TXOne Networksã¯3æ26æ¥ãç£æ¥çšå¶åŸ¡ã·ã¹ãã (OT)ã«é¢ããè åšååããŸãšãã2024幎çã¬ããŒããOT/ICSãµã€ããŒã»ãã¥ãªãã£ã¬ããŒã 2024 ïœé²åããè åšãšCxOã®åãçµã¿ïœããçºè¡šã䜵ããŠãã¡ãã£ã¢ããªãŒãã£ã³ã°ãéå¬ããåã¬ããŒãã®å 容説æãè¡ã£ãã
åã¬ããŒãã®èª¿æ»ã¯ããã¹ãïŒãµãªãã³ãšå ±åã§è¡ã£ãŠãããã®ãåå(2023幎ç)ã¯èªåè»ã補è¬ããã€ãªãã¯ãããžãŒãååŠãäžè¬è£œé ãç³æ²¹ãã¬ã¹ãé茞ã®7åéã®ITããã³OTã»ãã¥ãªãã£åéã®æææ±ºå®è 405人(察象åœã¯ç±³åœãUAEããã€ããæ¥æ¬ã®4ãåœ)ã察象ãšããŠèª¿æ»ãè¡ãããããä»å(2024幎ç)ã«ã€ããŠã¯ãç£æ¥åéããåå°äœè£œé ããé£å補é ããèªåè»è£œé ãã補è¬ããç³æ²¹ã»ã¬ã¹ãã®5åéãšãã察象åœãç±³åœããã€ããæ¥æ¬ããã©ã³ã¹ããµãŠãžã¢ã©ãã¢ãéåœãå°æ¹ŸãUAEã®8ãåœãžãšåå¢ããã€ã€ãæææ±ºå®è ã¯åèš150人(ãã ããããã2000人以äžã®åŸæ¥å¡ãæããäŒæ¥ã«æå±)ãšçµã圢ã§è¡ã£ããšããããŸãããã®150人ã¯8ãåœã§åçå²ãã§ã¯ãªããç±³åœ33ïŒ ããã€ã20ïŒ ãæ¥æ¬13ïŒ ããã©ã³ã¹ã»ãµãŠãžã¢ã©ãã¢ã»éåœã»å°æ¹Ÿã»UAEãå7ïŒ ãšããå²ãæ¯ãã圹è·ãšããŠã¯ãCSO33ïŒ ãCISO36ïŒ ãCIO31ïŒ (ããããOTã»ãã¥ãªãã£ç®¡çã®è²¬ä»»è )ãšããŠããã
äž»ãªèª¿æ»å 容ãšããŠããOT/ICSã®ãµã€ããŒè åšã®çŸç¶ããOT/ICSãµã€ããŒã»ãã¥ãªãã£ã®å®æ ããèŠå¶ãšæšæºããæªæ¥ã®ã»ãã¥ãªãã£ç¢ºä¿ãã®4ã€ã®ãã€ã³ããæ²ããããŠããã
å€ãã®OTã§ã»ãã¥ãªãã£ã€ã³ã·ãã³ããè€æ°åçºç
2024幎ã®OTã«å¯Ÿããè åšã®ç¶æ³ãèãåã調æ»ãããšã«ãŸãšãããšãããå šäœãšããŠ36ïŒ ãéå»12ãæã®ãã¡ã«è€æ°åã®ã»ãã¥ãªãã£ã€ã³ã·ãã³ããçºçãããšåçã1åãªãã³ã«ã0åã ãã»ãã¥ãªãã£ã€ã³ã·ãã³ãçºçæåãŸã§è¡ã£ããšããåçãå«ãããšãå šäœã®94ïŒ ã®çµç¹ãäœããã®OTãµã€ããŒã»ãã¥ãªãã£ã€ã³ã·ãã³ããçµéšããããšã«ãªããšãããç¹ã«ãåå°äœè£œé ã§ã¯40ïŒ ãç³æ²¹ã»ã¬ã¹ã§ã¯57ïŒ ã®äŒæ¥ã»çµç¹ãè€æ°åã®ãµã€ããŒã€ã³ã·ãã³ããçºçãããšã®ããšã§ãTXOne Networks Japanã®ã·ãã¢ãã¯ãã«ã«ãšã³ãžãã¢ã§ããæ¬å€é 圊æ°ã¯ãéèŠç£æ¥ãçãããŠããããšãåããããšèª¬æããã
-

OTã§ã1幎ã®ãã¡ã«è€æ°åã®ã»ãã¥ãªãã£ã€ã³ã·ãã³ããçºçããããã«ãªã£ãŠãã
ãŸããITã®ã»ãã¥ãªãã£ã€ã³ã·ãã³ããOTã«åœ±é¿ãåãŒããã®ãã©ããã«ã€ããŠã®èª¿æ»ã§ã¯ã98ïŒ ã圱é¿ããŠãããšåçããŠãããITã§èµ·ãã£ã圱é¿ãOTã«æ³¢åããããšã瀺ããããšãããå šäœãšããŠã¿ããšãITç°å¢ãäŸµå ¥çµè·¯ãšããŠOTåŽã«å ¥ã蟌ãã§ãã(ãããã¬ãŒã·ã§ã³)æ»æãå šäœã®68ïŒ ãšããªãå€ãã»ããITåŽã®ã»ãã¥ãªãã£ã€ã³ã·ãã³ãã«ãããã³ã³ãããŒã«ã奪ãããçµæãOTåŽã被害ãåãããšãããã®ã30ïŒ ã»ã©ã§ãã£ããšããã
-

OTãžã®çŽæ¥çãªæ»æã®ã¿ãªãããITåŽããã®åœ±é¿ãåããããšãèµ·ãã€ã€ãã
æ¬å€æ°ã¯2024幎ã®OTã®ã»ãã¥ãªãã£ã€ã³ã·ãã³ãã®ãããã¯ã¹ã®1ã€ãšããŠãOTãçãAPTæ»æ(Advanced Persistent Threat:é«åºŠæç¶çè åš)ãå¢å ããããšããæããããã®ç¹åŸŽã¯é·æéã®æœäŒãå Žåã«ãã£ãŠã¯æ°å¹ŽéæœäŒããç Žå£è¡çºãè¡ãã®ã§ã¯ãªããæ å ±ãªã©ãå¯ãã«çãã§ãããšãããã®ã§ããé«åºŠãªææ³ã§ç¹å®ã®äŒæ¥ã«å¯Ÿããè匱æ§ãäžç¹çªç Žã§å ¥ã蟌ããç¹å®ã®çµç¹ãåœå®¶ãçã£ãæç¢ºãªç®çããããåœå®¶ã®æ¯æŽãåããæ»æããããä»åã®èª¿æ»ã§ã¯34ïŒ ã®åçè ã圱é¿ãåãããšçããŠããããšãããç¹ã«åå°äœç£æ¥ã補è¬ãèªåè»åéã«ã€ããŠã¯ãAPTæ»æãã»ãã¥ãªãã£ã€ã³ã·ãã³ãã®çš®é¡ã§ããããšãªã£ããšããã
OTå°çšã®ãã«ãŠã§ã¢ãç»å Ž
2024幎ã®ä»£è¡šçãªã»ãã¥ãªãã£ã€ã³ã·ãã³ãã远ããããŠã¿ããšãFrostyGoop(BUSTLEBERM)ãã¯ãããšããOTç°å¢ãçã£ãå°çšã®ãã«ãŠã§ã¢ãäžè¬ã«èªç¥ãããããã«ãªã£ããšãããFrostyGoopã¯ããŠã¯ã©ã€ã西éšã®ããé»åäŒç€Ÿãžã®æ»æã«ãã·ã¢ã䜿çšãããšãããããšã§è©±é¡ãšãªã£ãããäžæ¹ã®ãŠã¯ã©ã€ãã®ã»ãã¥ãªãã£æ©é¢ãšé¢ä¿ã®ããããã«ãŒã°ã«ãŒããBlackjackããFuxnetã䜿çšããŠããã·ã¢ã®ã€ã³ãã©ç®¡çäŒæ¥ã®ç£æ¥çšã»ã³ãµãç¡å¹åãããšãèšãããŠããã
ãŸãããããããã«ãŠã§ã¢ãç»å Žããäžæ¹ãã©ã³ãµã ãŠã§ã¢æ»æã¯ããŸã ã«å€ãè¡ãããŠãããã®ã®ãå€§äŒæ¥ã§ã¯å¯Ÿçãé²ãã§ãããOTã»ãã¥ãªãã£ã€ã³ã·ãã³ãã®é »åºŠãšããç¹ã§ã¯ãæäžäœã®28ïŒ ã«ãšã©ãŸã£ãŠãããããããã£ãã·ã³ã°ã¡ãŒã«ãåŸæ¥å¡ã«ããæå³ããªãæ å ±æµåºããœãããŠã§ã¢ã®è匱æ§ãšãã£ã人éã«èµ·å ããéšåã®èŠå ãå€ãããäžã®äžã®ãã¬ã³ããšå€§äŒæ¥ã®èªèã«éããçããŠããã(å)ãšããã
ãã ããã©ã³ãµã ãŠã§ã¢ã«ãã被害é¡èªäœã¯å¹Žã å¢å åŸåã«ããç¹ã«æ³šæããå¿ èŠããããšæ¬å€æ°ã¯ææãããç¹ã«åœãå°åé¢ä¿ãªã補è¬ã»ãã«ã¹ã±ã¢ãäžè¬è£œé æ¥ã¯çãããŠãããšããã»ããã¢ãžã¢ã§ã¯é£åã»é£²æãé»åæ©åšããåç±³ãæ¬§å·ã§ã¯å°å£²æ¥ãããããã®å°åæããã¿ãŒã²ããã«ãªããããç¶æ³ã§ããããšãèŠãããšããã
-

å€§äŒæ¥ã®ã©ã³ãµã ãŠã§ã¢å¯Ÿçã¯é²ãã§ããäžæ¹ã§ãå šäœã®è¢«å®³é¡ã¯å¢å åŸåãããã§ã®éé¡ã¯è¢«å®³ãåããäŒæ¥ãæããã«ããå€ã®åç®ã§ã¯ãªããç¯è¡ã°ã«ãŒãã®å£°æãããšã«ããéé¡ã ãšãã
å ããŠãã©ã³ãµã ãŠã§ã¢ã®æ»æã°ã«ãŒãã«ãå€åãèŠããããšããã2023幎çã§ã¯BlackCatãæå€§ã®18ïŒ ãæ¬¡ãã§LockBitã17ïŒ ãšãªã£ãŠãããã2024幎2æã«RansomHubãç»å ŽããŠä»¥éãååšæãé«ãã€ã€ããã2024幎çã§ã¯ãããã®14ïŒ (LockBitãšåç)ãŸã§äŒžã°ããŠãããšãããæ¬å€æ°ã¯ãRansomHubã¯BlackCatã®ãšã³ã·ã¹ãã ãªã©ãããæå³åŒãç¶ãã ååšã2éæåã§ãããŒã¿ãæå·åããŠèº«ä»£éãåãã ãã§ãªããåŸãããŒã¿ãæµåºãããè è¿«ãè¡ãæå£ã§ãç°¡åã«æ€ç¥ã§ããªããããªææ³ãåã£ãŠãããä»åŸãæŽç·Žãããæ»æã°ã«ãŒãã«ãªã£ãŠããããšãäºæ³ãããããšæ³šæãä¿ãã
OTã§ã¯é£ããé »ç¹ãªãããé©çš
äžè¬å ¬éãããŠããæ å ±ã»ãã¥ãªãã£ã®æ¬ é¥(è匱æ§)ãããŒã¿ããŒã¹åãããCVE(Common Vulnerabilities and Exposures)ãã®è¿œå æ°ã幎ããšã«è¿œãããããšå¹Žã å¢å ãç¶ããŠããããCVEãå²ãæ¯ãããè匱æ§ã®ãã¡ãæªçšããããã®ã瀺ããªã¹ãã§ãç±³åœã®æ¿åºæ©é¢ã§ããCISA(CybersecurityïŒInfrastructure Security Agency)ãå ¬éããŠãããKVE(Known Exploited Vulnerabilities catalog)ããèŠããšããã®è¿œå æ°ã¯æžå°ãç¶ããŠãããšããã
-

è匱æ§ã®æªçšã¯æžå°åŸåã«èŠãããããã®è£ã§ã¯ãŒããã€æ»æã®å¢å ãªã©ã®å¯èœæ§ããã
ãã®èæ¯ãšããŠèª¿æ»ã¬ããŒãã§ã¯3ã€ã®å¯èœæ§ã瀺ããŠããã1ã€ç®ã¯ãŒããã€æ»æã®å¢å ãã€ãŸããè匱æ§ãèŠã€ããåããããã¯èŠã€ãã£ããšããŠã察çãèŠã€ããåã«æ»æãè¡ãããŠãããšããèãããã®å ŽåãCVEãšããŠã¯å ¬è¡šãããªããããKEVã«ã远å ãããããšã¯ãªãã
2ã€ç®ã¯æ©æã®ããããªãªãŒã¹ãè匱æ§ãèŠã€ãã£ãæç¹ã§å³åº§ã«ããããæäŸãããããšã§ãç°¡åã«æ»æãè¡ãããªããªã£ããšããèãããããŠ3ã€ç®ãè匱æ§ã¿ãŒã²ãããéå®ããŠãããšããå¯èœæ§ãåºç¯ã«æ»æãè¡ãã®ã§ã¯ãªããå°ãªãè匱æ§ãå¹ççã«çã£ãŠãããšããæ¹åã«åãã£ãŠããããšãèãããããšããã
ç¹ã«OTç°å¢ã§ã¯ãæ©æ¢°ãç°¡åã«æ¢ããããªãããé »ç¹ãªãããé©çšã¯å°é£ã§ãæ1å以äžã®ãããé©çšãè¡ã£ãŠãããšåçããã®ã¯å šäœã®15ïŒ ã«éããªããæ¬å€æ°ããOTç°å¢ã§ã¯ãããããåºããããšèšã£ãŠãããã«é©çšã§ããªããšããäºå®ã瀺ãããŠãããæ·±å»ãªã®ã¯é£å補é ãèªåè»è£œé ã§ã¯ãé »ç¹ãªãããé©çšãè¡ãããŠããã®ã¯7ïŒ ãšããéãããç¶æ³ã瀺ãããããšããšææããããããããé©çšã®èª²é¡ãšããŠããããé©çšã®ããã«æ©æ¢°ãé »ç¹ã«æ¢ããããªããšããçç±ã®ã»ãã«ããäœæ¥äººå¡ã®äžè¶³ãããããã¹ãã®äžè¶³ãªã©ãæãããããšããã
ãã®ä»£ããããããããã£ãã«æ¢ããããªãæ©æ¢°ã«å¯Ÿãã代æ¿çãšããŠãç£èŠãšäŸµå ¥æ€ç¥ã®åŒ·åãã€ãŸãã¢ãã¿ãªã³ã°ãå€ãããTXOneãšããŠã¯ããã以äžã«ãããã¯ãŒã¯ã»ã°ã¡ã³ããŒã·ã§ã³ãã·ã¹ãã ããŒããã³ã°ã®ãããªæ»æããã穎ããµãããããªè£åçãªç®¡ççãé©çšããæ¹ãè¯ãã®ã§ã¯ãªãããšããææ¡ãè¡ã£ãŠãããšããã
äžçäžã§é²ãOT/ICSé²åŸ¡ã«åããèŠå¶ã»æšæºåã®åã
å¢ããOTã«å¯Ÿããæ»æã«ã©ã察åŠããŠããã¹ãããåœãå°åã¬ãã«ã§ãããããã察å¿ãæšé²ããã¹ãèŠå¶ãæšæºåã«åããåããé²ãã§ãããäžã§ã倧ããªæµããšããŠãEUã§ã欧å·ãµã€ããŒã¬ãžãªãšã³ã¹æ³(EU Cyber Resilience Act:CRA)ããçºå¹ãããããšãæãããããšããã»ããæ¥æ¬ã§ããµã€ããŒã»ãã¥ãªãã£åºæ¬æ³ã2025幎äžã«ãæ¹æ£ãããããšãèŠèŸŒãŸãããšããã
ç¹ã«CRAã®èŠä»¶ã«éåããå Žåã1500äžãŠãŒããããã¯ã°ããŒãã«å¹Žé売äžé«ã®2.5ïŒ ã®ããããé«ãã»ãã課城éãšããŠç§ãããããšãšãªããããæ¬§å·ã§ããžã¿ã«èŠçŽ ãhçµã補åã販売ããå Žåã«ã¯ãã£ãããšãã察å¿ãå¿ èŠãšãªã£ãŠããã
ä»åŸã®OTã»ãã¥ãªãã£ã®æ¹åæ§
調æ»ã¬ããŒãã§ã¯ãä»åŸ12ïœ24ãæã®éã«ãã©ã®ãããªæ°ãããµã€ããŒã»ãã¥ãªãã£æè¡ããã¬ã³ããæ¡çšããäºå®ãïŒããšãã£ã質åã宿œããã®ãã¡ãåçè ã®48ïŒ ãããµãã©ã€ãã§ãŒã³ãããŒãžã¡ã³ãããšåçããŠããããµãã©ã€ãã§ãŒã³ã»ãã¥ãªãã£ç®¡çãžã®æ³šç®ã®é«ããæµ®ã圫ããšãªã£ããšããã
-

ãµãã©ã€ãã§ãŒã³å šäœã®ã»ãã¥ãªãã£ç®¡çã¯ä»åŸã®ã»ãã¥ãªãã£åŒ·åã®æ¹åæ§ãšããŠæ³šç®ãããŠãããšãã
ããããåçè ã®ãã¡ããã¹ãŠã®ãã³ããŒã«å¯ŸããŠã»ãã¥ãªãã£è©äŸ¡ã宿œã§ããŠããã®ã¯21ïŒ ã«çãŸãçµæãšãªã£ãã»ãã66ïŒ ã¯éèŠãªãã³ããŒã«å¯ŸããŠã®è©äŸ¡ã¯è¡ã£ãŠãããã®ã®ããã®ã«ãã¬ããžã«ã¯çåãæ®ãçµæãšãªã£ãŠãããä»åŸãããããç¹ãä¹ãè¶ããŠããå¿ èŠããããšããã
-

泚ç®åºŠã¯é«ããã®ã®ããã¹ãŠã®ãã³ããŒã«å¯Ÿããã»ãã¥ãªãã£è©äŸ¡ã宿œã§ããŠããå²åã¯ãŸã ãããŸã§é«ããªã
å ããŠã61ïŒ ã®åçè ã¯çŸåšã®OTã»ãã¥ãªãã£å¯Ÿçã«æºè¶³ããŠãããšæããŠãããã®ã®ãå幎ã«ãµã€ããŒã€ã³ã·ãã³ããçµéšãããªã©ãã»ãã¥ãªãã£ç®¡ç責任è ã®èªèãšçŸå®ã®ã®ã£ãããçããŠããããšãæµ®ã圫ããšãªã£ãŠãããæ¬ç°æ°ã¯ããã®ã®ã£ãããå·éã«èŠãŠã察çããŠããå¿ èŠãããããšææãOTãµã€ããŒã»ãã¥ãªãã£ããã°ã©ã ã®å®æœã«éããŠèªèãããŠããäž»èŠãªèª²é¡ã®å€ãããªã¢ã«ã¿ã€ã éçšãã»ãã¥ãªãã£ããŒã ãšã®é£æºäžè¶³ãªã©ãšãã£ã人ãšããã»ã¹ã圱é¿ããŠãããã®ã§ãããããããããšãå«ããŠèããŠããå¿ èŠããããšããŠããã


OTãµã€ããŒã»ãã¥ãªãã£ã®æææ±ºå®è ã®å€ããçŸåšã®å¯Ÿçã«æºè¶³ããŠãããšããªããããéå»ã«ãµã€ããŒã€ã³ã·ãã³ããçµéšãããããäžã§èªèãããŠããæå€§ã®èª²é¡ã¯äººãããã»ã¹ã«é¢é£ãããã®ãšãªã£ãŠãã
ãªããæ¬ç°æ°ã¯ãµãã©ã€ãã§ãŒã³ãã³ããŒè©äŸ¡ãšããŠèªåè»è£œé é¢é£ããã»ãã®ç£æ¥åéããããã¹ãŠã®ãã³ããŒã«å¯Ÿããè©äŸ¡ã宿œããŠããå²åãé«ãããšã«ã€ããŠãæ¥çå šäœã®é¢å¿ã®é«ãã«å ããŠããµãã©ã€ãã§ãŒã³ããããã«å¯ŸããŠã身ã®äžã«ãã£ã察çãããããã«ã¬ã€ãã©ã€ã³ã§ç€ºããªã©ãå®éã«ã§ãããšããããåãçµããšããåããèŠããŠããããšãææããŠããã





