{"description":"\u6982\u8981 \u3010\u8f9e\u5178\u3011 \u25c6PKPLUG (UNIT42(PLAYBOOK VIEWER)) https://pan-unit42.github.io/playbook_viewer/?pb=pkplug \u8a18\u4e8b \u3010\u30d6\u30ed\u30b0\u3011 \u25c6PKPLUG: \u6771\u5357\u30a2\u30b8\u30a2\u3092\u72d9\u3044\u7d9a\u3051\u308b\u4e2d\u56fd\u306e\u653b\u6483\u30b0\u30eb\u30fc\u30d7\u306e\u8ffd\u8de1 (Paloalto, 2019/10/08 20:25) https://unit42.paloaltonetworks.jp/pkplug_chinese_cyber_espionage_group_attacking_asia/ \u21d2 https://malware-log.hatenablog.com/entry/\u2026","blog_url":"https://malware-log.hatenablog.com/","blog_title":"TT Malware Log","title":"PKPLUG (\u307e\u3068\u3081)","width":"100%","height":"190","provider_url":"https://hatena.blog","type":"rich","url":"https://malware-log.hatenablog.com/entry/PKPLUG","version":"1.0","provider_name":"Hatena Blog","published":"2019-10-08 00:00:00","categories":["\u653b\u6483\u7d44\u7e54: PKPLUG","**\u653b\u6483\u7d44\u7e54 / \u8105\u5a01\u30a2\u30af\u30bf\u30fc (\u307e\u3068\u3081)","***\u307e\u3068\u3081"],"author_name":"tanigawa","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fmalware-log.hatenablog.com%2Fentry%2FPKPLUG\" title=\"PKPLUG (\u307e\u3068\u3081) - TT Malware Log\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","image_url":"https://cdn-ak.f.st-hatena.com/images/fotolife/t/tanigawa/20191014/20191014204549.png","author_url":"https://blog.hatena.ne.jp/tanigawa/"}