JPCERT/CC Eyes

JPCERT/CC Eyes

JPCERT Coordination Center official Blog

Language:

  • Recent Cases of Watering Hole Attacks, Part 1 Incident
    朝長 秀誠 (Shusei Tomonaga)

    朝長 秀誠 (Shusei Tomonaga)

    December 19, 2024
    Recent Cases of Watering Hole Attacks, Part 1
    Nowadays, many people probably recognize exploit of vulnerabilities in publicly exposed assets such as VPN and firewalls as the attack vector. In fact, many security incidents reported to JPCERT/CC also involve such devices. This is because vulnerabilities in VPN devices are exploited not only by APT groups but also by many other groups such as ransomware actors and cyber crime actors, and the number of incidents is high accordingly. As...

    Read more

  • TSUBAME Report Overflow (Jul-Sep 2024) Cyber Metrics
    鹿野 恵祐 (Keisuke Shikano)

    鹿野 恵祐 (Keisuke Shikano)

    December 17, 2024
    TSUBAME Report Overflow (Jul-Sep 2024)
    This TSUBAME Report Overflow series discuss monitoring trends of overseas TSUBAME sensors and other activities which the Internet Threat Monitoring Quarterly Reports does not include. This article covers the monitoring results for the period of July to September 2024. Packets from TP-LINK routers other than AX3000 JPCERT/CC analyzes the data collected by TSUBAME every day. In the previous article , we discussed scans from IP addresses that appear to be...

    Read more

  • Attack Exploiting Legitimate Service by APT-C-60 Incident
    亀井 智矢(Tomoya Kamei)

    亀井 智矢(Tomoya Kamei)

    December 11, 2024
    Attack Exploiting Legitimate Service by APT-C-60
    JPCERT/CC has confirmed an attack against an organization in Japan in ...

    Read more

  • ETW Forensics - Why use Event Tracing for Windows over EventLog? - Forensic
    朝長 秀誠 (Shusei Tomonaga)

    朝長 秀誠 (Shusei Tomonaga)

    November 14, 2024
    ETW Forensics - Why use Event Tracing for Windows over EventLog? -
    Many people may think of EventLogs when one mentions Windows OS logs. When investigating incidents such as malware infections, it is common to analyze the Windows OS EventLogs to find traces that may help uncover the incident. However, since the EventLog is not designed to detect suspicious behavior on Windows OS, you may not always find the information you are looking for when investigating an incident. Therefore, it is necessary...

    Read more

  • Event Log Talks a Lot: Identifying Human-operated Ransomware through Windows Event Logs Malware
    JPCERT/CC

    JPCERT/CC

    September 30, 2024
    Event Log Talks a Lot: Identifying Human-operated Ransomware through Windows Event Logs
    The difficult part of the initial response to a human-operated ransomware attack is identifying the attack vector. You may already know from recent security incident trends that the vulnerabilities of VPN devices are likely to be exploited, but it often takes much time to investigate because multiple penetration routes are often considered when an incident occurs. Therefore, in order to ensure a smooth initial response, it is important to investigate...

    Read more

  • TSUBAME Report Overflow (Apr-Jun 2024) Cyber Metrics
    鹿野 恵祐 (Keisuke Shikano)

    鹿野 恵祐 (Keisuke Shikano)

    September 12, 2024
    TSUBAME Report Overflow (Apr-Jun 2024)
    This TSUBAME Report Overflow series discuss monitoring trends of overseas TSUBAME sensors and other activities which the Internet Threat Monitoring Quarterly Reports does not include. This article covers the monitoring results for the period of April to June 2024. The scan trends observed with TSUBAME sensors in Japan are presented in graphs here. Activities to scan Telnet from TP-LINK routers JPCERT/CC analyzes the data collected by TSUBAME every day. Since...

    Read more

  • Dynamic Analysis Technique of Android Malware by Injecting Smali Gadgets Malware
    増渕 維摩(Yuma Masubuchi)

    増渕 維摩(Yuma Masubuchi)

    August 8, 2024
    Dynamic Analysis Technique of Android Malware by Injecting Smali Gadgets
    When dynamically analyzing Android malware, it is currently difficult to follow its code using debuggers unlike Windows malware. Although there is a technique [1] to hook a method dynamically by Frida [2], obtaining the in-progress state of the method is still difficult, and since Frida is not a tool dedicated to Android, only limited information can be obtained. In this article, I introduce smali gadget injection technique as a more...

    Read more

  • MirrorFace Attack against Japanese Organisations Incident
    朝長 秀誠 (Shusei Tomonaga)

    朝長 秀誠 (Shusei Tomonaga)

    July 16, 2024
    MirrorFace Attack against Japanese Organisations
    JPCERT/CC has been observing attack activities by MirrorFace LODEINFO ...

    Read more

  • Attack Activities by Kimsuky Targeting Japanese Organizations Malware
    喜野 孝太(Kota Kino)

    喜野 孝太(Kota Kino)

    July 8, 2024
    Attack Activities by Kimsuky Targeting Japanese Organizations
    JPCERT/CC has confirmed attack activities targeting Japanese organizations by an attack group called Kimsuky in March 2024. This article introduces the attack methods of the group confirmed by JPCERT/CC. Attack overview In the attack we identified, the attacker sent a targeted attack email impersonating a security and diplomatic organization. A zip file containing the following files with double file extensions was attached to the email. (File names are omitted.) (1)...

    Read more

  • TSUBAME Report Overflow (Jan-Mar 2024) Cyber Metrics
    鹿野 恵祐 (Keisuke Shikano)

    鹿野 恵祐 (Keisuke Shikano)

    June 21, 2024
    TSUBAME Report Overflow (Jan-Mar 2024)
    This TSUBAME Report Overflow series discuss monitoring trends of overseas TSUBAME sensors and other activities which the Internet Threat Monitoring Quarterly Reports does not include. This article covers the monitoring results for the period of January to March 2024. The scan trends observed with TSUBAME sensors in Japan are presented in graphs here. Impacts in Japan from Observations in FY2023 JPCERT/CC analyzes the data collected by TSUBAME on a daily...

    Read more

  • Previous 10 articles
  • Next 10 articles

Categories

  • Malware
  • Incident
  • Event
  • Vulnerability
  • Security Technology
  • Forensic
  • Cyber Metrics
  • ICS-OT
  • Other

Tags

  • Python
  • Conference
  • Datper
  • ChChes
  • Training
  • Statistics and Indicator
  • Tool
  • BlackTech
  • LogonTracer
  • Report
  • Splunk
  • ElasticStack
  • impfuzzy
  • volatility
  • RedLeaves
  • PlugX
  • DarkHotel
  • Banking malware
  • Pacific_Islands
  • CSIRT
  • Password
  • Policy
  • DDoS
  • APT
  • Trend
  • Africa
  • SecureCoding
  • SysmonSearch
  • JSAC
  • IoT
  • IIoT
  • Quasar
  • LODEINFO
  • Lazarus
  • Emotet
  • Phishing
  • Metrics
  • TSUBAME
  • Standard-Guideline
 

Authors

  • 鹿野 恵祐 (Keisuke Shikano)
  • 関口 晃弘 (Akihiro Sekiguchi)
  • 衛藤 亮介 (Ryosuke Eto)
  • 織戸 由美(Yumi Orito)
  • 福本 郁哉(Ikuya Fukumoto)
  • 石原 大移紀(Daiki Ishihara)
  • 登山 昌恵 (Masae Toyama)
  • 田中 信太郎(Shintaro Tanaka)
  • 洞田 慎一 (Shinichi Horata)
  • 河野 一之 (Kazuyuki Kohno)
  • 水野 哲也 (Tetsuya Mizuno)
  • 村上 勇樹(Yuki Murakami)
  • 朝長 秀誠 (Shusei Tomonaga)
  • 戸塚 紀子(Noriko Totsuka)
  • 小宮山 功一朗 (Koichiro Sparky Komiyama)
  • 増渕 維摩(Yuma Masubuchi)
  • 堀 充孝(Mitsutaka Hori)
  • 喜野 孝太(Kota Kino)
  • 内田 有香子 (Yukako Uchida)
  • 佐條 研(Ken Sajo)
  • 佐々木 勇人(Hayato Sasaki)
  • 伊藤 智貴 (Tomo Ito)
  • 亀井 智矢(Tomoya Kamei)
  • 中野 巧 (Takumi Nakano)
  • 中井 尚子(Shoko Nakai)
  • JPCERT/CC

Archives

  • 20259
  • 202417
  • 202318
  • 202219
  • 202120
  • 202021
  • 201918
  • 201812
  • 201717
  • 201618
  • 201520
  • 201418
  • 20137
  • 20122
  • 20118
  • 20104

JPCERT Coordination Center

JPCERT/CC
8F Tozan Bldg, 4-4-2 Nihonbashi-Honcho, Chuo-ku, Tokyo 1030023 JAPAN

TEL: +81-3-6271-8901 FAX: +81-3-6271-8908

  • Privacy Policy
  • Disclaimer

© 1996-2025 JPCERT/CC

OSZAR »
OSZAR »