{"id":1834,"date":"2022-12-26T16:27:21","date_gmt":"2022-12-26T16:27:21","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1284"},"modified":"2022-12-26T16:27:21","modified_gmt":"2022-12-26T16:27:21","slug":"%e3%83%a9%e3%83%b3%e3%82%b5%e3%83%a0%e3%82%a6%e3%82%a7%e3%82%a2","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ja\/%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e6%94%bb%e6%92%83\/%e3%83%a9%e3%83%b3%e3%82%b5%e3%83%a0%e3%82%a6%e3%82%a7%e3%82%a2\/","title":{"rendered":"\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3068\u306f\uff1f\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3068\u306f\u4f55\u304b\uff1f"},"content":{"rendered":"<p>Ransomware is a type of malicious software or malware that virtually holds your data hostage, locking up your computer and threatening to keep it locked until you pay the attacker\u2019s ransom. The International Business Machines Corporation (IBM) reports that in 2021, ransomware attacks accounted for 21% of all cyberattacks and resulted in a staggering USD 20 billion loss.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-ransomware\">\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3068\u306f\u4f55\u3067\u3059\u304b\uff1f<\/h2>\n\n\n<p>In the past, ransomware attacks were aimed solely at locking a person\u2019s data or device until they paid money to unlock it.&nbsp;<\/p>\n\n\n\n<p>Nowadays, however, cybercriminals are taking matters to a whole new level. The 2022 X-Force Threat Intelligence Index revealed that virtually all ransomware attacks have now adopted the \u2018double extortion\u2019 strategy, which not only locks data but also expects a ransom payment to prevent theft. In addition, these malicious cybercriminals are introducing an additional threat in their repertoire \u2013 triple extortion campaigns involving Distributed Denial of Service (DDoS) assaults \u2013 and they are becoming increasingly common.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomware-and-malware\">\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3068\u30de\u30eb\u30a6\u30a7\u30a2 <\/h2>\n\n\n<p>\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3092\u3088\u308a\u3088\u304f\u7406\u89e3\u3059\u308b\u305f\u3081\u306b\u306f\u3001\u307e\u305a\u30de\u30eb\u30a6\u30a7\u30a2\uff08\u60aa\u610f\u306e\u3042\u308b\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\uff09\u3068\u306f\u4f55\u304b\u3001\u305d\u306e\u5f71\u97ff\u3092\u8abf\u3079\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002.<\/p>\n\n\n\n<p>Malware \u2013 a term that prompts more questions than answers. Is the malicious software, or is it simply being used for nefarious purposes? As with many aspects of cybersecurity, there\u2019s no single answer to this question; instead, it\u2019s an intricate and complex area in which we must consider multiple factors. The software can be malevolent in its own right; however, the human who operates said software is ultimately responsible for determining whether and how malicious it will be.<\/p>\n\n\n\n<p>Cyber threats are broad, from destructive viruses to crafty Trojans. But there\u2019s a unique strain even more dangerous than these \u2013 ransomware. Uncover the mystery behind this malicious software, and learn how to protect yourself from it!<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-does-ransomware-work\">\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306f\u3069\u306e\u3088\u3046\u306b\u6a5f\u80fd\u3057\u307e\u3059\u304b\uff1f<\/h2>\n\n\n<p>Ransomware is designed to lock access and all content within the target computer or network until its attacker receives payment. Even more sophisticated attacks may initiate disk-level encryption with such intensity that, without paying the ransom, it would be impossible to decrypt any files. From 2013 to 2020, the FBI\u2019s Internet Crime Complaint Center noticed a dramatic surge of 243% in reported ransomware occurrences.<\/p>\n\n\n\n<p>\u4ed6\u306e\u5f62\u614b\u306e\u30b5\u30a4\u30d0\u30fc\u72af\u7f6a\u3068\u306f\u7570\u306a\u308a\u3001\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306f\u88ab\u5bb3\u8005\u304c\u72af\u7f6a\u8005\u3068\u5354\u529b\u3059\u308b\u3053\u3068\u3092\u5fc5\u8981\u3068\u3057\u307e\u3059\u3002.<\/p>\n\n\n\n<p>\u5f7c\u3089\u306e\u30a6\u30a7\u30d6\u30b5\u30a4\u30c8\u306b\u8a18\u8f09\u3055\u308c\u3066\u3044\u308b\u3088\u3046\u306b\u3001FBI\u306f\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306b\u3088\u308b\u653b\u6483\u3092\u53d7\u3051\u305f\u5834\u5408\u3001\u8eab\u4ee3\u91d1\u3092\u652f\u6255\u308f\u306a\u3044\u3088\u3046\u8b66\u544a\u3057\u3066\u3044\u307e\u3059\u3002\u8eab\u4ee3\u91d1\u3092\u652f\u6255\u3063\u3066\u3082\u3001\u7d44\u7e54\u3084\u88ab\u5bb3\u8005\u304c\u30c7\u30fc\u30bf\u3078\u306e\u30a2\u30af\u30bb\u30b9\u3092\u53d6\u308a\u623b\u305b\u308b\u4fdd\u8a3c\u306f\u306a\u304f\u3001\u30ea\u30b9\u30af\u304c\u9ad8\u304f\u4fe1\u983c\u6027\u306e\u4f4e\u3044\u89e3\u6c7a\u7b56\u3067\u3059\u3002\u6b8b\u5ff5\u306a\u304c\u3089\u3001\u653b\u6483\u8005\u304c\u8981\u6c42\u3057\u305f\u8eab\u4ee3\u91d1\u3092\u652f\u6255\u3063\u305f\u306b\u3082\u304b\u304b\u308f\u3089\u305a\u3001\u6b63\u5f53\u306a\u5fa9\u53f7\u30ad\u30fc\u3092\u53d7\u3051\u53d6\u308c\u306a\u3044\u30b1\u30fc\u30b9\u3082\u3042\u308a\u307e\u3059\u3002\u305f\u3068\u3048\u53d7\u3051\u53d6\u3063\u305f\u3068\u3057\u3066\u3082\u3001\u3059\u3079\u3066\u306e\u30d5\u30a1\u30a4\u30eb\u304c\u56de\u5fa9\u53ef\u80fd\u3067\u3042\u308b\u3068\u306f\u9650\u308a\u307e\u305b\u3093\u3002\u8eab\u4ee3\u91d1\u3092\u652f\u6255\u3046\u3053\u3068\u3067\u3001\u72af\u7f6a\u8005\u304c\u7d44\u7e54\u3084\u500b\u4eba\u306b\u5bfe\u3057\u3066\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u653b\u6483\u3092\u7d9a\u3051\u308b\u52d5\u6a5f\u3092\u4e0e\u3048\u308b\u3060\u3051\u3067\u306a\u304f\u3001\u4ed6\u306e\u6f5c\u5728\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u72af\u7f6a\u8005\u306b\u3068\u3063\u3066\u3082\u9b45\u529b\u7684\u306b\u306a\u308a\u307e\u3059\u3002.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"popular-ransomware-variations\"><strong>\u4eba\u6c17\u306e\u3042\u308b\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u30d0\u30ea\u30a8\u30fc\u30b7\u30e7\u30f3<\/strong><\/h3>\n\n\n<p>With numerous ransomware varieties existing, it is no wonder that some are more successful than others. In fact, there are a select few who have risen above the rest in terms of effectiveness and popularity \u2013 making them stand out from their counterparts.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"1-ryuk\"><strong>1. \u30ea\u30e5\u30fc\u30af<\/strong><\/h3>\n\n\n<p>Ryuk is a type of ransomware that targets a specific type of user. It is usually delivered through an email or someone\u2019s login information to get into a system. Once the system is infected, Ryuk encrypts some files and then asks for money to give them back.<\/p>\n\n\n\n<p>\u30ea\u30e5\u30fc\u30af\u306f\u3001\u6700\u3082\u9ad8\u984d\u306a\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u4e00\u3064\u3068\u3057\u3066\u60aa\u540d\u9ad8\u304f\u3001\u5e73\u5747\u7684\u306a\u8eab\u4ee3\u91d1\u8981\u6c42\u984d\u304c$1\u767e\u4e07\u3092\u8d85\u3048\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u305f\u3081\u3001\u30ea\u30e5\u30fc\u30af\u95a2\u9023\u306e\u30b5\u30a4\u30d0\u30fc\u72af\u7f6a\u8005\u306f\u3001\u3053\u308c\u3089\u306e\u6cd5\u5916\u306a\u652f\u6255\u3044\u3092\u884c\u3046\u305f\u3081\u306e\u5341\u5206\u306a\u8ca1\u6e90\u3092\u6301\u3064\u4f01\u696d\u3092\u5b9a\u671f\u7684\u306b\u6a19\u7684\u306b\u3057\u3066\u3044\u307e\u3059\u3002.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"2revilnbspsodinokibi\"><strong>2. REvil\uff08\u30bd\u30c7\u30a3\u30ce\u30ad\u30d3\uff09<\/strong><\/h3>\n\n\n<p>REvil\uff08\u30bd\u30c7\u30a3\u30ce\u30ad\u30d3\u3068\u3082\u547c\u3070\u308c\u308b\uff09\u306f\u3001\u4e3b\u306b\u5927\u898f\u6a21\u306a\u4f01\u696d\u3092\u60a9\u307e\u305b\u308b\u60aa\u610f\u306e\u3042\u308b\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u4e00\u7a2e\u3067\u3059\u3002.<\/p>\n\n\n\n<p>Infamous REvil ransomware, operated by the Russian-speaking group since 2019, is one of the most notorious cyber threats on the internet today. For example, they have been held responsible for significant breaches such as \u2018Kaseya\u2019 and \u2018JBS\u2019, making them a serious threat to businesses across numerous industries.<\/p>\n\n\n\n<p>\u904e\u53bb\u6570\u5e74\u9593\u3001REvil\u306f\u6700\u3082\u9ad8\u984d\u306a\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u30bf\u30a4\u30c8\u30eb\u3092\u5de1\u3063\u3066\u30ea\u30e5\u30fc\u30af\u3068\u7af6\u4e89\u3057\u3066\u304d\u307e\u3057\u305f\u3002\u3053\u306e\u60aa\u610f\u306e\u3042\u308b\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u304c\u6700\u5927$800,000\u306e\u8eab\u4ee3\u91d1\u3092\u8981\u6c42\u3057\u305f\u3068\u3044\u3046\u5831\u544a\u304c\u6d6e\u4e0a\u3057\u3066\u3044\u307e\u3059\u3002.<\/p>\n\n\n\n<p>Initially, REvil was just another traditional ransomware variant, yet it has since progressed. Presently, they use the Double Extortion technique \u2013 not only encrypting files but also stealing data from businesses. This means that apart from requesting a ransom to decrypt data, attackers will threaten to publicly expose the stolen information if an additional payment is not rendered.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"3nbspmaze\"><strong>3. \u30e1\u30a4\u30ba<\/strong><\/h3>\n\n\n<p>The Maze ransomware has gained notoriety for its innovative approach to extortion. It not only encrypts files but also steals sensitive data from the victim\u2019s computer and threatens to make it public or sell it if a ransom is not paid. This menacing strategy puts targets in an even more difficult situation \u2013 either pay up or face much higher costs due to an expensive data breach.<\/p>\n\n\n\n<p>Although the Maze ransomware group has disbanded, this does not signify that ransomware threats are now obsolete. Several former affiliates of Maze have shifted to using Egregor ransomware instead, and it is widely speculated that these three variants \u2013 Sekhmet being the third \u2013 share an identical originator.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"4-dearcry\"><strong>4. \u30c7\u30a3\u30a2\u30af\u30e9\u30a4<\/strong><\/h3>\n\n\n<p>2021\u5e743\u6708\u3001Microsoft\u306fExchange\u30b5\u30fc\u30d0\u30fc\u5185\u306e4\u3064\u306e\u8106\u5f31\u6027\u306b\u5bfe\u3059\u308b\u91cd\u8981\u306a\u66f4\u65b0\u3092\u30ea\u30ea\u30fc\u30b9\u3057\u307e\u3057\u305f\u304c\u3001\u3059\u3079\u3066\u306e\u4eba\u304c\u6f5c\u5728\u7684\u306a\u88ab\u5bb3\u304b\u3089\u81ea\u5206\u3092\u5b88\u308b\u305f\u3081\u306e\u4fee\u6b63\u3092\u9069\u7528\u3059\u308b\u524d\u306b\u3001\u30c7\u30a3\u30a2\u30af\u30e9\u30a4\u304c\u3053\u308c\u3089\u306e\u5f31\u70b9\u3092\u60aa\u7528\u3059\u308b\u305f\u3081\u306b\u7279\u5225\u306b\u8a2d\u8a08\u3055\u308c\u305f\u65b0\u3057\u3044\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u30d0\u30ea\u30a2\u30f3\u30c8\u3092\u6295\u5165\u3057\u307e\u3057\u305f\u3002.<\/p>\n\n\n\n<p>\u30c7\u30a3\u30a2\u30af\u30e9\u30a4\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306f\u591a\u304f\u306e\u30d5\u30a1\u30a4\u30eb\u3092\u30ed\u30c3\u30af\u3057\u3001\u30e6\u30fc\u30b6\u30fc\u306e\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u306b\u30e9\u30f3\u30b5\u30e0\u30ce\u30fc\u30c8\u3092\u6b8b\u3057\u3001\u30a2\u30af\u30bb\u30b9\u3092\u56de\u5fa9\u3059\u308b\u65b9\u6cd5\u3092\u5b66\u3076\u305f\u3081\u306b\u305d\u306e\u904b\u55b6\u8005\u306b\u9023\u7d61\u3059\u308b\u3088\u3046\u6307\u793a\u3057\u307e\u3059\u3002.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"5-lapsus\"><strong>5. \u30e9\u30d7\u30b5\u30b9$<\/strong><\/h3>\n\n\n<p>The South American ransomware gang, Lapsus$, has been linked to cyberattacks on noteworthy targets worldwide. With intimidation and the potential for sensitive data exposure, the cyber gang has established a name for itself by extorting its victims unless their demands are met. They have bragged about penetrating Nvidia, Samsung, and Ubisoft, amongst other global organizations.\u00a0This group utilises pilfered source code to make malicious files appear as legitimate software.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"6-lockbit\"><strong>6. \u30ed\u30c3\u30af\u30d3\u30c3\u30c8<\/strong><\/h3>\n\n\n<p>\u30ed\u30c3\u30af\u30d3\u30c3\u30c8\u306f\u30c7\u30fc\u30bf\u3078\u306e\u30a2\u30af\u30bb\u30b9\u3092\u9632\u3050\u305f\u3081\u306b\u4f5c\u3089\u308c\u305f\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u3067\u30012019\u5e749\u6708\u304b\u3089\u5b58\u5728\u3057\u3066\u3044\u307e\u3059\u3002\u6700\u8fd1\u3067\u306f\u3001\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30fb\u30a2\u30ba\u30fb\u30a2\u30fb\u30b5\u30fc\u30d3\u30b9\uff08RaaS\uff09\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u306f\u3001\u4eba\u3005\u304c\u4ed6\u4eba\u306e\u30c7\u30fc\u30bf\u3078\u306e\u30a2\u30af\u30bb\u30b9\u3092\u9632\u3050\u305f\u3081\u306b\u305d\u308c\u3092\u4f7f\u7528\u3059\u308b\u305f\u3081\u306b\u652f\u6255\u3046\u3053\u3068\u304c\u3067\u304d\u308b\u3053\u3068\u3092\u610f\u5473\u3057\u307e\u3059\u3002.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomware-costly-consequencesnbsp\">\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u9ad8\u984d\u306a\u7d50\u679c <\/h2>\n\n\n<p>People dealing with ransomware are often reticent to admit the amount of ransom they have paid. As outlined in the report Definitive Guide to Ransomware 2022, ransom demands have increased drastically; what used to comprise only single-digit payments has now expanded into seven and eight-digit figures. In the most extreme instances, companies may need to pay a hefty ransom of USD 40-80 million for their data to be returned. Yet these payments aren\u2019t the only cost associated with ransomware attacks; other direct and indirect costs can compound an organization\u2019s financial burden. As reported in IBM\u2019s Cost of Data Breach 2021 study, the standard cost of ransomware attacks without including ransom payments amounted to a staggering USD 4.62 million on average.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"the-dch-hospitals-case\">DCH\u75c5\u9662\u306e\u30b1\u30fc\u30b9<\/h3>\n\n\n<p>DCH\u306f\u30a2\u30e9\u30d0\u30de\u5dde\u30bf\u30b9\u30ab\u30eb\u30fc\u30b5\u306b\u3042\u308b\u5730\u57df\u533b\u7642\u30bb\u30f3\u30bf\u30fc\u3067\u30011923\u5e74\u304b\u3089\u904b\u55b6\u3055\u308c\u3066\u3044\u307e\u3059\u3002.<\/p>\n\n\n\n<p>On October 1st, 2019, DCH Hospitals got attacked by ransomware. Everything electronic was down. They couldn\u2019t take any new patients and had to use all paper for everything.<\/p>\n\n\n\n<p>DCH\u306e\u4ee3\u8868\u8005\u306f\u3001\u8ab0\u304b\u304c\u7834\u640d\u3057\u305f\u30e1\u30fc\u30eb\u306e\u6dfb\u4ed8\u30d5\u30a1\u30a4\u30eb\u3092\u958b\u3044\u3066\u3084\u308a\u53d6\u308a\u3057\u305f\u3068\u304d\u306b\u30b7\u30b9\u30c6\u30e0\u304c\u4fb5\u5bb3\u3055\u308c\u305f\u3053\u3068\u3092\u660e\u3089\u304b\u306b\u3057\u307e\u3057\u305f\u3002\u5e78\u3044\u306a\u3053\u3068\u306b\u3001\u60a3\u8005\u60c5\u5831\u306f\u5371\u967a\u306b\u3055\u3089\u3055\u308c\u307e\u305b\u3093\u3067\u3057\u305f\u3002.<\/p>\n\n\n\n<p>DCH\u75c5\u9662\u30b7\u30b9\u30c6\u30e0\u306f\u3001DCH\u5730\u57df\u533b\u7642\u30bb\u30f3\u30bf\u30fc\u3001\u30ce\u30fc\u30b9\u30dd\u30fc\u30c8\u533b\u7642\u30bb\u30f3\u30bf\u30fc\u3001\u30d5\u30a7\u30a4\u30a8\u30c3\u30c8\u533b\u7642\u30bb\u30f3\u30bf\u30fc\u3068\u3044\u30463\u3064\u306e\u4e3b\u8981\u306a\u75c5\u9662\u3092\u8a87\u308a\u3001\u897f\u30a2\u30e9\u30d0\u30de\u306e\u5927\u90e8\u5206\u306b\u30b5\u30fc\u30d3\u30b9\u3092\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u3089\u306e3\u3064\u306e\u533b\u7642\u65bd\u8a2d\u306f850\u4ee5\u4e0a\u306e\u30d9\u30c3\u30c9\u3092\u63d0\u4f9b\u3057\u3001\u5e74\u959332,000\u4eba\u4ee5\u4e0a\u306e\u60a3\u8005\u3092\u53d7\u3051\u5165\u308c\u3066\u3044\u307e\u3059\u3002.<\/p>\n\n\n\n<p>10\u67085\u65e5\u571f\u66dc\u65e5\u3001\u30b7\u30b9\u30c6\u30e0\u3078\u306e\u30a2\u30af\u30bb\u30b9\u3092\u8fc5\u901f\u306b\u53d6\u308a\u623b\u3059\u305f\u3081\u306b\u3001DCH\u75c5\u9662\u306f\u8eab\u4ee3\u91d1\u3092\u652f\u6255\u3044\u3001\u653b\u6483\u8005\u304b\u3089\u5fa9\u53f7\u30ad\u30fc\u3092\u53d6\u5f97\u3059\u308b\u3053\u3068\u3092\u9078\u629e\u3057\u307e\u3057\u305f\u3002\u3057\u304b\u3057\u3001\u5f7c\u3089\u306f\u652f\u6255\u3063\u305f\u91d1\u984d\u3092\u958b\u793a\u3057\u306a\u3044\u3053\u3068\u306b\u6c7a\u3081\u307e\u3057\u305f\u3002\u533b\u7642\u30b7\u30b9\u30c6\u30e0\u306f\u91cd\u8981\u3067\u3042\u308a\u3001\u30c7\u30fc\u30bf\u306e\u640d\u5931\u3084\u4e2d\u65ad\u306e\u53ef\u80fd\u6027\u306b\u76f4\u9762\u3059\u308b\u3088\u308a\u3082\u3001\u8eab\u4ee3\u91d1\u3092\u652f\u6255\u3046\u65b9\u304c\u6709\u76ca\u3067\u3042\u308b\u3068\u898b\u306a\u3055\u308c\u308b\u3053\u3068\u304c\u3088\u304f\u3042\u308a\u307e\u3059\u3002\u5f7c\u3089\u306e\u30b7\u30b9\u30c6\u30e0\u306b\u4fdd\u5b58\u3055\u308c\u3066\u3044\u308b\u6a5f\u5bc6\u60c5\u5831\u306f\u5931\u3046\u306b\u306f\u3042\u307e\u308a\u306b\u3082\u8cb4\u91cd\u3067\u3059\u3002DCH\u75c5\u9662\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u4fb5\u5bb3\u3059\u308b\u305f\u3081\u306b\u4f7f\u7528\u3055\u308c\u305f\u60aa\u610f\u306e\u3042\u308b\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306f\u3001\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30e1\u30fc\u30eb\u3092\u958b\u3044\u3066\u6c5a\u67d3\u3055\u308c\u305f\u6dfb\u4ed8\u30d5\u30a1\u30a4\u30eb\u3092\u542b\u3080\u30e1\u30fc\u30eb\u3092\u958b\u3044\u305f\u5f93\u696d\u54e1\u306b\u3088\u3063\u3066\u77e5\u3089\u305a\u306b\u4fc3\u9032\u3055\u308c\u307e\u3057\u305f\u3002\u3053\u308c\u306b\u3088\u308a\u3001\u30de\u30eb\u30a6\u30a7\u30a2\u304c\u30a2\u30af\u30bb\u30b9\u3092\u5f97\u3066\u3001\u305d\u306e\u5f8c\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306b\u611f\u67d3\u3057\u307e\u3057\u305f\u3002.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"5-steps-to-prevent-becoming-a-ransomware-victim\">\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u88ab\u5bb3\u8005\u306b\u306a\u3089\u306a\u3044\u305f\u3081\u306e5\u3064\u306e\u30b9\u30c6\u30c3\u30d7<\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"1-train-your-employees-about-cybersecurity-threatsnbsp\">1. \u5f93\u696d\u54e1\u306b\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u8105\u5a01\u306b\u3064\u3044\u3066\u6559\u80b2\u3059\u308b\u3002. <\/h3>\n\n\n<p>\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u304b\u3089\u81ea\u5206\u305f\u3061\u3092\u5b88\u308a\u3001\u8077\u5834\u3067\u306e\u767a\u751f\u3092\u7279\u5b9a\u3067\u304d\u308b\u3088\u3046\u306b\u3059\u308b\u305f\u3081\u306b\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u5bfe\u3059\u308b\u500b\u3005\u306e\u8cac\u4efb\u3092\u8a8d\u8b58\u3059\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002\u3059\u3079\u3066\u306e\u5f93\u696d\u54e1\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u30b9\u30da\u30fc\u30b9\u306e\u8105\u5a01\u3092\u7279\u5b9a\u3057\u9632\u6b62\u3059\u308b\u305f\u3081\u306e\u5c02\u9580\u7684\u306a\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0\u3092\u53d7\u3051\u308b\u3079\u304d\u3067\u3059\u3002\u3057\u304b\u3057\u3001\u6700\u7d42\u7684\u306b\u306f\u3001\u5404\u500b\u4eba\u304c\u53d7\u3051\u53d6\u3063\u305f\u60c5\u5831\u3092\u6d3b\u7528\u3057\u3066\u3001\u65e5\u5e38\u751f\u6d3b\u306e\u4e2d\u3067\u6f5c\u5728\u7684\u306a\u30ea\u30b9\u30af\u3092\u6b63\u78ba\u306b\u8a55\u4fa1\u3059\u308b\u8cac\u4efb\u304c\u3042\u308a\u307e\u3059\u3002DCH\u75c5\u9662\u306e\u4e8b\u4ef6\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u5bfe\u3059\u308b\u500b\u4eba\u7684\u306a\u7406\u89e3\u3092\u6301\u3064\u3053\u3068\u304c\u3069\u308c\u307b\u3069\u4fa1\u5024\u304c\u3042\u308b\u304b\u3092\u793a\u3059\u91cd\u8981\u306a\u4f8b\u3067\u3059\u3002.<\/p>\n\n\n\n<p>The company must inform the employee of the potential risks of opening email attachments from unknown senders, particularly in a work environment. When in doubt, it\u2019s always best to consult someone with experience before opening any messages, links or attachments. Many businesses have an in-house IT department that will take any reports concerning a phishing attempt to confirm if it is legitimate to the employee. If the message comes from a reliable source like your bank account provider or acquaintances you know personally, contact them directly and confirm that they sent the message and its contents before clicking on any links provided. This way, you can protect yourself from potential cyber-attacks.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"2-back-up-your-files\">2. \u30d5\u30a1\u30a4\u30eb\u3092\u30d0\u30c3\u30af\u30a2\u30c3\u30d7\u3059\u308b\u3002.<\/h3>\n\n\n<p>If you\u2019re ever targeted by ransomware or have some data lost in an attack and don\u2019t want to pay the ransom, having a secure backup of your most valuable information is essential.<\/p>\n\n\n\n<p>\u60aa\u610f\u306e\u3042\u308b\u653b\u6483\u306e\u7d50\u679c\u3092\u6700\u5c0f\u9650\u306b\u6291\u3048\u308b\u305f\u3081\u306b\u3001DCH\u75c5\u9662\u306f\u4e8b\u4ef6\u306e\u524d\u306b\u4e88\u9632\u63aa\u7f6e\u3092\u8b1b\u3058\u3001\u91cd\u8981\u306a\u30d5\u30a1\u30a4\u30eb\u3092\u30d0\u30c3\u30af\u30a2\u30c3\u30d7\u3059\u308b\u3079\u304d\u3067\u3057\u305f\u3002\u30d0\u30c3\u30af\u30a2\u30c3\u30d7\u304c\u3042\u308c\u3070\u3001\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306b\u3088\u308b\u4e2d\u65ad\u3092\u53d7\u3051\u305a\u306b\u55b6\u696d\u3092\u7d9a\u3051\u308b\u3053\u3068\u304c\u3067\u304d\u305f\u3067\u3057\u3087\u3046\u3002.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"3-keep-your-software-updated\">3. \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u3092\u6700\u65b0\u306e\u72b6\u614b\u306b\u4fdd\u3064\u3002.<\/h3>\n\n\n<p>\u30b5\u30a4\u30d0\u30fc\u72af\u7f6a\u8005\u306f\u3001\u65e2\u5b58\u306e\u5f31\u70b9\u3092\u5229\u7528\u3057\u3066\u60aa\u610f\u306e\u3042\u308b\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u3092\u30c7\u30d0\u30a4\u30b9\u3084\u30b7\u30b9\u30c6\u30e0\u306b\u5c0e\u5165\u3059\u308b\u3053\u3068\u304c\u3088\u304f\u3042\u308a\u307e\u3059\u3002\u672a\u4fee\u6b63\u307e\u305f\u306f\u30bc\u30ed\u30c7\u30a4\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u6b20\u9665\u306f\u3001\u30c7\u30b8\u30bf\u30eb\u30bb\u30fc\u30d5\u30c6\u30a3\u696d\u754c\u306b\u77e5\u3089\u308c\u3066\u3044\u306a\u3044\u304b\u3001\u7279\u5b9a\u3055\u308c\u3066\u3044\u308b\u304c\u5bfe\u51e6\u3055\u308c\u3066\u3044\u306a\u3044\u305f\u3081\u3001\u5371\u967a\u3067\u3059\u3002\u7279\u5b9a\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30b0\u30eb\u30fc\u30d7\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u72af\u7f6a\u8005\u304b\u3089\u30bc\u30ed\u30c7\u30a4\u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u8cfc\u5165\u3057\u3001\u60aa\u610f\u306e\u3042\u308b\u64cd\u4f5c\u306b\u4f7f\u7528\u3057\u3066\u3044\u308b\u3053\u3068\u304c\u89b3\u5bdf\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u307e\u305f\u3001\u30cf\u30c3\u30ab\u30fc\u304c\u4fee\u6b63\u6e08\u307f\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u6b20\u9665\u3092\u5229\u7528\u3057\u3066\u30b7\u30b9\u30c6\u30e0\u306b\u4fb5\u5165\u3057\u3001\u653b\u6483\u3092\u958b\u59cb\u3059\u308b\u3053\u3068\u3082\u77e5\u3089\u308c\u3066\u3044\u307e\u3059\u3002.&nbsp;<\/p>\n\n\n\n<p>\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u3084\u30aa\u30da\u30ec\u30fc\u30c6\u30a3\u30f3\u30b0\u30b7\u30b9\u30c6\u30e0\u306e\u8106\u5f31\u6027\u3092\u72d9\u3063\u305f\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u653b\u6483\u304b\u3089\u4fdd\u8b77\u3059\u308b\u305f\u3081\u306b\u3001\u5b9a\u671f\u7684\u306b\u30d1\u30c3\u30c1\u3092\u9069\u7528\u3059\u308b\u3053\u3068\u304c\u91cd\u8981\u3067\u3059\u3002.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"4-install-and-update-cybersecurity-tools\">4. \u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c4\u30fc\u30eb\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3057\u3066\u66f4\u65b0\u3059\u308b<\/h3>\n\n\n<p>It\u2019s essential to upgrade cybersecurity tools \u2013 anti-malware and antivirus software, firewalls, secure web gateways, as well as enterprise solutions such as endpoint detection and response (EDR), extended detection and response (XDR), which can help security teams detect malicious activity in real-time.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"5-implement-access-control-policies\">5. \u30a2\u30af\u30bb\u30b9\u5236\u5fa1\u30dd\u30ea\u30b7\u30fc\u3092\u5b9f\u65bd\u3059\u308b<\/h3>\n\n\n<p>\u7d44\u7e54\u306f\u3001\u30de\u30eb\u30c1\u30d5\u30a1\u30af\u30bf\u30fc\u8a8d\u8a3c\u3001\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u3001\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30bb\u30b0\u30e1\u30f3\u30c6\u30fc\u30b7\u30e7\u30f3\u3001\u304a\u3088\u3073\u95a2\u9023\u3059\u308b\u4fdd\u8b77\u7b56\u3092\u5c55\u958b\u3057\u3066\u3001\u8106\u5f31\u306a\u30c7\u30fc\u30bf\u3092\u4fdd\u8b77\u3057\u3001\u6697\u53f7\u30ef\u30fc\u30e0\u304c\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u4e0a\u306e\u4ed6\u306e\u30de\u30b7\u30f3\u306b\u79fb\u52d5\u3059\u308b\u306e\u3092\u963b\u6b62\u3059\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomware-targets-individuals-as-well\">\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306f\u500b\u4eba\u3082\u6a19\u7684\u306b\u3057\u307e\u3059\u3002.<\/h2>\n\n\n<p>Generally, ransomware stories focus on the aftermath of corporate or healthcare system hacks; however, it is essential to recognize that individuals are not immune from these attacks. In fact, they occur more often than you may think. Individuals must be aware of ransomware\u2019s genuine danger when using the internet, as it could risk their safety and security.<\/p>\n\n\n\n<p>\u30b5\u30a4\u30d0\u30fc\u72af\u7f6a\u8005\u306f\u3001\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3092\u5c55\u958b\u3059\u308b\u969b\u306b\u3001\u6697\u53f7\u5316\u3068\u30ed\u30c3\u30af\u30b9\u30af\u30ea\u30fc\u30f3\u306e2\u3064\u306e\u4e3b\u8981\u306a\u65b9\u6cd5\u3092\u4f7f\u7528\u3057\u307e\u3059\u3002.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"encryption-ransomware\">\u6697\u53f7\u5316\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2<\/h3>\n\n\n<p>\u30b5\u30a4\u30d0\u30fc\u72af\u7f6a\u8005\u306f\u4e3b\u306b\u3001\u6697\u53f7\u5316\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3092\u4ecb\u3057\u3066\u30c7\u30d0\u30a4\u30b9\u306b\u30ed\u30fc\u30ab\u30eb\u306b\u4fdd\u5b58\u3055\u308c\u305f\u7279\u5b9a\u306e\u30d5\u30a1\u30a4\u30eb\u3092\u6a19\u7684\u306b\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u3089\u306e\u6587\u66f8\u3092\u9078\u3073\u51fa\u3059\u305f\u3081\u306b\u3001\u653b\u6483\u8005\u306f\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u306e\u30c8\u30ea\u30c3\u30af\u3084\u4ed6\u306e\u5f62\u614b\u306e\u60aa\u610f\u306e\u3042\u308b\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u3092\u4f7f\u7528\u3057\u3066\u30bf\u30fc\u30b2\u30c3\u30c8\u3092\u8abf\u67fb\u3057\u307e\u3059\u3002\u30d5\u30a1\u30a4\u30eb\u304c\u6697\u53f7\u5316\u3055\u308c\u308b\u3068\u3001\u88ab\u5bb3\u8005\u306f\u30c7\u30fc\u30bf\u306b\u30a2\u30af\u30bb\u30b9\u3059\u308b\u305f\u3081\u306b\u5fc5\u8981\u306a\u5fa9\u53f7\u30ad\u30fc\u3092\u53d7\u3051\u53d6\u308b\u305f\u3081\u306b\u8eab\u4ee3\u91d1\u3092\u8981\u6c42\u3055\u308c\u307e\u3059\u3002\u30cf\u30c3\u30ab\u30fc\u306f\u901a\u5e38\u3001\u3053\u306e\u6226\u7565\u3092\u4f7f\u7528\u3057\u3066\u3001\u4f01\u696d\u304c\u4fdd\u8b77\u3057\u3088\u3046\u3068\u61f8\u547d\u306b\u52aa\u529b\u3057\u3066\u3044\u308b\u6a5f\u5bc6\u60c5\u5831\u3084\u30bb\u30f3\u30b7\u30c6\u30a3\u30d6\u306a\u60c5\u5831\u306b\u30a2\u30af\u30bb\u30b9\u3057\u307e\u3059\u3002\u3053\u306e\u30a2\u30d7\u30ed\u30fc\u30c1\u306f\u60aa\u610f\u306e\u3042\u308b\u5f53\u4e8b\u8005\u306e\u9593\u3067\u4eba\u6c17\u304c\u3042\u308a\u3001\u4f01\u696d\u3084\u7d44\u7e54\u304c\u4e00\u822c\u7684\u306a\u30bf\u30fc\u30b2\u30c3\u30c8\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u3002.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"lock-screen-ransomware\">\u30ed\u30c3\u30af\u30b9\u30af\u30ea\u30fc\u30f3\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2<\/h3>\n\n\n<p>Conversely, lock screen ransomware encrypts specific files and renders a user\u2019s device completely inoperable. Locking-screen ransomware will lock up your device and display a full-screen message that is unmovable and unminimizable. You\u2019ll be asked to pay a ransom to unlock the system or retrieve lost data or files.<\/p>\n\n\n\n<p>These programs often employ fear tactics to pressure you into making payments, such as a ticking clock that warns it will delete all your files if time runs out. Cyber attackers often attempt to intimidate individuals by fabricating stories about their devices being linked with illegal activities or inappropriate material and threatening to report them to the authorities if the victim doesn\u2019t pay. To further coerce victims into paying the ransom, some ransomware developers leverage pornographic imagery and threaten that the victim cannot remove it without payment.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ultimately\">\u6700\u7d42\u7684\u306b<\/h2>\n\n\n<p>\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u3084\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c4\u30fc\u30eb\u3092\u5b9a\u671f\u7684\u306b\u66f4\u65b0\u3057\u3001\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\u30dd\u30ea\u30b7\u30fc\u3092\u5b9f\u65bd\u3057\u3001\u3053\u308c\u3089\u306e\u60aa\u610f\u306e\u3042\u308b\u30d7\u30ed\u30b0\u30e9\u30e0\u304c\u4f7f\u7528\u3059\u308b\u3055\u307e\u3056\u307e\u306a\u6226\u8853\u3092\u8a8d\u8b58\u3059\u308b\u306a\u3069\u3001\u52b9\u679c\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u3092\u5b9f\u65bd\u3057\u3066\u3001\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u653b\u6483\u304b\u3089\u30d3\u30b8\u30cd\u30b9\u3092\u4fdd\u8b77\u3057\u307e\u3059\u3002\u3055\u3089\u306b\u3001\u500b\u4eba\u306f\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u653b\u6483\u304b\u3089\u30c7\u30d0\u30a4\u30b9\u3092\u4fdd\u8b77\u3059\u308b\u305f\u3081\u306b\u7a4d\u6975\u7684\u306a\u63aa\u7f6e\u3092\u8b1b\u3058\u308b\u3079\u304d\u3067\u3059\u3002\u672a\u77e5\u306e\u9001\u4fe1\u8005\u304b\u3089\u306e\u30e1\u30fc\u30eb\u3092\u958b\u3044\u305f\u308a\u3001\u30ea\u30f3\u30af\u3092\u30af\u30ea\u30c3\u30af\u3057\u305f\u308a\u3059\u308b\u969b\u306b\u306f\u6ce8\u610f\u3092\u6255\u3044\u307e\u3057\u3087\u3046\u3002\u610f\u8b58\u3068\u614e\u91cd\u306a\u5b9f\u8df5\u3092\u6301\u3064\u3053\u3068\u3067\u3001\u30c7\u30b8\u30bf\u30eb\u4e16\u754c\u306b\u304a\u3051\u308b\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u8105\u5a01\u3092\u6e1b\u5c11\u3055\u305b\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002.<\/p>","protected":false},"excerpt":{"rendered":"<p>Ransomware is a type of malicious software or malware that virtually holds your data hostage, locking up your computer and threatening to keep it locked until you pay the attacker\u2019s\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ja\/%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e6%94%bb%e6%92%83\/%e3%83%a9%e3%83%b3%e3%82%b5%e3%83%a0%e3%82%a6%e3%82%a7%e3%82%a2\/\">\u7d9a\u304d\u3092\u8aad\u3080 <span class=\"screen-reader-text\">\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3068\u306f\uff1f\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3068\u306f\u4f55\u304b\uff1f<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1286,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-1834","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware: What it is And How To Protect Yourself<\/title>\n<meta name=\"description\" content=\"Learn everything you need to know about ransomware, how to protect yourself from it, and what to do if you become a victim.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ja\/\u30b5\u30a4\u30d0\u30fc\u653b\u6483\/\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware: What it is And How To Protect Yourself\" \/>\n<meta property=\"og:description\" content=\"Learn everything you need to know about ransomware, how to protect yourself from it, and what to do if you become a victim.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ja\/\u30b5\u30a4\u30d0\u30fc\u653b\u6483\/\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-26T16:27:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"626\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"11\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Ransomware: What it is And How To Protect Yourself\",\"datePublished\":\"2022-12-26T16:27:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/\"},\"wordCount\":2305,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg\",\"articleSection\":[\"Cyber Attacks\"],\"inLanguage\":\"ja\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/\",\"name\":\"Ransomware: What it is And How To Protect Yourself\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg\",\"datePublished\":\"2022-12-26T16:27:21+00:00\",\"description\":\"Learn everything you need to know about ransomware, how to protect yourself from it, and what to do if you become a victim.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg\",\"width\":1000,\"height\":626,\"caption\":\"Ransomware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware: What it is And How To Protect Yourself\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ja\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3068\u306f\uff1f\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3068\u306f\u4f55\u304b\uff1f","description":"\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306b\u3064\u3044\u3066\u77e5\u3063\u3066\u304a\u304f\u3079\u304d\u3059\u3079\u3066\u306e\u3053\u3068\u3001\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u304b\u3089\u81ea\u5206\u3092\u5b88\u308b\u65b9\u6cd5\u3001\u305d\u3057\u3066\u88ab\u5bb3\u8005\u306b\u306a\u3063\u305f\u5834\u5408\u306b\u4f55\u3092\u3059\u3079\u304d\u304b\u3092\u5b66\u3073\u307e\u3057\u3087\u3046\u3002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ja\/\u30b5\u30a4\u30d0\u30fc\u653b\u6483\/\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\/","og_locale":"ja_JP","og_type":"article","og_title":"Ransomware: What it is And How To Protect Yourself","og_description":"Learn everything you need to know about ransomware, how to protect yourself from it, and what to do if you become a victim.","og_url":"https:\/\/securitybriefing.net\/ja\/\u30b5\u30a4\u30d0\u30fc\u653b\u6483\/\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\/","og_site_name":"Security Briefing","article_published_time":"2022-12-26T16:27:21+00:00","og_image":[{"width":1000,"height":626,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"security","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"11\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Ransomware: What it is And How To Protect Yourself","datePublished":"2022-12-26T16:27:21+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/"},"wordCount":2305,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg","articleSection":["Cyber Attacks"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/","name":"\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3068\u306f\uff1f\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3068\u306f\u4f55\u304b\uff1f","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg","datePublished":"2022-12-26T16:27:21+00:00","description":"\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306b\u3064\u3044\u3066\u77e5\u3063\u3066\u304a\u304f\u3079\u304d\u3059\u3079\u3066\u306e\u3053\u3068\u3001\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u304b\u3089\u81ea\u5206\u3092\u5b88\u308b\u65b9\u6cd5\u3001\u305d\u3057\u3066\u88ab\u5bb3\u8005\u306b\u306a\u3063\u305f\u5834\u5408\u306b\u4f55\u3092\u3059\u3079\u304d\u304b\u3092\u5b66\u3073\u307e\u3057\u3087\u3046\u3002.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg","width":1000,"height":626,"caption":"Ransomware"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Ransomware: What it is And How To Protect Yourself"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d6\u30ea\u30fc\u30d5\u30a3\u30f3\u30b0","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d6\u30ea\u30fc\u30d5\u30a3\u30f3\u30b0","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"\u30ac\u30d0\u30e1\u30f3\u30c8\u30fb\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u8a8c\u306e\u30b7\u30cb\u30a2\u30fb\u30b9\u30bf\u30c3\u30d5\u30fb\u30e9\u30a4\u30bf\u30fc\u3002\u4ee5\u524d\u306fPYMNTS\u3068The Bay State Banner\u306b\u5bc4\u7a3f\u3057\u3001\u30ab\u30fc\u30cd\u30ae\u30fc\u30e1\u30ed\u30f3\u5927\u5b66\u3067\u30af\u30ea\u30a8\u30a4\u30c6\u30a3\u30d6\u30fb\u30e9\u30a4\u30c6\u30a3\u30f3\u30b0\u306e\u5b66\u58eb\u53f7\u3092\u53d6\u5f97\u3002\u30dc\u30b9\u30c8\u30f3\u90ca\u5916\u306b\u62e0\u70b9\u3092\u7f6e\u304f\u3002","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ja\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/posts\/1834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/comments?post=1834"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/posts\/1834\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/media\/1286"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/media?parent=1834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/categories?post=1834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/tags?post=1834"}],"curies":[{"name":"\u30ef\u30fc\u30c9\u30d7\u30ec\u30b9","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}