{"author_url":"https://blog.hatena.ne.jp/tanigawa/","blog_title":"TT Malware Log","published":"2013-09-03 00:00:00","description":"\u51fa\u5178: https://securelist.com/nettraveler-is-back-the-red-star-apt-returns-with-new-tricks/57455/ \u3010\u6982\u8981\u3011 \u653b\u6483\u7a2e\u5225 APT(\u6a19\u7684\u578b\u653b\u6483) \u7d44\u7e54\u540d APT21, NetTraveler \u653b\u6483\u4f5c\u6226\u540d NetTraveler, Travnet, Netfile \u4f7f\u7528\u8106\u5f31\u6027 CVE-2012-0158, CVE-2013-2465(Java) \u653b\u6483\u65b9\u6cd5 \u6a19\u7684\u578b\u653b\u6483\u30e1\u30fc\u30eb(\u30b9\u30d4\u30a2\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30e1\u30fc\u30eb), \u6c34\u98f2\u307f\u5834\u578b\u653b\u6483 \u30de\u30eb\u30a6\u30a7\u30a2\u540d NetTraveler(Kaspersky), Travnet(Symantec\u2026","author_name":"tanigawa","provider_url":"https://hatena.blog","categories":["\u653b\u6483\u7d44\u7e54: APT21 / NetTraveler","Operation: NetTraveler","CVE-2013-2465","CVE-2012-0158","\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4f01\u696d: Kaspersky","\u653b\u6483\u624b\u6cd5: \u6c34\u98f2\u307f\u5834\u578b\u653b\u6483 / Watering Hole Attack","Malware: NetTraveler / Travnet / Netfile"],"image_url":"https://cdn-ak.f.st-hatena.com/images/fotolife/t/tanigawa/20180505/20180505102942.png","type":"rich","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fmalware-log.hatenablog.com%2Fentry%2F2013%2F09%2F03%2F000000_2\" title=\"NetTraveler Is Back: The \u2018Red Star\u2019 APT Returns With New Tricks - TT Malware Log\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","height":"190","url":"https://malware-log.hatenablog.com/entry/2013/09/03/000000_2","provider_name":"Hatena Blog","title":"NetTraveler Is Back: The \u2018Red Star\u2019 APT Returns With New Tricks","blog_url":"https://malware-log.hatenablog.com/","width":"100%","version":"1.0"}