JPCERT/CC Eyes

JPCERT/CC Eyes

JPCERT Coordination Center official Blog

Language:

  • JSAC2026 -Day 2- Event
    佐々木 奈々恵(Nanae Sasaki)

    佐々木 奈々恵(Nanae Sasaki)

    February 27, 2026
    JSAC2026 -Day 2-
    Continuing from the previous report, this second installment introduce...

    Read more

  • JSAC2026 -Day 1- Event
    亀井 智矢(Tomoya Kamei)

    亀井 智矢(Tomoya Kamei)

    February 20, 2026
    JSAC2026 -Day 1-
    JPCERT/CC hosted JSAC2026 from January 21 to 23, 2026. JSAC is an annual conference dedicated to advancing the capabilities of security analysts by fostering the exchange of technical knowledge and operational insights related to incident analysis and response. Now in its ninth year, the event incorporated a new training program, expanding the program to three days. Across two days, the conference featured 17 presentations, three workshops, and six lightning talks....

    Read more

  • Multiple Threat Actors Rapidly Exploit React2Shell: A Case Study of Active Compromise Incident
    喜野 孝太(Kota Kino)

    喜野 孝太(Kota Kino)

    February 13, 2026
    Multiple Threat Actors Rapidly Exploit React2Shell: A Case Study of Active Compromise
    On December 3, 2025 (local time), a vulnerability allowing unauthenticated remote code execution in React Server Components (RSC) (CVE-2025-55182) was disclosed. JPCERT/CC has received multiple incident reports related to this attack. Among them, there was a case in which this vulnerability was exploited by multiple threat actors within a short period of time, resulting in multiple incidents occurring simultaneously, including website defacement. This article demonstrates how rapidly and indiscriminately attackers...

    Read more

  • YAMAGoya: A Real-time Client Monitoring Tool Using Sigma and YARA Rules Security Technology
    朝長 秀誠 (Shusei Tomonaga)

    朝長 秀誠 (Shusei Tomonaga)

    November 18, 2025
    YAMAGoya: A Real-time Client Monitoring Tool Using Sigma and YARA Rules
    In recent years, fileless malware and obfuscation techniques have made it increasingly difficult to detect suspicious activity by scanning files alone. To counter these threats, security researchers and malware analysts actively create and publish detection rules such as Sigma and YARA. However, many existing endpoint security tools rely on unique detection engines, instead of directly using Sigma or YARA. To address this problem, JPCERT/CC released the open-source threat hunting tool...

    Read more

  • Update on Attacks by Threat Group APT-C-60 Malware
    増渕 維摩(Yuma Masubuchi)

    増渕 維摩(Yuma Masubuchi)

    November 5, 2025
    Update on Attacks by Threat Group APT-C-60
    In JPCERT/CC Eyes, we previously reported on attacks conducted by Atta...

    Read more

  • TSUBAME Report Overflow (Apr-Jun 2025) TSUBAME
    鹿野 恵祐 (Keisuke Shikano)

    鹿野 恵祐 (Keisuke Shikano)

    October 28, 2025
    TSUBAME Report Overflow (Apr-Jun 2025)
    This TSUBAME Report Overflow series discuss monitoring trends of overseas TSUBAME sensors and other activities which the Internet Threat Monitoring Quarterly Reports do not include. This article covers the monitoring results for the period April to June 2025. Fluctuations in packets from Iran, potentially linked to Israel-Iran military conflict Between June 13 and around June 25, 2025, military conflict occurred between Israel and Iran. During this period, fluctuations were observed...

    Read more

  • CrossC2 Expanding Cobalt Strike Beacon to Cross-Platform Attacks Malware
    増渕 維摩(Yuma Masubuchi)

    増渕 維摩(Yuma Masubuchi)

    August 14, 2025
    CrossC2 Expanding Cobalt Strike Beacon to Cross-Platform Attacks
    From September to December 2024, JPCERT/CC has confirmed incidents involving CrossC2, the extension tool to create Cobalt Strike Beacon for Linux OS. The attacker employed CrossC2 as well as other tools such as PsExec, Plink, and Cobalt Strike in attempts to penetrate AD. Further investigation revealed that the attacker used custom malware (hereafter referred to as "ReadNimeLoader") as a loader for Cobalt Strike. Information submitted to VirusTotal suggests that this...

    Read more

  • Malware Identified in Attacks Exploiting Ivanti Connect Secure Vulnerabilities Malware
    増渕 維摩(Yuma Masubuchi)

    増渕 維摩(Yuma Masubuchi)

    July 18, 2025
    Malware Identified in Attacks Exploiting Ivanti Connect Secure Vulnerabilities
    JPCERT/CC Eyes previously introduced the malware SPAWNCHIMERA and Dslo...

    Read more

  • TSUBAME Report Overflow (Jan-Mar 2025) Cyber Metrics
    鹿野 恵祐 (Keisuke Shikano)

    鹿野 恵祐 (Keisuke Shikano)

    July 8, 2025
    TSUBAME Report Overflow (Jan-Mar 2025)
    This TSUBAME Report Overflow series discuss monitoring trends of overseas TSUBAME sensors and other activities which the Internet Threat Monitoring Quarterly Reports do not include. This article covers the monitoring results for the period January to March 2025. Trends of Fiscal Year 2024 in Japan At JPCERT/CC, we analyze the data collected from TSUBAME on a daily basis. This time, we would like to focus on incident cases related to...

    Read more

  • DslogdRAT Malware Installed in Ivanti Connect Secure Malware
    増渕 維摩(Yuma Masubuchi)

    増渕 維摩(Yuma Masubuchi)

    April 24, 2025
    DslogdRAT Malware Installed in Ivanti Connect Secure
    In a previous article of JPCERT/CC Eyes, we reported on SPAWNCHIMERA malware, which infects the target after exploiting the vulnerability in Ivanti Connect Secure. However, this is not the only malware observed in recent attacks. This time, we focus on another malware DslogdRAT and a web shell that were installed by exploiting a zero-day vulnerability at that time, CVE-2025-0282, during attacks against organizations in Japan around December 2024. Functionality of...

    Read more

  • Next 10 articles

Categories

  • Malware
  • Incident
  • Event
  • Vulnerability
  • Security Technology
  • Forensic
  • Cyber Metrics
  • ICS-OT
  • Other

Tags

  • Python
  • Conference
  • Datper
  • ChChes
  • Training
  • Statistics and Indicator
  • Tool
  • BlackTech
  • LogonTracer
  • Report
  • Splunk
  • ElasticStack
  • impfuzzy
  • volatility
  • RedLeaves
  • PlugX
  • DarkHotel
  • Banking malware
  • Pacific_Islands
  • CSIRT
  • Password
  • Policy
  • DDoS
  • APT
  • Trend
  • Africa
  • SecureCoding
  • SysmonSearch
  • JSAC
  • IoT
  • IIoT
  • Quasar
  • LODEINFO
  • Lazarus
  • Emotet
  • Phishing
  • Metrics
  • TSUBAME
  • Standard-Guideline
 

Authors

  • 鹿野 恵祐 (Keisuke Shikano)
  • 関口 晃弘 (Akihiro Sekiguchi)
  • 衛藤 亮介 (Ryosuke Eto)
  • 織戸 由美(Yumi Orito)
  • 福本 郁哉(Ikuya Fukumoto)
  • 石原 大移紀(Daiki Ishihara)
  • 登山 昌恵 (Masae Toyama)
  • 洞田 慎一 (Shinichi Horata)
  • 河野 一之 (Kazuyuki Kohno)
  • 水野 哲也 (Tetsuya Mizuno)
  • 村上 勇樹(Yuki Murakami)
  • 朝長 秀誠 (Shusei Tomonaga)
  • 戸塚 紀子(Noriko Totsuka)
  • 小宮山 功一朗 (Koichiro Sparky Komiyama)
  • 増渕 維摩(Yuma Masubuchi)
  • 堀 充孝(Mitsutaka Hori)
  • 喜野 孝太(Kota Kino)
  • 内田 有香子 (Yukako Uchida)
  • 佐條 研(Ken Sajo)
  • 佐々木 奈々恵(Nanae Sasaki)
  • 佐々木 勇人(Hayato Sasaki)
  • 伊藤 智貴 (Tomo Ito)
  • 亀井 智矢(Tomoya Kamei)
  • 中野 巧 (Takumi Nakano)
  • 中井 尚子(Shoko Nakai)
  • JPCERT/CC

Archives

  • 20263
  • 202515
  • 202417
  • 202318
  • 202219
  • 202120
  • 202021
  • 201918
  • 201812
  • 201717
  • 201618
  • 201520
  • 201418
  • 20137
  • 20122
  • 20118
  • 20104

JPCERT Coordination Center

JPCERT/CC
8F Tozan Bldg, 4-4-2 Nihonbashi-Honcho, Chuo-ku, Tokyo 1030023 JAPAN

TEL: +81-3-6271-8901 FAX: +81-3-6271-8908

  • Privacy Policy
  • Disclaimer

© 1996-2026 JPCERT/CC