ç®æ¬¡
ããããããã®å®çŸ©
ããããããã¯ãæšçãšãªã£ã被害è ã«å¯ŸããŠãæªè³ªãªã¢ã¯ãã£ããã£ãå®è¡ããã³ã³ãã¥ãŒã¿çŸ€ãæ°ã ã®ããã€ã¹ãæããŸãããããããããããšããèšèã¯ãããããããšããããã¯ãŒã¯ãããã®é èªã§ãããããããã䜿çšãããµã€ããŒæ»æã®æ§è³ªã衚ããŠããŸããDDoSæ»æã«ããå€§äŒæ¥ããããã¯ãŒã¯ã€ã³ãã©ã掻åäžèœã«é¥ããããæãåºãç¥ãæž¡ã£ãŠããã€ã³ã¿ãŒãããé害ã®ããã€ãã¯ãããããããåå ã§ããã
ç¡æãã©ã€ã¢ã«
ç¡æãã©ã€ã¢ã«ã®ãç³ãèŸŒã¿æé
- åŒç€Ÿã®ãµã€ããŒã»ãã¥ãªã㣠ãšãã¹ããŒãã貎瀟ã«äŒºããã»ãã¥ãªãã£ç°å¢ãè©äŸ¡ããŠãè åšãªã¹ã¯ã蚺æããŸãã
- 24 æé以å ã«æå°éã®æ§æã§ã30 æ¥éãå©çšããã ãããã«ãŒããã€ã³ãã®ãœãªã¥ãŒã·ã§ã³ãå°å ¥ããŸãã
- ãã«ãŒããã€ã³ãã®ãã¯ãããžãŒãå®éã«ãäœéšããã ããŸãã
- çµç¹ãæã€ã»ãã¥ãªãã£ã®è匱æ§ã«é¢ããã¬ããŒãããæäŸããŸãããã®ã¬ããŒãã¯ããµã€ããŒã»ãã¥ãªãã£æ»æã®å¯Ÿå¿ã«çŽã¡ã«ã掻çšããã ãããšãã§ããŸãã
ãã©ãŒã ã«å¿ èŠäºé ããå ¥åã®äžããç³èŸŒã¿ãã ããã远ã£ãŠãæ åœè ãããé£çµ¡ãããŠããã ããŸãã
Proofpointã®æ åœè ããŸããªããé£çµ¡ããããŸãã
ããããããã®ä»çµã¿ãšMirai
è€æ°ã®ããã€ã¹ãã³ã³ãããŒã«ããã«ã¯ããŠãŒã¶ãŒãéšããŠãã«ãŠã§ã¢ãã€ã³ã¹ããŒã«ãããªããã°ãªããŸãããæ»æè ãšãªããã人ã«ãããããããçã¿åºããã«ãŠã§ã¢ãèªç±ã«é åžããŠããäœæè ãååšãããããæ»æè èªèº«ã被害ãäžãæ©èœåæ¢ããããœãããŠã§ã¢ãäœæããå¿ èŠã¯ãããŸãããäŸãã°ããã«ãŠã§ã¢ã®Miraiã¯ã«ãŒã¿ãŒãIPã«ã¡ã©ãå®¶åºçšèªåå補åã®ãããªãLinuxçã®IoT (Internet of Things) ã·ã¹ãã ã䜿çšããŸãããã©ãã£ãã¯ã§æšçãæº¢ãè¿ãããããšã§ãæ»æè ã¯Linuxã§åäœããIoTã·ã¹ãã ãé éå°ããã³ã³ãããŒã«ããææ®µãåŸãŸããããããããã¯åºç¯å²ã«åã¶ãåäœåæ¢ã®åå ãšãªããã€ã³ã¿ãŒãããäžã®ããŒã¿ãïŒTããã/ç§ ã§äœãåºããç±³ã»ãã¥ãªãã£æ å ±ãµã€ãKrebs on Securityããã©ã³ã¹ã®ãŠã§ããã¹ãOVHãæšæºçãªã€ã³ã¿ãŒãããã³ãã¥ãã±ãŒã·ã§ã³ã®äžå¿çãªãã¡ã€ã³åãµãŒãã¹(DNS)ãããã€ããŒã§ããDynã®ãããªäŒæ¥ãã¿ãŒã²ããã«ããŠããŸããMiraiã¯ããã®çš®ã®æåã®ãã®ãšèããããŸãããå ã®äœè ã¯ãã§ã«æãŸã£ãŠããŸããMiraiã®äœæè ãæãããããåŸã§ãããã®ãã«ãŠã§ã¢ã«ã¯æ»æè ãå©çšå¯èœãªå€ãã®å€çš®ïŒããªã¢ã³ãïŒãäŸãã°OkiruãSatoriãMasutaãPureMasutaãªã©ããããŸãã
ããããããã®ãã«ãŠã§ã¢ã¯ããŠãŒã¶ãŒãéšãããŠããŒã«ã«ããã€ã¹ã«ã€ã³ã¹ããŒã«ããŠããŸãããè匱æ§ãæªçšããŠäœè ããã€ã³ã¹ããŒã«ããŸããIoTã® ãã«ãŠã§ã¢ã§ãæ»æè ã¯äœåãšããããã€ã¹ãã¹ãã£ã³ããã¢ããããŒããããŠããªããããããé©çšãããŠããªãã¿ãŒã²ãããæ¢ããŸããèªåãããé©çšãããŠããªãããã€ã¹ã§ã¯ãæªçšã§ããç¶æ ã®ãŸãŸã§ãæ»æããããããã¡ãŒã ãŠã§ã¢ã®ãµãŒãã¹ãåäœããŠããããããããããããæ§æãããã«ãŠã§ã¢ã«ãšã£ãŠæ°å¥œã®ã¿ãŒã²ããã«ãªã£ãŠããŸãã
ååãªæ°ã®ç¡é²åãªããã€ã¹ãããããããã®ãã«ãŠã§ã¢ã«ææããåŸãæ»æè ã¯ãã©ãã£ãã¯ã§ã¿ãŒã²ãããããµããããã®ç¬éãåŸ ã€ã ãã§ããææããæ©åšã®ãããããã¯ãŒã¯ã¯ãæ»æè ããã€ãžã£ãã¯ããããã€ã¹ã«åãã£ãŠåœä»€ãéããªãéããäŒç ããŠãããããŸã³ããããã¯ãŒã¯ããŸã³ãããããšåŒã°ããŸãããã«ãŠã§ã¢ã¯äžæ¢ããã®åœä»€ãåãåããŸã§ãéãã«æœã¿ãæ€åºãããŸããã
æ»æè ãææããããã€ã¹ã®æ°ã確èªã§ããã¿ãŒã²ããã«ãªã£ãŠãããµãŒããŒãžåæã«DosïŒDenial-of-serviceïŒã³ãã³ããéä¿¡ã§ããã³ãã³ãïŒã³ã³ãããŒã«ã®äžæ¢ã«ãããããã·ã¥ããŒããšãšãã«ãããããããã®ãã«ãŠã§ã¢ã¯çšŒåããŸããããã€ã¹ãäžæ¢ã§ããã³ãã³ãïŒã³ã³ãããŒã«ãµãŒããŒãšéä¿¡ã§ããªãå Žåã«ã¯ãæ»æã«å©çšã§ããªããªããŸãã
Proofpointã®ã¯ã©ãŠãã»ãã¥ãªãã£
ã¯ã©ãŠãã¢ããªã¯ãã³ã©ãã¬ãŒã·ã§ã³ã®æ¹æ³ãä»äºãããæ¹æ³ãå€ããŠããŸããããããäžæ¹ã§ã¯ã©ãŠãã¢ããªã¯æ°ããã»ãã¥ãªãã£ãªã¹ã¯ããããããŸãã
ããããããã®æ»æäºäŸ
æ»æè ã¯ãªã¢ãŒãããã€ã¹ãã³ã³ãããŒã«ã§ãããããããããããã¯ããŸããŸãªæ»æã«äœ¿çšãããŸãããŸã³ããããã¯ãŒã¯ã«ããã«ããã€ã¹ãå ããŠããæ»æè ãããŸããããã以å€ã®æ»æè ã¯æšçãžã®DDoSã§ãªã³ã©ã€ã³ãµãŒãã¹ã忢ãžãšè¿œã蟌ã¿ãŸããããããããã¯ãéèŠãªãããã³ã«ãµãŒãã¹ãçŸäžäººãã®ãŠãŒã¶ãŒãå©çšããå¯èœæ§ã®ããWebã¢ããªã±ãŒã·ã§ã³ãããŠã³ãããç¹ã§ãç¹ã«ã€ã³ã¿ãŒãããã«ãšã£ãŠå±éºã§ãã
ããããããããããã«ããæ»æäºäŸã«ã¯:
- ã·ã¹ãã ããŒã¿ã®èªã¿èŸŒã¿ãšæžã蟌ã¿: æ»æè ã¯ãæ©å¯ããŒã¿ã調ã¹ãããã«ãã»ã³ãã©ã«ãµãŒããŒãžã®ãã¡ã€ã«ã®éä¿¡ãããã€ã¹ã«èŠæ±ããŸããæ©å¯æ±ãã®ã·ã¹ãã ãã¡ã€ã«ã«ã¯ãæ»æè ãäŒæ¥ã«å¯Ÿãããããªãæ»æã®éã«æªçšããã€ã³ãã©ã¹ãã©ã¯ãã£ãŒãžã®å€æŽã§ããªãèšŒææžãå ¥ã£ãŠããŸãã
- ãŠãŒã¶ãŒã¢ã¯ãã£ããã£ã®ç£èŠ: ããããããã®ãœãããŠã§ã¢ã«ã¯ã远å ã§äœ¿çšã§ãããæ»æãšã¯çŽæ¥é¢ä¿ã®ãªãå¥ã®ãã«ãŠã§ã¢ã忢±ãããŠããããšããããããŸãããã®äŸãäžã€æãããšããããããããæ§ç¯ãããã«ãŠã§ã¢ã«ãããŒãã¬ãŒãå«ãŸããŠããããšã¯çãããããŸãããããŒãã¬ãŒããŠãŒã¶ãŒã®ããŒã¹ãããŒã¯ãèšé²ããããã§çã¿åã£ãæ å ±ãæ»æè ã®ã³ã³ãããŒã«äžã«ãããµãŒããŒã«éä¿¡ããéè¡ã®ãŠã§ããµã€ããªã©ã®ãªã³ã©ã€ã³ã¢ã«ãŠã³ããžã®ã¢ã¯ã»ã¹ãç²åŸããŸãã
- æ»æããããå Žæãããã«èŠã€ããããã«ããŒã«ã«ãããã¯ãŒã¯ãã¹ãã£ã³ãã: DDoSã仿ãããæ»æè ã¯ãè匱æ§ãæ¢ãããã«ãã§ããéãå€ãã®ããã€ã¹ãã¹ãã£ã³ããŸãããã¡ã€ã¢ãŠã©ãŒã«ã®èåŸã«ããããã€ã¹ãããããã1å°ã®ããã€ã¹ã«ãã«ãŠã§ã¢ãäžæŠã€ã³ã¹ããŒã«ãããŠããŸããšã䟵é£ãããããã€ã¹ã¯ããŒã«ã«ãããã¯ãŒã¯ã®ãªãœãŒã¹ãã¹ãã£ã³ããŸãããã¡ãŒã ãŠã§ã¢ãæŽæ°ãããŠããªãããŒã«ã«ããã€ã¹ãããã°ããã«ãŠã§ã¢ããã®éãã€ããè匱ãªããã€ã¹ã¯ãŸã³ããããã¯ãŒã¯ã«å ããããŸãã
- DDoSã仿ãã: DDoSã¯ãæ»æè ããããããããæ§ç¯ããåŸã«èµ·ããäžè¬çãªæ»æã§ããDDoSã®å¹æãçºæ®ããããã«ãæ»æè ã¯äœåå°ãã®ã³ã³ãã¥ãŒã¿ãå¿ èŠãšããŸããDDOSæ»æãé²ãããã«ã¯ã©ãŠããã¬ã¢ã®ãããªãã³ããŒã¯å©çšå¯èœã§ãããäžçäžã§æ°äžãã®ãŸã³ãããããæ±ã£ãŠããæ»æè ããèããããã©ãŒãã³ã¹å¹çã®äœäžãæãå¯èœæ§ããããŸãã
- ã¹ãã ã¡ãŒã«éä¿¡: ããŒã«ã«ããã€ã¹ããã¡ãŒã«ã¢ã«ãŠã³ãã«ã¢ã¯ã»ã¹ã§ããããã«ãªã£ãæ»æè ã¯ãæšçã«ãªãåä¿¡è ã«ã¡ãŒã«ãéä¿¡ããããã«åœä»€ãåºããŸããã¡ãŒã«ã«ã¯è¿œå ã§ã³ã³ãã¥ãŒã¿ã«ãã«ãŠã§ã¢ãåºããããã®å¥ã®ãã«ãŠã§ã¢ããæ»æè ããã£ãã·ã³ã°ãã£ã³ããŒã³ã«å©çšãããã«ãŠã§ã¢ãå«ãŸããŠããŸãã
ãããããããšCïŒCãµãŒããŒ
æ»æè ãã³ãã³ããéä¿¡ãããŸã§ããã«ãŠã§ã¢ã¯ææããããã€ã¹å ã§äŒç ããŠããŸããDDoSã§ã®æ»æè ã¯ãããããã¹ã¿ãŒãšèšãããŠããŸãããããŠæ»æè ããã¹ãŠã®ããã€ã¹ãå¶åŸ¡ãããããã€ã¹ã«ã¡ãã»ãŒãžãéä¿¡ããäžå€®ãµãŒããŒã¯ãã³ãã³ãïŒã³ã³ãããŒã«ã»ã³ã¿ãŒãŸãã¯C&CãšåŒã°ããŠããŸãããã¡ã€ã¢ãŠã©ãŒã«ã«æ§ç¯ãããåçš®ãããã³ã«ã䜿çšããŠããã«ãŠã§ã¢ãCïŒCãšéä¿¡ããã®ã§ããã°ãã¡ãã»ãŒãžã¯ãããã¯ãããããšã¯ãããŸãããäŸãã°ãè·å Žãå®¶åºã®ãããã¯ãŒã¯ã§ã¯HTTPéä¿¡ãçããã¯ãªãã®ã§ãäŒæ¥ã®ãã¡ã€ã¢ãŠã©ãŒã«ã«ãã£ãŠé®æãããªããããããããããã®ãã«ãŠã§ã¢ãHTTPã䜿çšããŠéä¿¡ããããšãããåŸãŸãã
ããããããã¯å¹æãé«ãããšããããã«ãŠã§ã¢ã®äœæè ã¯DdaaSïŒãµãŒãã¹ãšããŠã®DDoSïŒãæäŸããããšã§èªèº«ã®ãã«ãŠã§ã¢ãåçåããŠããŸããããããããã®ãã«ãŠã§ã¢ã«ææããããã€ãã®ããã€ã¹ã¯åãCïŒCäžæ¢ã«æ¥ç¶ããããCïŒCã«ãã°ã€ã³ã§ããåèªãã³ãã³ããéä¿¡ã§ãããµãã¹ã¯ãªãã·ã§ã³ã®ãã©ã³ãããã«ãŠã§ã¢äœæè ã販売ããä»çµã¿ã§ãã
ãã«ãŠã§ã¢äœæè ã¯ãCïŒCã¢ããªã±ãŒã·ã§ã³ã«ãèªåã§ã·ã¹ãã ãåãæ¿ãããã§ã€ã«ãªãŒããŒãã³ãŒãã£ã³ã°ããŠããããšããããŸããCïŒCã忢ããå Žåã®ãæå¹ãªãã§ã€ã«ãªãŒããŒãªãã·ã§ã³ãšããŠå¥ã®CïŒCãã±ãŒã·ã§ã³ãå ãããŸãããã«ãŠã§ã¢ã«åé·æ§ãäœãåºãããšã§ããã¹ããµãŒãã¹ãã¢ã«ãŠã³ãããã£ã³ã»ã«ããåŸã§ããæ»æè ã¯ãã¹ãŠã®æææžã¿ããã€ã¹ã倱ããã«æžã¿ãŸãã
å¥ã®æ¹æ³ã§ã¯ãã©ã®ææããã€ã¹ãCïŒCãšããŠæ©èœããããã¢ããŒãã¢(P2P)ã¢ãã«ã䜿çšããŸãã1å°ã®ã³ã³ãã¥ãŒã¿ãP2Pã«å€±æãããšããã®ä»ã®åããã€ã¹ãå©çšããä»ã®ããã€ã¹ã«ã³ãã³ããéä¿¡ããŸããP2P ããããããã忢ãããããšã¯ããé£ãããææããããã€ã¹ã®éã§ã®éä¿¡ææ®µãšããŠå¥œãŸããŠããŸãã
ææããã€ã¹ã«ã³ãã³ããéä¿¡ãããåŸã«ãæ»æãéå§ãããããæ¯é è ã®æç€ºã«åŸã£ãŠã¢ã¯ã·ã§ã³ãå®è¡ããããããŸããããã€ã¹ãææããŠããããšã«æ°ã¥ããªããŠãŒã¶ãŒã¯ãã€ã³ã¿ãŒãããæ€çŽ¢äžã«ãããã¯ãŒã¯ãããã€ã¹äžã§ã®ããã©ãŒãã³ã¹ã®äœäžãçµéšããå¯èœæ§ããããŸããCïŒCããåœä»€ãäžããããšããœã³ã³ã®åäœãé ããªããŸãã ãããã¯ãŒã¯äžã§ã¯ãçªç¶ã®é床å€åãèµ·ãããããããŸãããæ»æãå®äºãããšãããã©ãŒãã³ã¹ã¯å埩ãããã«ãŠã§ã¢ã¯äŒç ç¶æ ã«æ»ããŸãã
æ»æããã®ä¿è·ïŒã¯ã©ãŠãåãµã³ãããã¯ã¹ïŒ
Proofpoint TAP (Targeted Attack Protection)ã§ã¯ãé«åºŠãªè åšãåä¿¡ç®±ã«å±ãåã«æ€åºãåæããããŠãããã¯ãã驿°çãªã¢ãããŒãã䜿ã£ãŠãæ»æè ã®äžæ©å ãè¡ãããšãã§ããŸãã
ããããããã®æ€ç¥ãšå¯Ÿç
ããããããã®ææã¯äž»ã«å€ããªã£ããã¡ãŒã ãŠã§ã¢ãé¢äžããŠããã®ã§ããŠãŒã¶ãŒã¯ãããã¯ãŒã¯äžã§èµ·åããããŒããŠã§ã¢ãå«ããIoTããã€ã¹ã«ã¯åžžã«ããããåœãŠãã¹ãã§ããæ§æ¥ã®ãœãããŠã§ã¢ã®è匱æ§ããµã€ããŒæ»æã§æªçšãããããšãäžè¬çãªã®ã¯ããŠãŒã¶ãŒããããŠãæ°ã¶æéããããé©çšããªããŸãŸããã€ã¹ãæŸçœ®ããŠããããã§ããã«ãŒã¿ãŒãå®¶åºã®èªååçšIoTãã«ã¡ã©ããã®ä»ã®ããŒããŠã§ã¢ã¯ãã³ãã³èŠéãããŠãããå®å šã ãšæãããŠããããšãå ±éããŠããããããããæ§ç¯ãããã«ãŠã§ã¢ã®æšçã«ãããŠããŸãã
ããŒã«ã«ã³ã³ãã¥ãŒã¿ãããããããã®ãã«ãŠã§ã¢ã«ææããŠãããšæããŠããã®ã§ããã°ãæåã®æ€åºæ¹æ³ã¯ãã€ã³ã¹ããŒã«ãããã«ãŠã§ã¢å¯ŸçãœãããŠã§ã¢ã䜿ã£ãŠãã³ã³ãã¥ãŒã¿ãã¹ãã£ã³ããããšã§ããåªããã¢ã³ããã«ãŠã§ã¢ã®ãœãããŠã§ã¢ã¯ãã€ã³ã¹ããŒã«ãããŠããŸãåã«æ€åºããŸãããç¹å®ã®ãŒããã€ãã«ãŠã§ã¢ã¯ããŸã åºåã£ãŠããªããããã«æ€åºãããã«ã€ã³ã¹ããŒã«ãå®äºããŸãããã«ãŠã§ã¢å¯ŸçãœãããŠã§ã¢ãæŽæ°ãããŠããªãå Žåãæ°ãããã«ãŠã§ã¢ã¯æ€åºã§ããŸãããããããããäœæè ã¯ãã³ãŒããå€ãç¶ããä»ã®ãã®ãšã¯ãããã«ç°ãªãããã«ããŠããŸããæ°ãããã«ãŠã§ã¢ãããœã³ã³é²åŸ¡ããã®æ€åºãéãããããããŸãããèªåã®æ©åšè£ 眮ãå®ãããã«ã¯ããã³ããŒãæ°ããããããé åžããæç¹ã§ãåžžã«ãã«ãŠã§ã¢å¯ŸçãœãããŠã§ã¢ãæŽæ°ããããšã倧åã§ãã