🛡️ Weekly Security Threat Report
çŸåšæ¥ä»: 2026/02/08
èŠæã¬ãã«: High (極ããŠé«ã)
2026幎2æç¬¬1é±ãã°ããŒãã«ãªãµã€ããŒè åšç°å¢ã¯ããšããžããã€ã¹ã®è匱æ§ã«å¯Ÿããçµç¹çãªæ»æãAIãé§äœ¿ããé«åºŠãªè©æ¬ºããããŠåœå®¶èæ¯ãæã€è åšã¢ã¯ã¿ãŒã«ããã1-dayãè匱æ§ã®è¶ é«éãªæªçšãšãããæ¥µããŠäžå®å®ãªå±é¢ãè¿ããŠãããç¹ã«ãããã¯ãŒã¯å¢çïŒãšããžïŒãä¿è·ããã¯ãã®VPNæ©åšãã¡ãŒã«ãµãŒããŒãèªèšŒã²ãŒããŠã§ã€ããéã«çµç¹äŸµå ¥ã®äž»èŠãªå ¥ãå£ãšããŠæªçšãããŠãã宿 ããåéãããã€ã³ããªãžã§ã³ã¹ããé®®æã«æµ®ãã³äžãã£ãŠãã ã
- Section 1: è åšã»è匱æ§äžèЧ & ãã¬ã³ã
- Section 2: Deep Dive into Critical Threats (éèŠè åšã®æ·±æã)
- ã»ã¯ã·ã§ã³ 3: åœå®¶ã»å°æ¿åŠçè åšãšã°ããŒãã«ã»ãµã€ããŒæŠã®å€å®¹
- ã»ã¯ã·ã§ã³ 4: ã©ã³ãµã ãŠã§ã¢ã»ãšã³ã·ã¹ãã ã®é²åãšè¢«å®³ã®å®æ
- ã»ã¯ã·ã§ã³ 5: äŸçµŠç¶²ïŒãµãã©ã€ãã§ãŒã³ïŒã®ä¿¡é Œæ§åŽ©å£
- ã»ã¯ã·ã§ã³ 6: ã€ã³ãã©ç®¡çã®ãã©ãã€ã ã·ãã – CISA BOD 26-02 ã®æ·±å±€
- ã»ã¯ã·ã§ã³ 7: AIæè¡ã®é²åãšãµã€ããŒè åšã®äº€å·®
- Section 3: CISO/Manager Summary
Section 1: è åšã»è匱æ§äžèЧ & ãã¬ã³ã
- ãã¥ãŒã¹ããŒãã«
| Category | Topic (è匱æ§/äºä»¶å) | Severity (Critical/High) | Status (æªçšãã/ããããã) | URL |
| Critical Vuln | SmarterMail RCE (CVE-2026-24423) | Critical ($CVSS: 9.8$) | Exploited in wild / Patch available | (https://www.bleepingcomputer.com/news/security/cisa-warns-of-smartermail-rce-flaw-used-in-ransomware-attacks/) |
| Critical Vuln | Fortinet FortiCloud SSO Bypass (CVE-2026-24858) | Critical ($CVSS: 9.6$) | Exploited in wild / Patch available | (https://www.cisa.gov/news-events/alerts/2026/01/28/fortinet-releases-guidance-address-ongoing-exploitation-authentication-bypass-vulnerability-cve-2026) |
| Critical Vuln | Ivanti EPMM Zero-Day RCE (CVE-2026-1281) | Critical ($CVSS: 9.8$) | Exploited in wild / Patch available | F5 Labs |
| Critical Vuln | n8n Workflow Automation RCE (CVE-2026-25049) | Critical ($CVSS: 9.4$) | Potential Exploitation / Patch available | (https://thehackernews.com/2026/02/critical-n8n-flaw-cve-2026-25049.html) |
| Critical Vuln | BeyondTrust Remote Support 0-Day RCE | Critical (Unknown) | Exploited in wild / Patch available | Cybersecurity News |
| Cyber Incident | BridgePay Ransomware Attack | High (Service Outage) | Active Incident / Ongoing | (https://www.bleepingcomputer.com/news/security/payments-platform-bridgepay-confirms-ransomware-attack-behind-outage/) |
| State-sponsored | Microsoft Office Security Bypass (CVE-2026-21509) | High ($CVSS: 7.8$) | Exploited by APT28 / Patch available | (https://thehackernews.com/2026/02/apt28-uses-microsoft-office-cve-2026.html) |
| Supply Chain | eScan Antivirus Malware Delivery | High (Supply Chain) | Confirmed Incident / Investigation | (https://dev.to/ziizium/security-news-weekly-round-up-6th-february-2026-1l4m) |
| Infrastructure | CISA BOD 26-02: End-of-Life Edge Devices | High (Compliance) | Directive Issued / Immediate Action | (https://www.cisa.gov/news-events/alerts/2026/02/03/cisa-adds-four-known-exploited-vulnerabilities-catalog) |
| Cyber Incident | Substack Data Breach | Medium (Data Leak) | Confirmed / Limited User Data | Infosecurity Magazine |
- 詳现èŠçŽ
ä»é±ã®è åšãã¬ã³ãã«ãããæãé¡èãªå€åã¯ããé²åŸ¡ã€ã³ãã©èªäœã®æŠåšåããšãæ»æãµã€ã¯ã«ã®å§çž®ãã§ãããé·å¹Žä¿¡é ŒãããŠããã»ãã¥ãªãã£è£œåã管çããŒã«ããæ»æè ã«ãšã£ãŠã®æé©ãªãšã³ããªãŒãã€ã³ããžãšå€è²ããŠãããç¹ã«ãFortinetãIvantiãSmarterMailãªã©ã®ãšããžããã€ã¹ãéä¿¡ã€ã³ãã©ã«ãããèªèšŒåé¿ããã³ãªã¢ãŒãã³ãŒãå®è¡ïŒRCEïŒã®è匱æ§ãçžæ¬¡ãã§çºèŠããããããå ¬éããæ°æ¥ããããã¯æ°æé以å ã«ã©ã³ãµã ãŠã§ã¢ã°ã«ãŒããåœå®¶èæ¯ãæã€è åšã¢ã¯ã¿ãŒã«ãã£ãŠæªçšãããŠãã ãããã¯ãããã管çã®ç¶äºæéãäºå®äžæ¶æ» ããããšãæå³ããŠãããçµç¹ã«ã¯ãäºé²ãã ãã§ãªããæ€ç¥ããšãå°ã蟌ããã®èªååããããŸã§ä»¥äžã«æ±ããããŠããã
ããã«ãAIæè¡ã®æªçšãæçæã«å ¥ã£ãŠãããAIã«ãã£ãŠçæãããåœã®äŒè°æåŸ ãé³å£°ãçšããè©æ¬ºã¯ãå幎æ¯ã§1210%ãšããé©ç°çãªå¢å ãèšé²ããŠãããåŸæ¥ã®åŸæ¥å¡æè²ã ãã§ã¯é²åŸ¡ãå°é£ãªã¬ãã«ã«éããŠãã ããŸããGitHub Codespacesãªã©ã®ã¯ã©ãŠãéçºç°å¢ãæªçšããRCEããNGINXãµãŒããŒã®æ§æãã¡ã€ã«ãæ¹ããããŠãã©ãã£ãã¯ããªãã€ã¬ã¯ãããææ³ãªã©ãéçºã»éçšã€ã³ãã©ãçã£ããã¹ãã«ã¹åãã®æ»æãå·§åŠåããŠãã ãããã«åŒå¿ããããã«ãCISAã¯ãµããŒãçµäºïŒEOSïŒãè¿ãããšããžããã€ã¹ãé£éŠæ¿åºãããã¯ãŒã¯ããæé€ããææåã®ããæä»€ãçºåºããŠãããã€ã³ãã©ã®å¥å šæ§ç¶æãåœå®¶ã¬ãã«ã®å®å šä¿é課é¡ãšãªã£ãŠããããšã瀺åããã ã
Section 2: Deep Dive into Critical Threats (éèŠè åšã®æ·±æã)
åéãããæ å ±ãåæããçŸä»£ã®çµç¹ã«ãããŠå³åº§ã«å¯Ÿå¿ãæ€èšãã¹ã3ã€ã®é倧ãªè åšã«ã€ããŠããã®æè¡çèæ¯ãšå¯Ÿçã詳述ããã
🚨 Alert 1: Fortinet FortiCloud SSO èªèšŒãã€ãã¹ (CVE-2026-24858)
ãã®è匱æ§ã¯ãFortinet補åãæäŸããã¯ã©ãŠãããŒã¹ã®ã·ã³ã°ã«ãµã€ã³ãªã³ïŒSSOïŒæ©èœã®æ ¹å¹¹ãæºããããã®ã§ãããæ¬æ¥ãå©äŸ¿æ§ãšã»ãã¥ãªãã£ãäž¡ç«ãããããã®SSOããæ»æè ã«ãšã£ãŠã®ãäžèœéµããšããŠæ©èœããŠããŸã£ãŠããç¹ã極ããŠæ·±å»ã§ããã
- æŠèŠ (3è¡ãŸãšã): FortiCloud SSOæ©èœã«ååšããé倧ãªè匱æ§ã«ãããæ£èŠã®FortiCloudã¢ã«ãŠã³ããæã€æ»æè ããä»çµç¹ã®ããã€ã¹ã«ç®¡çè æš©éã§ãã°ã€ã³å¯èœãšãªãããã®æ»æã¯SAMLã¡ãã»ãŒãžã®åŠçäžåãçªããã®ã§ããããã§ã«è€æ°ã®çµç¹ã§ãã¡ã€ã¢ãŠã©ãŒã«èšå®ã®æ¹ãããäžæ£ã¢ã«ãŠã³ãã®äœæã確èªãããŠãã ã
- æè¡ç詳现: 圱é¿ãåããã®ã¯FortiOSãFortiManagerãFortiAnalyzerãFortiProxyãªã©ã®äž»èŠè£œå矀ã§ãã ãæ»æã¡ã«ããºã ã¯ã代æ¿ãã¹ãŸãã¯ãã£ãã«ã䜿çšããèªèšŒãã€ãã¹ïŒCWE-288ïŒã«åé¡ããããå ·äœçã«ã¯ãæ»æè ãèªèº«ã®ã¢ã«ãŠã³ãã§ãã°ã€ã³ããæšçãšãªãããã€ã¹ã«å¯ŸããŠç¹å¥ã«çް工ãããSAMLã¡ãã»ãŒãžãéä¿¡ããããšã§ãèªèšŒããžãã¯ã欺ããç°ãªã顧客ã¢ã«ãŠã³ãã«å±ããããã€ã¹ãžã®ã¢ã¯ã»ã¹æš©ãååŸãã ã å®å°ã§ã®æ»æèª¿æ»ã«ããã°ãæ»æè ã¯ãã°ã€ã³åŸããããæ°ç§ã®éã«èšå®ãã¡ã€ã«ãå€éšãžãšã¯ã¹ããŒãããæ°žç¶æ§ã確ä¿ããããã«ç¬èªã®ããŒã«ã«ç®¡çè ã¢ã«ãŠã³ããäœæãããã«VPNèšå®ã倿ŽããŠå€éšããã®èªç±ãªã¢ã¯ã»ã¹çµè·¯ã確ä¿ãããšãããæ¥µããŠè¿ éãã€èªååãããè¡åãèŠããŠãã ã
- æšå¥šããã察ç (Mitigation): ãšã³ãžãã¢ããã³ã€ã³ãã©æ
åœè
ã¯ããŸãèªçµç¹ã®ããã€ã¹ã§ãAllow administrative login using FortiCloud SSOããæå¹ã«ãªã£ãŠãããã確èªããå¿
èŠãããããã®æ©èœã¯ããã©ã«ãã§ã¯ãªãã ããGUIçµç±ã§ããã€ã¹ãç»é²ããéã«èªåçã«ãªã³ã«ãªãå Žåãå€ã ã
- ãããé©çš: FortinetãæäŸããææ°ã®ä¿®æ£æžã¿ãã¡ãŒã ãŠã§ã¢ïŒ2026幎1æ27æ¥ä»¥éã«å ¬éãããããŒãžã§ã³ïŒãçŽã¡ã«é©çšããã
- SSOã®ç¡å¹å: ãããé©çšãŸã§ã®æ«å®æªçœ®ãšããŠãCLIãã
config system global set admin-forticloud-sso-login disable endãå®è¡ããSSOã«ãã管çã¢ã¯ã»ã¹ã鮿ãã ã - ãã°ç£æ»: 2025幎12æãŸã§é¡ããäžå¯©ãªç®¡çè ãã°ã€ã³ãã身ã«èŠãã®ãªã管çè ã¢ã«ãŠã³ãã®äœæãèšå®ãã¡ã€ã«ã®ãšã¯ã¹ããŒãæäœãèšé²ãããŠããªãããSIEMãSyslogã粟æ»ãã ã
- æ å ±æº:(https://www.cisa.gov/news-events/alerts/2026/01/28/fortinet-releases-guidance-address-ongoing-exploitation-authentication-bypass-vulnerability-cve-2026),(https://arcticwolf.com/resources/blog/cve-2026-24858/,(https://arcticwolf.com/resources/blog/cve-2026-24858/))
🚨 Alert 2: APT28ã«ããMicrosoft Office 1-dayæ»æãOperation Neusploitã(CVE-2026-21509)
ãã·ã¢æ¿åºãšã®é¢é£ãææãããè åšã¢ã¯ã¿ãŒAPT28ïŒFancy BearïŒã«ããæ»æã¯ãè匱æ§å ¬éããæªçšãŸã§ã®ããŠã£ã³ããŠïŒç¶äºæéïŒããããã«ççž®ãããŠãããã象城ããŠããã
- æŠèŠ (3è¡ãŸãšã): Microsoft Officeã®ã»ãã¥ãªãã£æ©èœãã€ãã¹è匱æ§ïŒCVE-2026-21509ïŒãæªçšãããã¯ãããŠãŒã¶ãŒã®èš±å¯ãªãã«ãææžãéãã ãã§å€éšãããã«ãŠã§ã¢ãå®è¡ãããæ»æã§ãããAPT28ã¯å°æ¿åŠçãªãããã¯ãé€ã«ãããã£ãã·ã³ã°ã¡ãŒã«ãçšããæ¬§å·ã®è»äºã»æ¿åºæ©é¢ãçµç¹çã«æšçãšããŠãã ã
- æè¡ç詳现: ãã®è匱æ§ã¯ãOfficeãã¡ã€ã«ãå€éšãªãœãŒã¹ãèªã¿èŸŒãéã®æ€èšŒäžåãçªãããã®ã§ãããæ»æã®åææ®µéã§ã¯ãæªæããRTFãŸãã¯Wordææžãéä¿¡ããããææžãéããããšãã¢ããªã±ãŒã·ã§ã³ã¯èªåçã«WebDAVãããã³ã«ã䜿çšããŠå€éšã®æ»æè ãµãŒããŒã«æ¥ç¶ãã第2段éã®ãã€ããŒãïŒMiniDoorãBEARDSHELLãªã©ïŒãããŠã³ããŒããã ã APT28ã®æå£ã¯æ¥µããŠå·§åŠã§ããããµãŒããŒåŽã§æ¥ç¶å ã®IPã¢ãã¬ã¹ãUser-Agentãæ€èšŒããåæç°å¢ãç¹å®ã®ã¿ãŒã²ãã以å€ã«ã¯æªæããæåãèŠããªãããµãŒããŒãµã€ãåé¿ããæ¡çšããŠãã ããŸãããã«ãŠã§ã¢èªäœãCOMãªããžã§ã¯ããã€ãžã£ããã³ã°ã«ããæ°žç¶åããPNGç»åãžã®ã¹ãã¬ãã°ã©ãã£ã«ããã·ã§ã«ã³ãŒãé èœãªã©ãææ°ã®ã¹ãã«ã¹æè¡ãå€çšãããŠãã ã
- æšå¥šããã察ç (Mitigation):
- 匷å¶çãªåèµ·åãšæŽæ°: Office 2021以éããã³Microsoft 365 Appsã¯èªåçã«ããããé©çšãããããã¢ããªã±ãŒã·ã§ã³ãäžåºŠå®å šã«çµäºããŠåèµ·åããªãéãã察çã¯æå¹ã«ãªããªããOffice 2016/2019ãŠãŒã¶ãŒã¯æåã§ã®æŽæ°ããã°ã©ã é©çšãå¿ é ã§ãã ã
- ã¬ãžã¹ããªã«ããé²åŸ¡: ãããé©çšãå³åº§ã«å°é£ãªå Žåãç¹å®ã®COMãªããžã§ã¯ãïŒCLSID:
{EAB22AC3-30C1-11CF-A7EB-0000C05BAE0B}ïŒã®å®è¡ãç¡å¹åããã¬ãžã¹ããªèšå®ãé©çšããæ»æçµè·¯ã鮿ãã ã - ãããã¯ãŒã¯å±€ã§ã®é®æ: å¢çã«ãŒã¿ãŒã次äžä»£ãã¡ã€ã¢ãŠã©ãŒã«ã«ãããŠãã€ã³ã¿ãŒãããæ¹åãžã®äžå¿ èŠãªWebDAVïŒããŒã80/443çµç±ã®éä¿¡å«ãïŒãç£èŠããããã¯åå鮿ããã
- æ å ±æº:(https://thehackernews.com/2026/02/apt28-uses-microsoft-office-cve-2026.html),(https://www.jpcert.or.jp/wr/2026/wr260204.html,(https://www.jpcert.or.jp/wr/2026/wr260204.html))
🚨 Alert 3: AIã¯ãŒã¯ãããŒèªååããŒã« n8n ã®è匱æ§ãšAIã¬ããã³ã¹ã®åŽ©å£ (CVE-2026-25049)
AIãæ¥åããã»ã¹ã«çµã¿èŸŒãããã®èªååããŒã«ïŒn8nãªã©ïŒãæ®åããäžã§ããããã®ããŒã«èªäœãç¹æš©çãªã¢ã¯ã»ã¹æš©ãæã€ã匱ç¹ããšãªã£ãŠããã
- æŠèŠ (3è¡ãŸãšã): ã¯ãŒã¯ãããŒèªååãã©ãããã©ãŒã n8nã«ãããŠãäžé©åãªå ¥åãµãã¿ã€ãºã«ãããæªèªèšŒã®æ»æè ããªã¢ãŒãã§ã·ã¹ãã ã³ãã³ããå®è¡å¯èœãšãªãè匱æ§ãçºèŠãããããã®ããŒã«ã¯APIããŒãããŒã¿ããŒã¹ã®èªèšŒæ å ±ã管çããŠããããšãå€ãã䟵害ãããå Žåã®åœ±é¿ã¯çµç¹å šäœã«æ³¢åãã ã
- æè¡ç詳现: CVE-2026-25049ã¯ãTypeScriptã®ã³ã³ãã€ã«æåã·ã¹ãã ãšJavaScriptã®å®è¡ææåã®ãã¹ãããã«èµ·å ãããæ»æè ãWebhookãªã©ã®å ¬éãšã³ããã€ã³ããä»ããŠãæååã§ã¯ãªããªããžã§ã¯ããé åãªã©ã®éæååå€ãéä¿¡ããããšã§ãæ¢åã®ãµãã¿ã€ãºåŠçããã€ãã¹ããOSã³ãã³ãã€ã³ãžã§ã¯ã·ã§ã³ãæåããã ã ããã«ãn8nã«ã¯ãã以å€ã«ããGitããŒããéããã³ãã³ãã€ã³ãžã§ã¯ã·ã§ã³ïŒCVE-2026-25053ïŒãããã¡ã€ã«ã¢ã¯ã»ã¹å¶åŸ¡ã®äžåã«ããä»»æã®ãã¡ã€ã«èªã¿åãïŒCVE-2026-25052ïŒãªã©ãè€æ°ã®æ·±å»ãªè匱æ§ãåæã«ç¹å®ãããŠãã ããããã®è匱æ§ãçµã¿åãããããšã§ãæ»æè ã¯AIã¯ãŒã¯ãããŒãä¹ã£åããæ¥ç¶ãããã¯ã©ãŠããµãŒãã¹ãæ©å¯ããŒã¿ãžã®ãã«ã¢ã¯ã»ã¹ãååŸããããšãå¯èœã«ãªãã
- æšå¥šããã察ç (Mitigation):
- è¿ éãªããŒãžã§ã³ã¢ãã: èªç€Ÿã§n8nããã¹ãããŠããå ŽåãçŽã¡ã«ããŒãžã§ã³ 1.123.18ïŒ1.xç³»ïŒãŸã㯠2.4.8ïŒ2.xç³»ïŒãããã㯠2.6.2 以éãžã¢ããããŒããã ã
- é²åºã®å¶é: ã¯ãŒã¯ãããŒãããªã¬ãŒããWebhookãšã³ããã€ã³ãããæ¬åœã«ã€ã³ã¿ãŒãããå šäœã«å ¬éãããŠããå¿ èŠãããã忀èšããIPå¶éãAPIèªèšŒã峿 Œã«é©çšãã ã
- æå°æš©éã®åå: n8nãå®è¡ããŠãããµãŒããŒã®OSæš©éãæå°åããã³ã³ããç°å¢ã§ããã°èªã¿åãå°çšãã¡ã€ã«ã·ã¹ãã ã®äœ¿çšããäžèŠãªãã€ããªïŒcurl, bashãªã©ïŒã®åé€ãæ€èšããã
- æ å ±æº:(https://blog.n8n.io/security-advisory-20260108/),(https://thehackernews.com/2026/02/critical-n8n-flaw-cve-2026-25049.html,(https://thehackernews.com/2026/02/critical-n8n-flaw-cve-2026-25049.html))
ã»ã¯ã·ã§ã³ 3: åœå®¶ã»å°æ¿åŠçè åšãšã°ããŒãã«ã»ãµã€ããŒæŠã®å€å®¹
2026幎2æã®ã»ãã¥ãªãã£ç¶æ³ãçè§£ããããã«ã¯ãåå¥ã®è匱æ§ã ãã§ãªããããããæŠåšåããŠããèåŸã®ã¢ã¯ã¿ãŒãšå°æ¿åŠçãªåæ©ãåæããããšãäžå¯æ¬ ã§ãããä»é±ãæã泚ç®ãã¹ãåãã®äžã€ã¯ãã³ãŒãããŒã ãShadow CampaignsããšåŒã°ããã155ã«åœã®æ¿åºæ©é¢ãæšçãšããå€§èŠæš¡ãªãµã€ããŒã¹ãã€æŽ»åã§ãã ã
1. ãShadow Campaignsããšæ°èè åšã°ã«ãŒã TGR-STA-1030
æ°ãã«è¿œè·¡ãéå§ãããåœå®¶æ¯æŽåã®è åšã°ã«ãŒããTGR-STA-1030ïŒUNC6619ïŒãã¯ããããŸã§ã®APTã°ã«ãŒããšã¯äžç·ãç»ãèŠæš¡ãšã¹ããŒãã§æŽ»åããŠããã圌ãã®ç®çã¯ãã¿ãŒã²ãããšãªã155ã«åœã®æ¿åºã€ã³ãã©ããç¶ç¶çã«ã€ã³ããªãžã§ã³ã¹ãåéããããšã«ããããã®ææ³ã¯æ¥µããŠé«åºŠãªãç°å¢å¯çåïŒLiving-off-the-LandïŒãæè¡ã«äŸåããŠãã ã
åæã«ããã°ããã®ã°ã«ãŒãã¯NGINXãµãŒããŒã®è匱æ§ãèšå®ãã¹ãçªããŠãæ£åœãªãã©ãã£ãã¯ã®äžã«èªèº«ã®æªæãããªãã€ã¬ã¯ããåã蟌ã ãå ·äœçã«ã¯ãã¢ãžã¢è«žåœã®TLDïŒ.in,.id,.peãªã©ïŒãæ¿åºã»æè²æ©é¢ã®ãã¡ã€ã³ïŒ.gov,.eduïŒãéç¹çã«çããBaotaã®ãããªãã¹ãã£ã³ã°ç®¡çããã«ãä»ããŠNGINXã®æ§æãã¡ã€ã«ãæžãæãããããã«ããããŠãŒã¶ãŒã«ã¯æ°ã¥ãããªã圢ã§éä¿¡ãæ»æè ã®C2ãµãŒããŒãžè»¢éããããã§è³æ Œæ å ±ã®çªåããã«ãŠã§ã¢ã®é åžãè¡ã ããã®ææ³ã®æãããã¯ãæ¢åã®ã»ãã¥ãªãã£ããŒã«ããæ£åœãªèšå®å€æŽããšããŠèªèããŠããŸããã¢ã©ãŒããçºçãã«ããç¹ã«ããã
2. äžåœè£œã«ãŒã¿ãŒã»ãšããžããã€ã¹ãçããDKnifeãããŒã«ããã
åæã«ãäžåœè£œã«ãŒã¿ãŒããšããžããã€ã¹ãæšçãšãããDKnifeããšåŒã°ãããã«ãŠã§ã¢ãã¬ãŒã ã¯ãŒã¯ã®æ¡æ£ã確èªãããŠãã ããã®ããŒã«ãããã¯ãããã€ã¹ã®ã«ãŒãã«ã¬ãã«ã§åäœãããã±ãããååã»æ¹ããããèœåãæã€ã泚ç®ãã¹ãã¯ããã®æ»æãäžåœåœå ã®ãŠãŒã¶ãŒããæšçã«å«ãã§ããç¹ã§ãããåœå®¶éã®å¯Ÿç«ã ãã§ãªããåœå ã®ç£èŠãçµ±å¶ããããã¯ãµã€ããŒç¯çœªçµç¹ã«ããã€ã³ãã©ã®ç§ç©åãšããåŽé¢ã匷ãŸã£ãŠããããšã瀺åããŠãã ã
3. ã€ã©ã³èæ¯ã®APT42ã«ãããTAMECATããã£ã³ããŒã³
äžæ±æ å¢ã®ç·è¿«åãèæ¯ã«ãã€ã©ã³ã®è åšã¢ã¯ã¿ãŒAPT42ãæ°ããªPowerShellããŒã¹ã®ããã¯ãã¢ãTAMECATããæå ¥ããŠãã ããã®ããã¯ãã¢ã¯ãGoogle ChromeãMicrosoft Edgeãªã©ã®ãã©ãŠã¶ãããã°ã€ã³è³æ Œæ å ±ãçŽæ¥çªåããããšã«ç¹åããŠãããå€èŠçŽ èªèšŒïŒMFAïŒãçªç Žããããã®ã»ãã·ã§ã³ããŒã¯ã³ã®å¥ªåãç®çãšããŠããã圌ãã¯ç¹ã«é²è¡ããšãã«ã®ãŒãæ¿åºæ©é¢ã®å人ã¢ã«ãŠã³ããçããæšçã®ãã©ã€ããŒããªéä¿¡å 容ãç£èŠããããšã§ãæ¿ç決å®ããã»ã¹ãžã®å¹²æžã詊ã¿ãŠãã ã
ã»ã¯ã·ã§ã³ 4: ã©ã³ãµã ãŠã§ã¢ã»ãšã³ã·ã¹ãã ã®é²åãšè¢«å®³ã®å®æ
2026幎åé ãã©ã³ãµã ãŠã§ã¢æ»æã¯ãããŒã¿ã®æå·åããããçŽç²ãªããŒã¿çªåãšæåïŒExtortion-onlyïŒããžãšããã®ããžãã¹ã¢ãã«ãå®å šã«ã·ããããã€ã€ãããæå·åã«ããã·ã¹ãã 忢ã¯ãããã¯ã¢ããããã®åŸ©æ§ã«ãã£ãŠç¡å¹åããããªã¹ã¯ãããããçªåãããæ©å¯æ å ±ã®å ¬éã¯ãçµç¹ã®ãã©ã³ã䟡å€ãšæ³çç«å Žã«æ°žç¶çãªãã¡ãŒãžãäžããããã§ãã ã
1. BridgePay 決æžãã©ãããã©ãŒã ãžã®æ»æ
ä»é±ãç±³åœã®äž»èŠãªæ±ºæžã²ãŒããŠã§ã€ãããã€ããŒã§ããBridgePayãã©ã³ãµã ãŠã§ã¢æ»æãåããå šç±³èŠæš¡ã§ã«ãŒã決æžãµãŒãã¹ã忢ããäºæ ãçºçãã ããã®æ»æã¯ãééçæå®³ã ãã§ãªãã瀟äŒã€ã³ãã©ãšããŠã®æ±ºæžæ©èœããµã€ããŒæ»æã«ãã£ãŠå®¹æã«éº»çºããããšãåèªèããããæ»æè ã¯ISPsystemã®ä»®æ³ãã·ã³ãæªçšããŠãã€ããŒããé èœããã¹ãã«ã¹æ§ãç¶æããªãããããã¯ãŒã¯å ã§æšªå±éãè¡ã£ãŠããããšãåãã£ãŠãã ã
2. 泚ç®ãã¹ãã©ã³ãµã ãŠã§ã¢ã»ã°ã«ãŒãã®æŽ»å
2026幎1æã ãã§ãã91ä»¶ã®å ¬éãããã©ã³ãµã ãŠã§ã¢æ»æãèšé²ãããŠãã ãäž»èŠãªãã¬ã€ã€ãŒã®ååã¯ä»¥äžã®éãã§ããã
- Qilin: æã掻çºãªã°ã«ãŒãã®äžã€ã§ããã1æã ãã§8ä»¶ã®é倧ãªã€ã³ã·ãã³ãã«é¢äžããŠãã ã
- INC Ransomware: æ³åŸäºåæïŒHawk Law Group, Eisenberg LowranceçïŒãéç¹çã«çãã蚎èšããŒã¿ãå人æ å ±ãçªåããŠãã ã
- Play: è£œé æ¥ïŒDeatakïŒãåäŸåãã¢ãã¬ã«ïŒEsquire BrandsïŒãæšçã«ãã絊äžããŒã¿ãè²¡åæ å ±ãããŒã¯ãŠã§ãã«å ¬éãããšè è¿«ããŠãã ã
- ShadowSyndicate: è€æ°ã®ã©ã³ãµã ãŠã§ã¢ã¢ãã£ãªãšã€ãã«ã€ã³ãã©ãæäŸããããµãŒãã¹ãããã€ããŒããšããŠã®æŽ»åãæ¡å€§ããŠãããæ°ããªSSHãã£ã³ã¬ãŒããªã³ãã«ãããµãŒããŒçŸ€ã®é£çµã確èªãããŠãã ã
3. Ransomware-as-a-Service (RaaS) ã®å€å
æ»æè ã¯çŸåšãAIãæŽ»çšããŠãã£ãã·ã³ã°ã¡ãŒã«ãããŒãœãã©ã€ãºããæåçãåçã«åäžãããŠãã ããŸããVMware ESXiã®è匱æ§ïŒCVE-2025-22225ïŒãçªããããŒã«ããããäžåœèªåã®ãã©ãŒã©ã ã§ååŒãããŠãããä»®æ³åç°å¢ãçŽæ¥æ»æããŠãæ°çŸå°ã®ãµãŒããŒãäžæ¬ã§äŸµå®³ããææ³ãæšæºåããŠãã ãããã¯ãåäžã®PCãçãåŸæ¥åã®ææ³ãããããŒã¿ã»ã³ã¿ãŒå šäœãã人質ãã«åãæŠç¥ãžã®ç§»è¡ãæå³ããŠããã
ã»ã¯ã·ã§ã³ 5: äŸçµŠç¶²ïŒãµãã©ã€ãã§ãŒã³ïŒã®ä¿¡é Œæ§åŽ©å£
ä¿¡é Œã®é£éãçªããµãã©ã€ãã§ãŒã³æ»æã¯ããã¯ãäŸå€ã§ã¯ãªããçŸä»£ã®ãµã€ããŒæŠã«ãããäž»èŠãªæŠè¡ãšãªã£ãŠããã
1. eScan ã¢ã³ããŠã€ã«ã¹ã«ãããã«ãŠã§ã¢é ä¿¡
ä»é±ãã»ãã¥ãªãã£æ¥çã«è¡æãäžããã®ã¯ãã¢ã³ããŠã€ã«ã¹ãœãããeScanãã®æ£èŠã¢ããããŒãã€ã³ãã©ãæªçšãããäžçäžã®ãŠãŒã¶ãŒã«ãã«ãŠã§ã¢ãé
ä¿¡ãããäºä»¶ã§ãã ãæ»æè
ã¯eScanã®ã¢ããããŒãã¡ã«ããºã ã䟵害ããReload.exe ãšããæªæãããã¡ã€ã«ãé
åžããããã®ãã¡ã€ã«ã¯ãã·ã¹ãã ã®HOSTSãã¡ã€ã«ãæžãæããŠèªåæŽæ°ã忢ãããæ°žç¶æ§ã確ä¿ããäžã§ããããªããã€ããŒããããŠã³ããŒããã倿®µéã®ææãã§ãŒã³ãéå§ãã ãã»ãã¥ãªãã£ãå®ãããã®ããŒã«ãæ»æã®æŠåšã«ãªããšããããã©ããã¯ã¹çãªè
åšãçŸå®ãšãªã£ãŠããã
2. Notepad++ ã®ãã¹ãã£ã³ã°ã€ã³ãã©äŸµå®³
人æ°ã®ããã³ãŒããšãã£ã¿ãNotepad++ãããŸãããã¹ãã£ã³ã°ãããã€ããŒã¬ãã«ã§ã®äŸµå®³ãåããã¢ããããŒããã©ãã£ãã¯ãæ»æè ã®ç®¡çããåœãµã€ããžãªãã€ã¬ã¯ããããäºæ ãçºçãã ãéçºè ãé »ç¹ã«äœ¿çšããããŒã«ãçãããããšã§ãçµç¹ã®æãéèŠãªè³ç£ã§ããããœãŒã¹ã³ãŒããããéçºç°å¢ããçŽæ¥çãªå±éºã«æãããŠããã
3. GitHub Codespaces ãšéçºç°å¢ã®è匱æ§
GitHub Codespacesã«ãããæªæããã³ãã³ãã®å®è¡ïŒRCEïŒãå¯èœã«ããè匱æ§ãå ±åãããŠãããã¯ã©ãŠãããŒã¹ã®éçºç°å¢ãæ°ããªã¢ã¿ãã¯ãµãŒãã§ã¹ãšããŠæµ®äžããŠãã ãGitHubã®ãããªãã©ãããã©ãŒã ãæäŸããããã©ã«ãã®å©äŸ¿æ§ããé©åãªæ§æç®¡çãæ ã£ãçµç¹ã«ãããŠã¯èŽåœçãªäŸµå ¥å£ãšãªãã
ã»ã¯ã·ã§ã³ 6: ã€ã³ãã©ç®¡çã®ãã©ãã€ã ã·ãã – CISA BOD 26-02 ã®æ·±å±€
ãµã€ããŒã»ãã¥ãªãã£ã»ã€ã³ãã©ã»ãã¥ãªãã£åºïŒCISAïŒã2026幎2æã«çºåºãããBinding Operational Directive 26-02 (BOD 26-02)ãã¯ãçµç¹ã®ã€ã³ãã©ç®¡çã«å¯Ÿããèãæ¹ãæ ¹æ¬ããå€ããããšãèŠæ±ããŠãã ã
1. ãµããŒãçµäºïŒEOSïŒããã€ã¹ã®ãå µåšåã
CISAã®èŠåã«ããã°ãã«ãŒã¿ãŒããã¡ã€ã¢ãŠã©ãŒã«ããããã¯ãŒã¯ã¹ã€ãããªã©ã®ãšããžããã€ã¹ã«ãããŠã補é å ã®ãµããŒããçµäºããæ©åšãæŸçœ®ãããŠããããšããåœå®¶èŠæš¡ã®ãµã€ããŒãªã¹ã¯ãšãªã£ãŠããããããã®ããã€ã¹ã¯ãæ°ããªè匱æ§ãçºèŠãããŠãããããæäŸãããªããããæ»æè ã«ãšã£ãŠã¯ãæ°žä¹ çãªããã¯ãã¢ããšããŠæ©èœãã ãBOD 26-02ã¯ãé£éŠæ¿åºæ©é¢ã«å¯ŸããŠãããã®æ©åšãç¹å®ããéããã«ãããã¯ãŒã¯ããæé€ããããšãåœããŠããã
2. éµå®ã¿ã€ã ã©ã€ã³ãšèŠä»¶
| ãã§ãŒãº | æé | å¿ é ã¢ã¯ã·ã§ã³ |
| ãã§ãŒãº 1 | 峿 | EOSãœãããŠã§ã¢ãå®è¡ããŠããããã¢ããããŒããå¯èœãªããã€ã¹ãžã®ãããé©çšã |
| ãã§ãŒãº 2 | 3ã¶æä»¥å | CISAã®EOSãªã¹ãã«åºã¥ããå šããã€ã¹ã®å®å šãªã€ã³ãã³ããªïŒæ£åžãïŒãå®äºã |
| ãã§ãŒãº 3 | 12ã¶æä»¥å | æä»€çºä»€åã«EOSã«éããŠãããã¹ãŠã®ããã€ã¹ããããã¯ãŒã¯ããåãé¢ãã |
| ãã§ãŒãº 4 | 18ã¶æä»¥å | ãã¹ãŠã®EOSãšããžããã€ã¹ãããµããŒãå¯Ÿè±¡ã®ææ°æ©åšã«äº€æå®äºã |
| ãã§ãŒãº 5 | 24ã¶æä»¥å | ç¶ç¶çãªè³ç£çºèŠããã»ã¹ã確ç«ããEOSæ¥è¿ãèªåæ€ç¥ããäœå¶ã®æ§ç¯ã |
3. æ°éçµç¹ãžã®ã€ã³ããªã±ãŒã·ã§ã³
ãã®æä»€ã¯ç±³é£éŠæ¿åºæ©é¢ã察象ãšãããã®ã ããCISAã¯ãã¹ãŠã®éèŠã€ã³ãã©çµç¹ããã³æ°éäŒæ¥ã«å¯ŸããŠãããã®åºæºã«åŸãããšãåŒ·ãæšå¥šããŠãã ãç¹ã«ãµãã©ã€ãã§ãŒã³ã®å¥å šæ§ãéèŠããã°ããŒãã«äŒæ¥ã«ãããŠã¯ãååŒå éžå®ã®åºæºãšããŠãEOSããã€ã¹ã®æé€ããçã蟌ãŸããããšãäºæ³ãããã
ã»ã¯ã·ã§ã³ 7: AIæè¡ã®é²åãšãµã€ããŒè åšã®äº€å·®
2026幎ã¯ãAIãã»ãã¥ãªãã£ã®ãè£å©ããŒã«ããããæŠå Žãã®ãã®ããžãšé²åãã幎ãšããŠèšæ¶ãããã ããã
1. AIé§ååè©æ¬ºã®ççºçå¢å
Pindropã®å ±åã«ããã°ãAIãå©çšããé³å£°ããã³ããŒãã£ã«äŒè°è©æ¬ºã¯ãå幎æ¯ã§1210%å¢å ããŠãã ãDeepfakeæè¡ã¯ãã¯ããå°éç¥èããªããŠãã¯ã©ãŠãäžã®ãµãŒãã¹ã§å®äŸ¡ã«å©çšå¯èœã§ãããCFOãCEOã®å£°ãå®ç§ã«æš¡å£ããŠäžæ£ééãæç€ºãããCEOè©æ¬º 2.0ããæšªè¡ããŠãããããã«ãAIã¯ãã£ãã·ã³ã°ã¡ãŒã«ã®æé¢ãé©ç°çãªç²ŸåºŠã§ã¿ãŒã²ããã®èšèªã圹è·ã«åãããŠæé©åããŠããã人éã«ããæ€ç¥ã¯ã»ãŒäžå¯èœã«ãªãã€ã€ãã ã
2. AIãšãŒãžã§ã³ããšãã©ãŠã¶æ»æ
çŸä»£ã®æ»æã¯ããã©ãŠã¶ã®å éšã§å®çµããåŸåã匷ããŠãããEDRãSASEãªã©ã®åŸæ¥ã®ã»ãã¥ãªãã£ããŒã«ã¯ããã©ãŠã¶å éšã§ã®äžå¯©ãªæäœïŒJavaScriptã®å®è¡ãDOMã®æ¹ãããAIãšãŒãžã§ã³ãã«ããèªåæäœïŒãæ€ç¥ããããªãããšãå€ã ãæ»æè ã¯ãAIãã©ãŠã¶ãšã¯ã¹ããã€ãããé§äœ¿ãããã©ãŠã¶ããæ»æè ããã®ãã®ã«å€è²ãããããšã§ãçµç¹ã®èªèšŒãå éšããç¡å¹åãã ã
3. é²åŸ¡åŽã«ãããAIã®æŽ»çš
äžæ¹ã§ãé²åŸ¡åŽãAIãç©æ¥µçã«åãå ¥ããŠãããHakimoãªã©ã®ã¹ã¿ãŒãã¢ããã¯ãAIãçšããç©çã»ãã¥ãªãã£ç£èŠïŒç£èŠã«ã¡ã©ã®èªç¶èšèªæ€çŽ¢ãªã©ïŒãå°å ¥ããç©çãšããžã¿ã«ã®èåãå³ã£ãŠãã ããŸããAnthropicã®ææ°ã¢ãã«ãClaude Opus 4.6ãã¯ãæ°å幎åã®å€ãã³ãŒãããŒã¹ããèªåŸçã«æ·±å»ãªè匱æ§ãç¹å®ããèœåã瀺ããŠããããããäœæã®èªååã«é©åœãèµ·ããå¯èœæ§ãããäžæ¹ã§ãæ»æè ã«ãšã£ãŠãè匱æ§çºèŠã®åŒ·åãªæŠåšãšãªã£ãŠãã ã
Section 3: CISO/Manager Summary
2026幎2æç¬¬1é±ã®ã€ã³ããªãžã§ã³ã¹ã«åºã¥ããçµç¹ã®æå¿æ±ºå®è ãçŽã¡ã«åãçµãã¹ãæŠç¥çã¢ã¯ã·ã§ã³ãæèšããã
- ä»é±ã®ããŒã¯ãŒã: ãErosion of Trust (ä¿¡é Œã®åŽ©å£)ã
- 管çè
ãžã®æèš:
- ãšããžã»ã¬ããã³ã¹ã®åå®çŸ©: å¢çé²åŸ¡ïŒãã¡ã€ã¢ãŠã©ãŒã«ãVPNïŒã¯ãã¯ãçµç¹ã®ãçŸãã§ã¯ãªããæãæšçãšããããã¢ãã¬ã¹è ±ãã§ãããCISA BOD 26-02ãåèã«ãEOSããã€ã¹ã®å³ææé€ãšã管çã€ã³ã¿ãŒãã§ãŒã¹ã®ã€ã³ã¿ãŒãããé²åºã®å®å šæ€å»ãæåªå 課é¡ãšããŠèšå®ãã¹ãã§ãã ã
- SSOããã³ID管çã®åèšèš: Fortinetã®è匱æ§ã¯ãSSOãåäžé害ç¹ïŒSingle Point of FailureïŒã«ãªããªã¹ã¯ãé²åããããèªèšŒåºç€èªäœã®å¥å šæ§ãç£èŠããå°çšã®ãã°ç£èŠã«ãŒã«ïŒSIEMçžé¢åæïŒãå°å ¥ããç¹ã«ã管çè æš©éã«ããSSOãã€ãã¹ãããªã¢ã«ã¿ã€ã ã§æ€ç¥ã§ããäœå¶ãæ§ç¯ãã ã
- ãAIãã€ãã£ãããªã€ã³ã·ãã³ã察å¿ãžã®ç§»è¡: 1210%ãšããè©æ¬ºå¢å çã¯ããããŸã§ã®ãã¬ãŒãã³ã°ãéçšããªãããšã瀺ããŠãããé³å£°ã»æ åã®çåœãæè¡çã«æ€èšŒããããŒã«ã®å°å ¥ããééç§»åãéèŠèšå®å€æŽã«ããããã¢ããã°ãªå€é確èªããã»ã¹ãã®åæ§ç¯ãå¿ èŠã§ãã ã
- 1-dayæ»æãžã®èæ§åŒ·å: ãããå ¬éãã24æé以å ã«æ»æãéå§ãããçŸç¶ã§ã¯ã人æã«ãããããé©çšå€æã¯é ããããèªåãããé©çšãå¯èœãªé åã®æ¡å€§ãšãAIèªååããŒã«ïŒn8nçïŒãå°å ¥ããéã®å³æ Œãªç¹æš©ã¢ã¯ã»ã¹ç®¡çïŒPAMïŒã®åŸ¹åºãæ±ãã ã
- ãµãã©ã€ãã§ãŒã³ã®å¯èŠ³æž¬æ§åäž: å©çšããŠãããœãããŠã§ã¢ã®ãã«ãããã»ã¹ãã¢ããããŒãã¡ã«ããºã ã®å®å šæ§ããã³ããŒã«ç¢ºèªããäžãäžã®äŸµå®³ïŒeScanãNotepad++ã®ãããªäºæ¡ïŒã«åããç¹å®ã®ãœãããŠã§ã¢ã®å šç€Ÿçãªãããã¯ãŒã¯éä¿¡ãå³åº§ã«éé¢ã§ãããã»ã°ã¡ã³ããŒã·ã§ã³ããå®è£ ãã ã
2026幎ã®ãµã€ããŒã»ãã¥ãªãã£ã¯ãåãªãæè¡çãªèª²é¡ã§ã¯ãªããçµç¹ã®ã¬ãžãªãšã³ã¹ïŒå埩åïŒãšããžãã¹ç¶ç¶æ§ãå·Šå³ããçµå¶ã®æ žå¿äºé ã§ãããæ¬ã¬ããŒãã«ç€ºãããåè åšã¯ãäºãã«é£åããçµç¹ã®æã匱ãéšåãå·æã«çã£ãŠãããç¶ç¶çãªã€ã³ããªãžã§ã³ã¹ã®åéãšãããã«åºã¥ãè¿ éãªæŠè¡ç倿Žããããå¯äžã®å¯Ÿæææ®µã§ããã


ã³ã¡ã³ã