®åŸ©ã§ãããã¯ã©ãŠãã®ATOèªååããŒã«ã䜿çšããããšãéèŠã§ãã
- ç¶ç¶çãªè åšã¢ã»ã¹ã¡ã³ãïŒæ³šæãæ ãããæ°ããªè åšã®ç£èŠãç¶ããå¿ èŠããããŸãã宿çãªè åšã¢ã»ã¹ã¡ã³ãã«ãããäŒæ¥ã®è匱æ§ãç¹å®ããã€ã³ã·ãã³ãå¯Ÿå¿æ©èœã匷åããããšãã§ããŸãã
Proofpoint TAP Account Takeoverã«ããé²è·
Proofpoint TAP ATO (Account Takeover)ã«ããããã«ãŒããã€ã³ãã®Proofpoint TAP (Targeted Attack Protection)ãœãªã¥ãŒã·ã§ã³ã®é«åºŠãªè åšæ€ç¥æ©èœãæ¡å€§ããŠããŸãã人工ç¥èœãçžé¢è åšã€ã³ããªãžã§ã³ã¹ãæ¯ãèãåæã䜿çšããŠä»¥äžãæ€ç¥ããèªåçã«ä¿®åŸ©ããŸãã
- 䟵害ãããã¢ã«ãŠã³ã
- æªæã®ããã¡ãŒã«ããã¯ã¹ã®ã«ãŒã«å€æŽ
- ãµãŒãããŒã㣠ã¢ããªã®æ¿èª
- ãµã€ããŒç¯çœªè ã«ããæ©å¯ãã¡ã€ã«ã®é床ãªå ±æ
Proofpoint TAP ATOã¯ãããŸããŸãªä¿®åŸ©ãªãã·ã§ã³ã§æ»åšæéãæžããããšãã§ããŸããã€ãã³ããé¢é£ä»ããæ»æã·ãŒã±ã³ã¹å šäœãææ¡ããããšã«ãããè¿ éãªå¯Ÿå¿ãè¡ããŸããæ»æè ã¯ãŠãŒã¶ãŒã®ã¢ã«ãŠã³ãã«ã¢ã¯ã»ã¹ããããã«ããŸããŸãªæ¹æ³ãæ¢ãç¶ããããã驿ã®å¯Ÿå¿ãäžå¯æ¬ ã§ããäŸãããã€ãã玹ä»ããŸãã
- EvilProxyã®ãããªMFAããã€ãã¹ããè åš
- ãã¹ã¯ãŒã ã¹ã¿ããã£ã³ã°
- ããŒã¿äŸµå®³
- ç·åœããæ»æ
- æ°žç¶çãªã¢ã¯ã»ã¹ããŒã¯ã³
Proofpoint TAP ATOãªããããŒã ã¯æªæã®ããã¢ã¯ãã£ããã£ã調æ»ããéããã«è åšã«å¯ŸåŠããããšãã§ããŸããããã«ããäŒæ¥ãžã®ãªã¹ã¯ãæããããšãã§ããŸãã
ãã«ãŒããã€ã³ãã§æ»æãã§ãŒã³ãæã¡åã
EvilProxyã®è åšãããå ç¢ãªãµã€ããŒã»ãã¥ãªãã£å¯ŸçãåããããšãéèŠã§ããããšãããããŸãã仿¥ã®å·§åŠãªãµã€ããŒè åšã黿¢ã§ããã®ã¯ãåžžã«æ³šæãæããäŒæ¥ãšé¡§å®¢ãä¿è·ããã¹ãããã¢ã¯ãã£ããªé²åŸ¡ãå°å ¥ããäŒæ¥ã ãã§ãããã®ä»ã®éèŠãªã¹ããããšããŠãæå ç«¯ã®æè¡ãå°å ¥ãããã«ãŒããã€ã³ãã®ãããªä¿¡é Œã§ãããµã€ããŒã»ãã¥ãªã㣠ããŒãããŒãšé£æºããããšããããããŸãã
ãã®ããã°ã·ãªãŒãºã§ã¯ãç¶ç¶çã«ææ°è åšã®èª¬æãããã«ãŒããã€ã³ãã®æ€ç¥æ¹æ³ã®ç޹ä»ãªã©ãè¡ã£ãŠããŸãããã«ãŒããã€ã³ãã¯ãæ»æãã§ãŒã³ã«çŠç¹ãåœãŠãããšã«ãããæ»æãã§ãŒã³ãæã¡åããäŒæ¥ããããã®æ°ããè åšã«å¯Ÿãããã¢ã¯ãã£ãã«é²åŸ¡ã§ãããããµããŒãããããšã«åªããŠããŸãã
åžžã«ææ°æ å ±ãå ¥æããä¿è·ããå æãæã€
EvilProxyãªã©ã®è åšããä¿è·ããæ¹æ³ã«ã€ããŠã¯ããã«ãŒããã€ã³ãã®e-bookãã¡ãŒã« ã»ãã¥ãªãã£æŠç¥ã¬ã€ããããŠã³ããŒãããŠãã ããã
âããããŠèªã¿ãã
