JPCERT/CC Eyes

JPCERT/CC Eyes

JPCERT Coordination Center official Blog

Language:

  • DslogdRAT Malware Installed in Ivanti Connect Secure Malware
    増渕 維摩(Yuma Masubuchi)

    増渕 維摩(Yuma Masubuchi)

    April 24, 2025
    DslogdRAT Malware Installed in Ivanti Connect Secure
    In a previous article of JPCERT/CC Eyes, we reported on SPAWNCHIMERA malware, which infects the target after exploiting the vulnerability in Ivanti Connect Secure. However, this is not the only malware observed in recent attacks. This time, we focus on another malware DslogdRAT and a web shell that were installed by exploiting a zero-day vulnerability at that time, CVE-2025-0282, during attacks against organizations in Japan around December 2024. Functionality of...

    Read more

  • ICS Security Conference 2025 Event
    織戸 由美(Yumi Orito)

    織戸 由美(Yumi Orito)

    April 11, 2025
    ICS Security Conference 2025
    JPCERT/CC organised ICS Security Conference on 5 February 2025. This event aims to share the current threat to ICS both in Japan and overseas and the efforts of stakeholders in the field, as well as to help participants improve their ICS security measures and establish best practices. The conference started in 2009 and now marks its 17th year. 50 participants attended the event onsite and 511 people through live streaming....

    Read more

  • JSAC2025 -Workshop & Lightning Talk- JSAC
    石原 大移紀(Daiki Ishihara)

    石原 大移紀(Daiki Ishihara)

    April 3, 2025
    JSAC2025 -Workshop & Lightning Talk-
    Following the previous blog post on the Main Track on Day 2, this article highlights the Workshops and Lightning Talks of JSAC2025. Workshop Handling Threat Intelligence: Techniques of Consuming and Creating Threat Intelligence Speaker: Tomohisa Ishikawa, Tatsuya Daitoku, Hiroyuki Tomiyama (Tokio Marine Holdings, Inc.) Slides (Japanese) Tomohisa, Tatsuya, and Hiroyuki provided a workshop on threat intelligence, giving systematic explanations from the fundamentals to practical applications. They first introduced the core...

    Read more

  • Tempted to Classifying APT Actors: Practical Challenges of Attribution in the Case of Lazarus’s Subgroup Lazarus
    佐々木 勇人(Hayato Sasaki)

    佐々木 勇人(Hayato Sasaki)

    March 25, 2025
    Tempted to Classifying APT Actors: Practical Challenges of Attribution in the Case of Lazarus’s Subgroup
    *Please note that this article is a translation of the Japanese versio...

    Read more

  • TSUBAME Report Overflow (Oct-Dec 2024) TSUBAME
    鹿野 恵祐 (Keisuke Shikano)

    鹿野 恵祐 (Keisuke Shikano)

    March 21, 2025
    TSUBAME Report Overflow (Oct-Dec 2024)
    This TSUBAME Report Overflow series discuss monitoring trends of overseas TSUBAME sensors and other activities which the Internet Threat Monitoring Quarterly Reports does not include. This article covers the monitoring results for the period of October to December 2024. Observation of reflection packets from Websites of organizations in Japan At JPCERT/CC, we analyze the data collected from TSUBAME on a daily basis. We sometimes observe packets from websites responding to...

    Read more

  • JSAC2025 -Day 2- Event
    JPCERT/CC

    JPCERT/CC

    March 19, 2025
    JSAC2025 -Day 2-
    Continuing from the previous blog article, this entry introduces the presentations on the 2nd day of JSAC2025. Observation of phishing criminal groups related to illegal money transfers and Mizuho Bank’s countermeasures -Fighting against phishing site malware ‘KeepSpy’- Speaker: Tsukasa Takeuchi, Takuya Endo, Hiroyuki Yako (Mizuho Financial Group) Slides(English) Tsukasa, Takuya, and Hiroyuki presented Mizuho’s efforts to address phishing attacks, including the analysis of exploited malware and the criminal groups behind...

    Read more

  • JSAC2025 -Day 1- Event
    亀井 智矢(Tomoya Kamei)

    亀井 智矢(Tomoya Kamei)

    March 5, 2025
    JSAC2025 -Day 1-
    On January 21 and 22, 2025, JPCERT/CC held its annual technical conference JSAC, aiming at enhancing the skills and knowledge of security analysts. The conference brought experts in the field of cyber security together to share technical insights related to incident analysis and response. The event marked its 8th year, and it was held as an offline-only event like the previous year. Over the two-day event, there were 18 presentations,...

    Read more

  • SPAWNCHIMERA Malware: The Chimera Spawning from Ivanti Connect Secure Vulnerability Malware
    増渕 維摩(Yuma Masubuchi)

    増渕 維摩(Yuma Masubuchi)

    February 20, 2025
    SPAWNCHIMERA Malware: The Chimera Spawning from Ivanti Connect Secure Vulnerability
    In January 2025, Ivanti published an advisory[1] regarding the vulnera...

    Read more

  • Beware of Contacts through LinkedIn: They Target Your Organization’s Property, Not Yours Incident
    朝長 秀誠 (Shusei Tomonaga)

    朝長 秀誠 (Shusei Tomonaga)

    January 20, 2025
    Beware of Contacts through LinkedIn: They Target Your Organization’s Property, Not Yours
    There have recently been reports of unauthorized access in Japan, usin...

    Read more

  • Recent Cases of Watering Hole Attacks, Part 2 Incident
    朝長 秀誠 (Shusei Tomonaga)

    朝長 秀誠 (Shusei Tomonaga)

    December 26, 2024
    Recent Cases of Watering Hole Attacks, Part 2
    Continuing from the previous article, Part 2 covers another case of a watering hole attack. This time, we will look at the case of a media-related website exploited in 2023. Flow of the attack Figure 1 shows the flow of the watering hole attack. When someone accesses the tampered website, an LZH file is downloaded, and when they execute the LNK file in the LZH file, their PC becomes infected...

    Read more

  • Next 10 articles

Categories

  • Malware
  • Incident
  • Event
  • Vulnerability
  • Security Technology
  • Forensic
  • Cyber Metrics
  • ICS-OT
  • Other

Tags

  • Python
  • Conference
  • Datper
  • ChChes
  • Training
  • Statistics and Indicator
  • Tool
  • BlackTech
  • LogonTracer
  • Report
  • Splunk
  • ElasticStack
  • impfuzzy
  • volatility
  • RedLeaves
  • PlugX
  • DarkHotel
  • Banking malware
  • Pacific_Islands
  • CSIRT
  • Password
  • Policy
  • DDoS
  • APT
  • Trend
  • Africa
  • SecureCoding
  • SysmonSearch
  • JSAC
  • IoT
  • IIoT
  • Quasar
  • LODEINFO
  • Lazarus
  • Emotet
  • Phishing
  • Metrics
  • TSUBAME
  • Standard-Guideline
 

Authors

  • 鹿野 恵祐 (Keisuke Shikano)
  • 関口 晃弘 (Akihiro Sekiguchi)
  • 衛藤 亮介 (Ryosuke Eto)
  • 織戸 由美(Yumi Orito)
  • 福本 郁哉(Ikuya Fukumoto)
  • 石原 大移紀(Daiki Ishihara)
  • 登山 昌恵 (Masae Toyama)
  • 田中 信太郎(Shintaro Tanaka)
  • 洞田 慎一 (Shinichi Horata)
  • 河野 一之 (Kazuyuki Kohno)
  • 水野 哲也 (Tetsuya Mizuno)
  • 村上 勇樹(Yuki Murakami)
  • 朝長 秀誠 (Shusei Tomonaga)
  • 戸塚 紀子(Noriko Totsuka)
  • 小宮山 功一朗 (Koichiro Sparky Komiyama)
  • 増渕 維摩(Yuma Masubuchi)
  • 堀 充孝(Mitsutaka Hori)
  • 喜野 孝太(Kota Kino)
  • 内田 有香子 (Yukako Uchida)
  • 佐條 研(Ken Sajo)
  • 佐々木 勇人(Hayato Sasaki)
  • 伊藤 智貴 (Tomo Ito)
  • 亀井 智矢(Tomoya Kamei)
  • 中野 巧 (Takumi Nakano)
  • 中井 尚子(Shoko Nakai)
  • JPCERT/CC

Archives

  • 20259
  • 202417
  • 202318
  • 202219
  • 202120
  • 202021
  • 201918
  • 201812
  • 201717
  • 201618
  • 201520
  • 201418
  • 20137
  • 20122
  • 20118
  • 20104

JPCERT Coordination Center

JPCERT/CC
8F Tozan Bldg, 4-4-2 Nihonbashi-Honcho, Chuo-ku, Tokyo 1030023 JAPAN

TEL: +81-3-6271-8901 FAX: +81-3-6271-8908

  • Privacy Policy
  • Disclaimer

© 1996-2025 JPCERT/CC

OSZAR »
OSZAR »