{"blog_title":"TT Malware Log","image_url":null,"url":"https://malware-log.hatenablog.com/entry/2022/02/16/000000_16","author_name":"tanigawa","author_url":"https://blog.hatena.ne.jp/tanigawa/","height":"190","provider_url":"https://hatena.blog","provider_name":"Hatena Blog","categories":["\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u95a2: CISA (\u7c73\u56fd)","\u696d\u7a2e: \u9632\u885b","\u56fd: \u30ed\u30b7\u30a2","*\u30b5\u30a4\u30d0\u30fc\u653b\u6483 / \u4e0d\u6b63\u30a2\u30af\u30bb\u30b9 / Cyber Attack","*\u6ce8\u610f\u559a\u8d77"],"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fmalware-log.hatenablog.com%2Fentry%2F2022%2F02%2F16%2F000000_16\" title=\"Alert (AA22-047A) Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology - TT Malware Log\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","published":"2022-02-16 00:00:00","type":"rich","title":"Alert (AA22-047A) Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology","width":"100%","description":"\u3010\u516c\u958b\u60c5\u5831\u3011 \u25c6Alert (AA22-047A) Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology (CISA, 2022/02/16) [\u30ed\u30b7\u30a2\u306e\u56fd\u5bb6\u652f\u63f4\u306b\u3088\u308b\u30b5\u30a4\u30d0\u30fc\u884c\u70ba\u8005\u304c\u3001\u30af\u30ea\u30a2\u3055\u308c\u305f\u9632\u885b\u95a2\u9023\u4f01\u696d\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3092\u6a19\u7684\u306b\u3001\u7c73\u56fd\u306e\u6a5f\u5bc6\u60c5\u5831\u304a\u3088\u3073\u6280\u8853\u3092\u53d6\u5f97] https://www.cisa.gov/uscert/ncas/alerts/aa22-047a","blog_url":"https://malware-log.hatenablog.com/","version":"1.0"}