2025å¹Žè¿æ¥ãæãè¿ããŠã¿ãã°ã2024å¹Žã¯æ¥æ¬äŒæ¥ã«ãããã©ã³ãµã ãŠã§ã¢ã®è¢«å®³ãç®ã«ä»ã幎ã ã£ãããã«æãããå®éã1æ8æ¥ã«ãã¬ã³ããã€ã¯ããçºè¡šãã調æ»çµæã§ã¯ã©ã³ãµã ãŠã§ã¢è¢«å®³å ¬è¡šæ°ãå幎æ¯15ä»¶å¢ã®84ä»¶ãšé廿倧ãšãªã£ããKADOKAWAãã«ã·ãªèšç®æ©ãã€ã»ããŒãšãã£ãäŒæ¥ãã©ã³ãµã ãŠã§ã¢ã®è¢«å®³ã«éãã身代éãæ¯æã£ãã®ã§ã¯ãªãããšã®å£°ãããã
ä»åãäž»ã«ã©ã³ãµã ãŠã§ã¢ãäžå¿ãšããã»ãã¥ãªãã£æ¥çã«ããã2024å¹Žã®æ¯ãè¿ããšã2025幎ã®å±æã«ã€ããŠãã¬ãŒãããŒãžã£ãã³ ãªãµãŒãïŒã¢ããã€ã¶ãéšé ã·ã㢠ããªã³ã·ãã« ã¢ããªã¹ãã®éŽæšåŒä¹æ°ã«è©±ã䌺ã£ãã
-

ã¬ãŒãããŒãžã£ãã³ ãªãµãŒãïŒã¢ããã€ã¶ãéšé ã·ã㢠ããªã³ã·ãã« ã¢ããªã¹ãã®éŽæšåŒä¹æ°
æ¥æ¬äŒæ¥ã¯ã©ã³ãµã ãŠã§ã¢ãžã®åãã察åŠã®æºåã§ããŠããªã
ãŸããéŽæšæ°ã¯2024幎ã®ã©ã³ãµã ãŠã§ã¢ã®ååã«ã€ããŠãå€ãã®åœå äŒæ¥ã«å¯Ÿããã©ã³ãµã ãŠã§ã¢ã®æ»æã§å€æããŠããããšã¯ãäºãèµ·ããŠããã®åãã察åŠã«é¢ããŠæºåãã§ããŠããªããšããããšã§ãããšè¿°ã¹ãã
ããã¯ãã©ã³ãµã ãŠã§ã¢ã®è¢«å®³ã«éããªãããã®æºåãäŒæ¥ãšããŠå¿ èŠã§ã¯ãããã®ã®ãããããæ»æãããéã®æ³ååãäŒŽãæºåãå¿ èŠã ãšãããçŸç¶ã§ã¯ãæ»æãåããŠããæäžã®æºåã¯ã§ããŠããããæ»æãåããåŸã®å¯ŸåŠæ¹æ³ãã§ããŠããªããšã®ããšã ã
å®éã身代éãæ¯æããæ¯æããªãã«é¢ããŠãæ»æãåããŠã¿ãªããšå€æãã§ããªãç¶æ³ãšãªã£ãŠãããããšãã身代éãæ¯æããªããšã«ãŒã«åããŠããŠããæ¯æããããŠèµ·ããäºæ ã«ãã圱é¿ç¯å²ãè°è«ããããã§çµç¹ãšããŠæ¯æããªãæ¹éã§ããã°ãŸã ãããããã¯ã¢ãããªã©ãåããã«æ¯æããªãæ¹éãšããŠããäŒæ¥ã»çµç¹ãå€ãååšããŠãããšããã
ããããç¶æ³ãéã¿ãŠãéŽæšæ°ã¯ãæ»æãåããåŸã®å¯ŸåŠã«ã€ããŠæ³ååã䌎ã£ãå¯ŸåŠæ¹æ³ãäžè¶³ããŠããŸããæ»æãåããªã察çã ãã§ãªããæ»æãåããåŸã®ãã¡ãŒãžã³ã³ãããŒã«ã«ã€ããŠçµå¶è ãå«ããŠè°è«ããå¿ èŠããããŸããæ¥æ¬äŒæ¥ã§ã¯ãããããæºåãã»ãšãã©ã§ããŠããŸããããšææã
æµ·å€ã§ã¯ãµã€ããŒä¿éºã§èº«ä»£éã®èŠæ±ãªã©ã«å¯Ÿå¿ã§ããŠããããæ¥æ¬ã®å Žåã¯ãµã€ããŒä¿éºã«å å ¥ããŠãããŠãŒã¶ãŒãå°ãªãããšã«å ããã«ããŒã§ããéé¡ã»ç¯å²ãçããªã£ãŠããããã®ãããæ³ååã䌎ã£ã圢ã§èããå¿ èŠããããšã®ããšã ã
æ»æãåããåŸã®ãã¡ãŒãžã³ã³ãããŒã«ãéèŠ
äžæ¹ãæšå¹Žã«æµ·å€ã®RaaS(Ransomware as a Service)çéã§ã¯Lockbitã®ãã€ã¯ããŠã³ãBlackCatã®åºå£è©æ¬ºãªã©ã©ã³ãµã ãŠã§ã¢ã°ã«ãŒãã話é¡ã«ãªã£ãã
ãã®ç¹ã«ã€ããŠãéŽæšæ°ã¯ãããã¯1ã€ã®äºè±¡ã®æµãã§ãããªããæãå€ãåãå€ãæ°ãããã®ãåºçŸããŠããŸãã以åãããã°ã«ãŒãåŽã®åãåã¯å°ãªããªããã¢ãã£ãªãšã€ã(ã©ã³ãµã ãŠã§ã¢ã®ãã€ããŒãå±éè )åŽã®åãåãå€ããªã£ãŠããŠããŸãã倧ããªæœ®ç®ã«èŠãããããããŸããããéåžžã«å€§ããªæ³¢ã®äžã®å°ããªæ³¢ã§ãããªããšæããŸããã©ã³ãµã ãŠã§ã¢èªäœããªããªãããã§ã¯ãªãã身代éã®æ¯æããèŠå¶ã»å³çœ°åãããªãéãã¯å€§ããªå€åã¯ãããŸããããšã®èŠè§£ã瀺ãã
ãŸããåæ°ã¯ã身代éãæ¯æãããšèªäœã¯è€ããããããšã§ã¯ãããŸããããäžæŠã«åŠå®ãããªãåŽé¢ããããŸããããšãã°é»æ°ã»ã¬ã¹ã»æ°Žéã身代éãæ¯æããªãããšã§äŸçµŠãããªããªã£ãå Žåãå ¬çãªèгç¹ã§èããšæ¯æããæ¯æããªããã©ã¡ããæå¹ãªææ®µãªã®ããšããããšã¯åãããŠããŸãããã®çãã¯äžã åºããªããšæããŸãããèããŠãããªããã°ãªããŸããããŸãã«ããããæºåã§ãããæ³å®ãã察çãæã€ã¹ããªã®ã§ãããšåŒ·èª¿ããã
ã©ã³ãµã ãŠã§ã¢æ»æãåããã¿ã€ãã³ã°ã§æ»æè ã®æ§æ Œãææ¡ããããšãç¥ãããšã¯äžå¯èœãªãããå°éå®¶ãšé£æºã§ããäœå¶ã®æ§ç¯ããŠãã©ã®ãããªæ§è³ªãæã£ãæ»æè ãªã®ããç¥ãããšãéèŠã ãšããã
éŽæšæ°ã¯ã倧åã®äŒæ¥ã§ã¯âæ»æãããªãâãšããåæã§åããŠããŸãããæ»æãåããåŸã®ãã¡ãŒãžã³ã³ãããŒã«ãéåžžã«éèŠã§ããããã¯æºåãšæ³ååã®åé¡ã§ãããæ³ååãè¶³ããŸãããèµ·ããŠåœããåãšèããŠããããèµ·ãããªãæ¹åã°ããã«èµãåã£ãŠããŸããããèµ·ããŠåœããåã§ãããèµ·ããŠããŸã£ãã察åŠããªããã°ãªããªããšããçŸå®ããããŸãããšã®èªèã ã
æšä»ã§ã¯ãæµåºããããŒã¿ãææçµè·¯ãªã©ã«å¯Ÿãã説æè²¬ä»»ãå€ãã®äŒæ¥ã§åŒ·ãæ±ããããŠãããããããEPP(Endpoint Protection Platform)ã ãã§ã¯è©³çްãç¥ãã®ã¯å®¹æã§ã¯ãªããEDR(Endpoint Detection and Response)ã«ãããšã³ããã€ã³ãããããã¯ãŒã¯ããã®ãã°ããŒã¿ã®åéã«é¢ããéèŠæ§ãé«ãŸã£ãŠããã
EDRã¯äžå¯©ãªãã®ãå«ããŠãã°ãååŸãããããæéãçµéããŠãåæãã§ããããšãããåé¡ãçºçããéã«åå ãçªãæ¢ããããšãå¯èœãšããŠããã
éŽæšæ°ã¯ãæè¿ã§ã¯ãåå ç©¶æãŸã§ãäŒæ¥ã®èª¬æè²¬ä»»ã«å«ãŸããŠããŠããŸããæ»æãåããåŸã«ææ§ãªæ å ±ãå€éšã«çºä¿¡ããã°ã被害è ãšããŠã¯å°ããšæããŸãããã®ããããã°ãååŸããŠè¢«å®³ç¯å²ãªã©ãå¯èŠåããããšã¯äŒæ¥ã®è²¬ä»»ã«ãããŠå¿ èŠãªãã®ã§ããEDRã«é¢ããŠã¯2幎åããå°å ¥ã®åããæŽ»çºåããŠããã»ãã24æé365æ¥ã«å¯Ÿå¿ããããã«éèŠãæ¡å€§ããŠããŸãããŸããMDR(Managed detection and response)ãSOC(Security Operation Center)ãžã®é¢å¿ãé«ãŸã£ãŠããŸãããšçŸç¶ãçŽè§£ãã
ã»ãã¥ãªãã£å¯Ÿçã¯å ã«ãè§ã«ããæ³ååãšæºåã
ããããEPPã«å ããŠãEDRãMDRãSOCãå°å ¥ãããšãªããšææ°é¢æ°çã«ã³ã¹ããå¢å€§ããŠããããšãåŠããªãããã®ç¹ã«ã€ããŠãéŽæšæ°ã¯å°æ¥ãèŠæ®ããŠæè³ãããªããã°ãªããªããšãããã©ã³ãµã ãŠã§ã¢ä»¥å€ã®æ»æã«é¢ããŠã¯ãäŒæ¥ãçæAIãæŽ»çšãããšåæã«ãã£ãŒããã§ã€ã¯ã§ã¯é³å£°ãåç»ãããã¹ããšæãšå Žåã«åãããŠæ»æè ãå©çšãããªã©ãAIã®æè¡ãæªçšããæ»æãå¢å ããŠãããæ³šæãæãå¿ èŠããããšã®ããšã ã
åæ°ã¯ãäŒæ¥ã®ã»ãã¥ãªãã£æ åœè ã®æ¥åã¯å¢å åŸåã«ãããã¢ã¿ãã¯ãµãŒãã§ã¹ãããžã¡ã³ããæ³šç®ã®ãã¯ãããžãŒã«ãªã£ãŠããã2025幎ã«åãçµã¿ã®ããŒã¯ãè¿ããèŠéãã§ãããšè©±ããŠããã
ã¢ã¿ãã¯ãµãŒãã§ã¹ãããžã¡ã³ãã¯ãæ»æãããå¯èœæ§ãããç®æãå åãããã¢ãããŒããšãªããäŒæ¥ããµã€ããŒã»ãã¥ãªãã£ãªã¹ã¯ã«å¯ŸããŠç¶ç¶çãªç£èŠãšç®¡çãè¡ãããã®ææ³ã§ãããCTEM(Continuous Threat Exposure Management)ãã¯æè³äŸ¡å€ãé«ããã®ã ãšããã
éŽæšæ°ã¯ãæ»æãããªãããã®æè³ãéèŠãä»å¹Žã¯å°å ¥ãæ¬æ ŒåããŠããèŠéãã§ããæ»æãããå¯èœæ§ãããç®æãå¯èŠåãããšãšãã«ãå¯èŠåããåŸã«å±éºåºŠã«å¿ãã察åŠã®ããã»ã¹ãå ·äœçã«ç¢ºç«ããŠãããšããç®çããããŸããæµ·å€ã ãšäžè¬çãªãã®ã§ãããšèª¬æããŠããã
AIã«ã€ããŠã¯èŠæ¥µããå¿ èŠã ãšææãããåæ°ã¯ãAIã§æ€ç¥ã®èœåãåäžãããã®ãã察åŠã®èœåãåäžãããã®ããçæAIãçšããé£æåºŠå¥ã®ã¬ããŒããåºåããã®ãããªã©ããããŸãããŠãŒã¶ãŒåŽãæ··ä¹±ããŠããç¶æ³ããããã³ããŒãã©ã®ãããªAIæè¡ã掻çšããŠããã®ããèŠæ¥µããå¿ èŠããããŸãããšã¯ãããAIã«å¯Ÿããåžžèãå€åããŠããããšã§ã»ãã¥ãªãã£ã«å¯Ÿããé©çšé åã¯åºãã£ãŠããèŠèŸŒã¿ã§ãããšèª¬ãã
æåŸã«2025幎ã«ãããã©ã³ãµã ãŠã§ã¢ã®ååã«ã€ããŠèãããšãããäŒæ¥ãã¿ãŒã²ããã«ããé«åºŠãªæ»æã¯äŸç¶ç¶ããšã®ããšã ãéŽæšæ°ã¯ã1åã®æ»æã§æ°ååèŠæš¡ã®èº«ä»£éæ¯æããæ±ãããã®ã¯å¢å ããããšãèŠèŸŒãŸããŠãããäŒæ¥ã¯ç¶ç¶ããŠå¯ŸåŠããŠãããªããã°ãªããŸããããµã€ããŒä¿éºã¯ãçŸç¶ã§ã¯å å ¥æ°ãå°ãªãã§ãããå å ¥ããããã«èªç€Ÿã®ã»ãã¥ãªãã£å¯Ÿçããã§ãã¯ããã¿ã€ãã³ã°ãè¿ããŠããã®ã§ã¯ãªãã§ããããããšã®èŠç«ãŠã ã
ãããŠãäŒæ¥ãèããã¹ãããšãšããŠããã¯ãæ³ååãšæºåã ãšæããŸãããæ»æãããªãããæ»æãããŠããèããããšããåŸæ¥ã®ã»ãã¥ãªãã£å¯Ÿçã§ã¯ãªãããæ»æãããããšãåæãã«èããŠæºåãããã®ããã«ã¯æ³ååãå¿ èŠã«ãªããŸããäœãèµ·ããŠããã®ãææ¡ã§ããªãç¶æ³ã¯æãŸãããªããããäœãèµ·ããŠããã®ããåŸããã§ãææ¡ã§ããããã«ããã¹ãã§ããããšãã°ãã€ã³ã·ãã³ããçºçããŠããEDRã䜿ãã®ã§ã¯ãªããã€ã³ã·ãã³ãã«ã¯è³ããªãã£ããå±ãªãå¯èœæ§ããã£ããããããªããšããäœå¶ã»èãæ¹ãéèŠã§ããã€ãŸããæ»æã®å åãæŽããããã«ããŠããããšã§ãããšåã蟌ããŠããã

