ICS関連のセキュリティインシデント対応に備えて - 製造業を例に対応体制の整備上の課題と対策の第一歩を解説 -
Common Information
Type | Value |
---|---|
UUID | 1c0b1d34-53a6-4f4f-b723-3c4cc6dd02be |
Fingerprint | 7c4c219c0d859f55f223a7a7b711177a955fc9093aa70d597c4f983ecca3c7d8 |
Analysis status | DONE |
Considered CTI value | 1 |
Text language | |
Published | Jan. 26, 2024, 11:59 a.m. |
Added to db | June 2, 2024, 10:56 a.m. |
Last updated | Aug. 31, 2024, 7:15 a.m. |
Headline | ICS関連のセキュリティインシデント対応に備えて - 製造業を例に対応体制の整備上の課題と対策の第一歩を解説 - |
Title | ICS関連のセキュリティインシデント対応に備えて - 製造業を例に対応体制の整備上の課題と対策の第一歩を解説 - |
Detected Hints/Tags/Attributes | 22/2/28 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://www.jpcert.or.jp/present/2024/ICSR2024_06_JPCERTCC.pdf |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 11 | jpcert.or.jp |
|
Details | Domain | 26 | www.jpcert.or.jp |
|
Details | Domain | 4 | collaborate.mitre.org |
|
Details | 7 | email=office@jpcert.or.jp |
||
Details | 1 | icsr@jpcert.or.jp |
||
Details | File | 1 | 20110210-oguma.pdf |
|
Details | File | 3 | lagebericht2014.pdf |
|
Details | File | 1 | 170620.html |
|
Details | File | 1205 | index.php |
|
Details | File | 2 | r04_kami_cyber_jousei.pdf |
|
Details | File | 1 | r05_kami_cyber_jousei.pdf |
|
Details | File | 2 | sektorcert-the-attack-against-danish-critical-infrastructure-tlp-clear.pdf |
|
Details | File | 6 | lun.vbs |
|
Details | File | 6 | n.bat |
|
Details | File | 6 | s1.txt |
|
Details | File | 9 | scilc.exe |
|
Details | md5 | 2 | e48385e382d2e5d17821a5e1d8e4c86b |
|
Details | Url | 1 | https://www.jpcert.or.jp/ics/2011/20110210-oguma.pdf |
|
Details | Url | 1 | https://www.bsi.bund.de/shareddocs/downloads/de/bsi/publikationen/lageberichte/lagebericht2014.pdf?__blob=publicationfile&v=2 |
|
Details | Url | 1 | https://eset-info.canon-its.jp/malware_info/trend/detail/170620.html |
|
Details | Url | 1 | https://www.mandiant.com/resources/blog/attackers-deploy-new-ics-attack-framework-triton |
|
Details | Url | 1 | https://collaborate.mitre.org/attackics/index.php/main_page |
|
Details | Url | 1 | https://www.npa.go.jp/publications/statistics/cybersecurity/data/r04_kami_cyber_jousei.pdf |
|
Details | Url | 1 | https://www.npa.go.jp/publications/statistics/cybersecurity/data/r05_kami_cyber_jousei.pdf |
|
Details | Url | 6 | https://www.mandiant.com/resources/blog/sandworm-disrupts-power-ukraine-operational-technology |
|
Details | Url | 1 | https://www.mandiant.jp/resources/blog/sandworm-disrupts-power-ukraine-operational-technology |
|
Details | Url | 1 | https://dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com/external/sektorcert-the-attack-against-danish-critical-infrastructure-tlp-clear.pdf |
|
Details | Url | 1 | https://www.waterisac.org/portal/tlpclear-water-utility-control-system-cyber-incident-advisory-icsscada- |