{"author_name":"tanigawa","blog_title":"TT Malware Log","provider_name":"Hatena Blog","blog_url":"https://malware-log.hatenablog.com/","published":"2021-10-28 06:00:00","description":"\u3010\u8981\u70b9\u3011 \u25ce2021/05/07\u306b\u3001\u7c73\u56fd\u306e\u77f3\u6cb9\u30d1\u30a4\u30d7\u30e9\u30a4\u30f3\u6700\u5927\u624b\u306e\u30b3\u30ed\u30cb\u30a2\u30eb\u30fb\u30d1\u30a4\u30d7\u30e9\u30a4\u30f3\u304c\u3001\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306b\u3088\u308b\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u3092\u3046\u3051\u3001\u30b7\u30b9\u30c6\u30e0\u304c\u505c\u6b62\u3057\u305f\u3002\u653b\u6483\u7d44\u7e54\u306fDarkSide \u3010\u76ee\u6b21\u3011 \u6982\u8981 \u3010\u8f9e\u66f8\u3011 \u3010\u6982\u8981\u3011 \u3010\u6700\u65b0\u60c5\u5831\u3011 \u8a18\u4e8b \u3010\u30cb\u30e5\u30fc\u30b9\u3011 \u3010\u516c\u958b\u60c5\u5831\u3011 \u3010\u95a2\u9023\u60c5\u5831\u3011 \u95a2\u9023\u60c5\u5831 \u6982\u8981 \u3010\u8f9e\u66f8\u3011 \u25c6Colonial Pipeline (Wikipedia) https://en.wikipedia.org/wiki/Colonial_Pipeline \u3010\u6982\u8981\u3011 \u9805\u76ee \u5185\u5bb9 \u88ab\u5bb3\u7d44\u7e54 Colonial Pipeline (\u7c73\u56fd) \u88ab\u5bb3\u72b6\u6cc1 \u30d1\u30a4\u30d7\u30e9\u30a4\u30f3\u505c\u6b62 \u653b\u6483\u65e5\u6642 2021/05/07\u2026","title":"\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8: \u30b3\u30ed\u30cb\u30a2\u30eb\u30fb\u30d1\u30a4\u30d7\u30e9\u30a4\u30f3 (\u307e\u3068\u3081)","version":"1.0","height":"190","image_url":null,"width":"100%","type":"rich","url":"https://malware-log.hatenablog.com/entry/Incident_Colonial","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fmalware-log.hatenablog.com%2Fentry%2FIncident_Colonial\" title=\"\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8: \u30b3\u30ed\u30cb\u30a2\u30eb\u30fb\u30d1\u30a4\u30d7\u30e9\u30a4\u30f3 (\u307e\u3068\u3081) - TT Malware Log\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","categories":["\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8: \u30b3\u30ed\u30cb\u30a2\u30eb\u30fb\u30d1\u30a4\u30d7\u30e9\u30a4\u30f3 / Colonial Pipeline","**\u30b5\u30a4\u30d0\u30fc\u653b\u6483 / \u4e0d\u6b63\u30a2\u30af\u30bb\u30b9 / Cyber Attack","**\u30de\u30eb\u30a6\u30a7\u30a2\u7a2e\u5225: \u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2 / Ransomware","\u91cd\u8981\u30a4\u30f3\u30d5\u30e9: \u77f3\u6cb9","Ransomware: DarkSide","**\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8(\u307e\u3068\u3081)"],"provider_url":"https://hatena.blog","author_url":"https://blog.hatena.ne.jp/tanigawa/"}