{"id":111795,"date":"2017-06-27T13:15:34","date_gmt":"2017-06-27T20:15:34","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=111795"},"modified":"2020-05-21T19:51:42","modified_gmt":"2020-05-22T02:51:42","slug":"palo-alto-networks-protections-petya-ransomware","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2017\/06\/palo-alto-networks-protections-petya-ransomware\/?lang=ja","title":{"rendered":"Palo Alto Networks Petya \u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u653b\u6483\u306b\u5bfe\u3059\u308b\u30d7\u30ed\u30c6\u30af\u30b7\u30e7\u30f3"},"content":{"rendered":"<h3><b>\u4f55\u304c\u8d77\u3053\u3063\u305f\u304b\uff1a<\/b><\/h3>\n<p>2017 \u5e74 6 \u6708 27 \u65e5\u3001Petya \u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306f\u3001\u653f\u5e9c\u3084\u91cd\u8981\u30a4\u30f3\u30d5\u30e9\u30b9\u30c8\u30e9\u30af\u30c1\u30e3\u306e\u30aa\u30da\u30ec\u30fc\u30bf\u3092\u542b\u3080\u8907\u6570\u306e\u7d44\u7e54\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u59cb\u3081\u307e\u3057\u305f\u3002\u3053\u306e\u653b\u6483\u306f\u30012017 \u5e74 5 \u6708\u306e WanaCrypt0r \/ WanaCry \u653b\u6483\u3068\u540c\u69d8\u306e\u65b9\u6cd5\u3067\u5e83\u304c\u3063\u3066\u3044\u308b\u3088\u3046\u3067\u3001ETERNALBLUE \u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u30c4\u30fc\u30eb\u3092\u4f7f\u7528\u3057\u3066 Microsoft Windows SMB \u30d7\u30ed\u30c8\u30b3\u30eb\u7d4c\u7531\u3067\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3092\u901a\u904e\u3059\u308b\u53ef\u80fd\u6027\u304c\u9ad8\u3044\u3068\u601d\u308f\u308c\u307e\u3059\u3002 Palo Alto Networks \u306e\u304a\u5ba2\u69d8\u306f\u3001\u6b21\u4e16\u4ee3\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306e\u8907\u6570\u306e\u8981\u7d20\u306b\u308f\u305f\u3063\u3066\u4f5c\u6210\u3001\u914d\u4fe1\u3001\u65bd\u884c\u3055\u308c\u305f\u4fdd\u8b77\u6a5f\u80fd\u306b\u3088\u308a\u3001Petya \u306b\u3088\u308b\u653b\u6483\u304b\u3089\u81ea\u52d5\u7684\u306b\u4fdd\u8b77\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<h3><b>\u3069\u3046\u3084\u3063\u3066\u653b\u6483\u3055\u308c\u308b\u306e\u304b\uff1a<\/b><\/h3>\n<p>\u521d\u671f\u306e\u611f\u67d3\u7d4c\u8def\u306f\u4e0d\u660e\u3067\u3059\u304c\u3001Petya \u306f Microsoft Windows \u30b7\u30b9\u30c6\u30e0\u3067 ETERNALBLUE \u306e\u8106\u5f31\u6027 (CVE-2017-0144) \u3092\u60aa\u7528\u3057\u3066 SMB \u30d7\u30ed\u30c8\u30b3\u30eb\u3092\u4f7f\u7528\u3057\u3066\u4ed6\u306e\u30db\u30b9\u30c8\u306b\u5e83\u304c\u308a\u3088\u3046\u3068\u3057\u307e\u3059\u3002\u3053\u306e\u8106\u5f31\u6027\u306f\u30012017 \u5e74 4 \u6708\u306b Shadow Brokers \u30b0\u30eb\u30fc\u30d7\u306b\u3088\u3063\u3066\u516c\u958b\u3055\u308c\u30012017 \u5e74 3 \u6708\u306b<a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms17-010.aspx\" target=\"_blank\" rel=\"noopener noreferrer\" data-page-track=\"true\" data-page-track-value=\"company:palo-alto-networks-protections-petya-ransomware: section:\u3069\u3046\u3084\u3063\u3066\u653b\u6483\u3055\u308c\u308b\u306e\u304b\uff1a:ms17-010\">MS17-010<\/a>\u00a0\u3067 Microsoft \u306b\u3088\u3063\u3066\u89e3\u6c7a\u3055\u308c\u307e\u3057\u305f\u3002\u611f\u67d3\u304c\u6210\u529f\u3059\u308b\u3068\u3001\u30de\u30eb\u30a6\u30a7\u30a2\u306f\u30e6\u30fc\u30b6\u30fc\u306e\u30b7\u30b9\u30c6\u30e0\u3092\u6697\u53f7\u5316\u3057\u3001\u30a2\u30af\u30bb\u30b9\u3092\u8fd4\u3059\u305f\u3081\u306b300 \u30c9\u30eb\u306e\u652f\u6255\u3044\u3092\u8981\u6c42\u3057\u307e\u3059\u3002 Petya \u653b\u6483\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u306e\u8a73\u7d30\u306a\u5206\u6790\u306b\u3064\u3044\u3066\u306f\u3001<a href=\"https:\/\/unit42.paloaltonetworks.jp\/unit42-threat-brief-petya-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-page-track=\"true\" data-page-track-value=\"company:palo-alto-networks-protections-petya-ransomware: section:\u3069\u3046\u3084\u3063\u3066\u653b\u6483\u3055\u308c\u308b\u306e\u304b\uff1a:unit42\u306e\u8105\u5a01\u30ea\u30b5\u30fc\u30c1\u30c1\u30fc\u30e0\u306e\u30d6\u30ed\u30b0\">Unit42\u306e\u8105\u5a01\u30ea\u30b5\u30fc\u30c1\u30c1\u30fc\u30e0\u306e\u30d6\u30ed\u30b0<\/a>\u3092\u53c2\u7167\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n<h3><b>\u963b\u6b62\uff1a<\/b><\/h3>\n<p>\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306e\u304a\u5ba2\u69d8\u306f\u3001\u653b\u6483\u30e9\u30a4\u30d5\u30b5\u30a4\u30af\u30eb\u5168\u4f53\u306b\u308f\u305f\u308b\u8105\u5a01\u3092\u81ea\u52d5\u7684\u306b\u963b\u6b62\u3059\u308b\u4fb5\u5bb3\u9632\u6b62\u30d9\u30fc\u30b9\u306e\u30a2\u30d7\u30ed\u30fc\u30c1\u3092\u63a1\u7528\u3057\u305f\u6b21\u4e16\u4ee3\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3092\u901a\u3058\u3066\u4fdd\u8b77\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<ul>\n<li><b>WildFire<\/b>\u00a0\u306f\u3059\u3079\u3066\u306e\u65e2\u77e5\u30b5\u30f3\u30d7\u30eb\u3092\u30de\u30eb\u30a6\u30a7\u30a2\u3068\u3057\u3066\u5206\u985e\u3057\u3001\u60aa\u610f\u306e\u3042\u308b\u30b3\u30f3\u30c6\u30f3\u30c4\u304c\u30e6\u30fc\u30b6\u30fc\u306b\u914d\u5e03\u3055\u308c\u308b\u3053\u3068\u3092\u81ea\u52d5\u7684\u306b\u30d6\u30ed\u30c3\u30af\u3057\u3066\u3044\u307e\u3059\u3002<\/li>\n<li><b>AutoFocus\u00a0<\/b>\u306f\u3001<a href=\"https:\/\/autofocus.paloaltonetworks.com\/#\/tag\/Unit42.Petya\" target=\"_blank\" rel=\"noopener noreferrer\" data-page-track=\"true\" data-page-track-value=\"company:palo-alto-networks-protections-petya-ransomware: section:\u963b\u6b62\uff1a:petya \u30bf\u30b0\">Petya \u30bf\u30b0<\/a>\u306b\u3088\u308a\u30c8\u30e9\u30c3\u30af\u3055\u308c\u3001\u3053\u306e\u653b\u6483\u306b\u304b\u304b\u308f\u308b\u8105\u5a01\u5206\u6790\u3068\u8abf\u67fb\u3092\u53ef\u80fd\u306b\u3057\u307e\u3059\u3002<\/li>\n<li><b>\u8105\u5a01\u9632\u6b62<\/b>\n<ul>\n<li>\u3053\u306e\u653b\u6483\u3067\u4f7f\u7528\u3055\u308c\u308b SMB \u8106\u5f31\u6027\uff08<a href=\"https:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-0144\" target=\"_blank\" rel=\"noopener noreferrer\" data-page-track=\"true\" data-page-track-value=\"company:palo-alto-networks-protections-petya-ransomware: section:\u963b\u6b62\uff1a:cve-2017-0144\">CVE-2017-0144<\/a>- MS17-010\uff09\u306b\u5bfe\u3059\u308b IPS \u30b7\u30b0\u30cd\u30c1\u30e3\uff08\u30b3\u30f3\u30c6\u30f3\u30c4\u30ea\u30ea\u30fc\u30b9\uff1a688-2964\uff09\u3092\u9069\u7528\u3057\u307e\u3059\u3002<\/li>\n<li>\"Virus \/ Win32.WGeneric.mkldr\"\u3068 \"Virus \/ Win32.WGeneric.mkknd\"\u30b7\u30b0\u30cd\u30c1\u30e3\u3092\u4ecb\u3057\u3066\u60aa\u8cea\u306a\u30da\u30a4\u30ed\u30fc\u30c9\u3092\u30d6\u30ed\u30c3\u30af\u3057\u307e\u3059\u3002<\/li>\n<\/ul>\n<\/li>\n<li><b>GlobalProtect<\/b>\u00a0\u306f\u3001WildFire \u3068\u8105\u5a01\u9632\u6b62\u306e\u4fdd\u8b77\u6a5f\u80fd\u3092\u62e1\u5f35\u3057\u3001\u30ea\u30e2\u30fc\u30c8\u30ed\u30b1\u30fc\u30b7\u30e7\u30f3\u304a\u3088\u3073\u30e6\u30fc\u30b6\u5168\u4f53\u3092\u4fdd\u8b77\u3057\u307e\u3059\u3002<\/li>\n<li>\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u5168\u4f53\u306e SMB \u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u306e\u4f7f\u7528\u3092\u5236\u5fa1\u3059\u308b\u305f\u3081\u306b App-ID \u3092\u4f7f\u7528\u3059\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002\u3053\u308c\u306b\u306f\u3001SMB \u30d7\u30ed\u30c8\u30b3\u30eb\u306e\u53e4\u3044\u30d0\u30fc\u30b8\u30e7\u30f3\uff08\u305f\u3068\u3048\u3070 SMBv1\uff09\u3092\u7121\u52b9\u306b\u3059\u308b\u306a\u3069\u3001\u5fc5\u8981\u306a\u5834\u6240\u3067\u306e\u307f\u6709\u52b9\u306b\u3057\u307e\u3059\u3002<\/li>\n<\/ul>\n<p>\u6ce8\uff1a\u79c1\u305f\u3061\u306f Petya \u306e\u72b6\u6cc1\u3092\u7d99\u7d9a\u7684\u306b\u76e3\u8996\u3057\u3066\u3044\u307e\u3059\u3002\u4fdd\u8b77\u306b\u3064\u3044\u3066\u306e\u8a73\u7d30\u306f\u3053\u306e\u30dd\u30b9\u30c8\u3092\u66f4\u65b0\u3057\u3066\u304a\u4f1d\u3048\u3057\u307e\u3059\u3002<\/p>\n<p>\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306e\u6b21\u4e16\u4ee3\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3067\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3092\u9632\u6b62\u3059\u308b\u305f\u3081\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u306b\u3064\u3044\u3066\u306f\u3001<a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClTLCA0&amp;lang=ja\" target=\"_blank\" rel=\"noopener noreferrer\" data-page-track=\"true\" data-page-track-value=\"company:palo-alto-networks-protections-petya-ransomware: section:\u963b\u6b62\uff1a:\u30ca\u30ec\u30c3\u30b8\u30d9\u30fc\u30b9\u306e\u8a18\u4e8b\">\u30ca\u30ec\u30c3\u30b8\u30d9\u30fc\u30b9\u306e\u8a18\u4e8b<\/a>\u3082\u53c2\u7167\u3057\u3066\u304f\u3060\u3055\u3044\u3002\u3059\u3079\u3066\u306e Windows \u30e6\u30fc\u30b6\u30fc\u306f\u3001\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u30b5\u30dd\u30fc\u30c8\u671f\u9650\u304c\u7d42\u4e86\u3057\u305f\u30d0\u30fc\u30b8\u30e7\u30f3\u3092\u542b\u3081\u3001Microsoft \u304c\u63d0\u4f9b\u3059\u308b\u6700\u65b0\u30d1\u30c3\u30c1\u3092\u78ba\u5b9f\u306b\u5165\u624b\u3059\u308b\u3053\u3068\u3092\u5f37\u304f\u304a\u52e7\u3081\u3057\u307e\u3059\u3002\u6700\u65b0\u306e Petya \u653b\u6483\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u306b\u3064\u3044\u3066\u306f\u3001<a href=\"https:\/\/unit42.paloaltonetworks.jp\/unit42-threat-brief-petya-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-page-track=\"true\" data-page-track-value=\"company:palo-alto-networks-protections-petya-ransomware: section:\u963b\u6b62\uff1a:unit 42 \u306e\u8a18\u4e8b\">Unit 42 \u306e\u8a18\u4e8b<\/a>\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u4f55\u304c\u8d77\u3053\u3063\u305f\u304b\uff1a 2017 \u5e74 6 \u6708 27 \u65e5\u3001Petya \u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306f\u3001\u653f\u5e9c\u3084\u91cd\u8981\u30a4\u30f3\u30d5\u30e9\u30b9\u30c8\u30e9\u30af\u30c1\u30e3\u306e\u30aa\u30da\u30ec\u30fc\u30bf\u3092\u542b\u3080\u8907\u6570\u306e\u7d44\u7e54\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u59cb\u3081\u307e\u3057\u305f\u3002\u3053\u306e\u653b\u6483\u306f\u30012017 \u5e74 5 \u6708\u306e WanaCrypt0r \/ WanaCry \u653b\u6483\u3068\u540c\u69d8\u306e\u65b9\u6cd5\u3067\u5e83\u304c\u3063\u3066\u3044\u308b\u3088\u3046\u3067\u3001ETERNALBLUE \u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u30c4\u30fc\u30eb\u3092\u4f7f\u7528\u3057\u3066 Microsoft Windows SMB \u30d7\u30ed\u30c8\u30b3\u30eb\u7d4c\u7531\u3067\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3092\u901a\u904e\u3059\u308b\u53ef\u80fd\u6027\u304c\u9ad8\u3044\u3068\u601d\u308f\u308c\u307e\u3059\u3002 Palo Alto Networks \u306e\u304a\u5ba2\u69d8\u306f\u3001\u6b21\u4e16\u4ee3\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306e\u8907\u6570\u306e\u8981\u7d20\u306b\u308f\u305f\u3063\u3066\u4f5c\u6210\u3001\u914d\u4fe1\u3001\u65bd\u884c\u3055\u308c\u305f\u4fdd\u8b77\u6a5f\u80fd\u306b\u3088\u308a\u3001Petya \u306b\u3088\u308b\u653b\u6483\u304b\u3089\u81ea\u52d5\u7684\u306b\u4fdd\u8b77\u3055\u308c\u3066\u3044\u307e\u3059\u3002 \u3069\u3046\u3084\u3063\u3066\u653b\u6483\u3055\u308c\u308b\u306e\u304b\uff1a \u521d\u671f\u306e\u611f\u67d3\u7d4c\u8def\u306f\u4e0d\u660e\u3067\u3059\u304c\u3001Petya \u306f Microsoft Windows \u30b7\u30b9\u30c6\u30e0\u3067 ETERNALBLUE &hellip;<\/p>\n","protected":false},"author":41,"featured_media":111796,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[7119],"tags":[7117,7118],"coauthors":[776],"class_list":["post-111795","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threat-prevention","tag-petya-ja","tag-ransomware-ja"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-generic-banner.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/111795","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=111795"}],"version-history":[{"count":3,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/111795\/revisions"}],"predecessor-version":[{"id":111798,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/111795\/revisions\/111798"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/111796"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=111795"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=111795"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=111795"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=111795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}