LAC Co., Ltd.

Taking full advantage of cutting-edge technology to make way for the future.

Report An Emergency Incident
Close

24-Hour Consultation, No Reservations Necessary

Emergency Inquiries: Cyber Emergency Center ®

Emergency Response Service to quickly support our customers during security-related emergency cases.
If you are in an emergency situation, please contact us now [Cyber Emergency Center]

For inquiries by email

email of Cyber Emergency Center ®

24-Hour Consultation, No Reservations Necessary

Emergency Inquiries: Cyber Emergency Center ®

If you are in an emergency situation, please contact us now [Cyber Emergency Center]

JSOC INSIGHT vol.11 English Edition

15 AUG 2016 | JSOC INSIGHT

"JSOC INSIGHT" is an analysis report on the trend of security incidents, such as unauthorized access and malware infection, in Japan, based on daily analysis results by our JSOC security analysts. Since this report analyzes the trends in attacks, based on the data of incidents which JSOC customers actually encountered, the report will help in understanding world trends as well as actual threats that Japanese users are facing.

JSOC INSIGHT vol.11 contains below topics.

  • Unauthorized Web server manipulations by WebShells
  • Increasing ransomware-infected traffic
  • Joomla! vulnerabilities reported one after another

Contents

  1. Preface
  2. Executive Summary
  3. Trends in Severe Incidents at the JSOC
     3.1 Trends in severe incidents
     3.2 Analysis of severe incidents
     3.3 Attack traffic detected numerous times
      3.3.1 iOS application contamination with XcodeGhost
      3.3.2 Attack traffic originating from a specific network range allocated to France
  4. Topics of This Volume
     4.1 Unauthorized Web server manipulations by WebShells
      4.1.1 Detection status of attack traffic that attempts unauthorized file upload, and target vulnerabilities
      4.1.2 WebShell capabilities and an overview of how they work
      4.1.3 Preventions against unauthorized file upload attempts and recommendations regarding the early detection of such attempts
     4.2 Ransomware-infected traffic
      4.2.1 Ransomware-infected traffic incidents
      4.2.2 Ransomware infection routes
      4.2.3 Countermeasures against ransomware
     4.3 Joomla! vulnerabilities
      4.3.1 SQL injection vulnerabilities in Joomla!
      4.3.2 Overview of code execution vulnerability in Joomla!
  5. Conclusion
JSOC INSIGHT vol.11 English Edition

Click here to download PDF file.