ノーマルビュー

After Six Years, Two Pentesters Arrested in Iowa Receive $600,000 Settlement

2026年2月9日 04:35

🤖 AI Summary

**要約(日本語)**

イオワ州ダラス郡の裁判所で、ペネトレーションテスター(ペンテスター)であるジャスティン・ウィン(29歳)とゲイリー・デ・メルキオ(43歳)が、州司法局から依頼されたシステムのセキュリティテストのために深夜に侵入した。警官に身分証明の手紙を提示し、州側の許可があることを確認されたにもかかわらず、郡保安官チャド・レナードは彼らを第三級重罪の侵入窃盗(後に軽罪の不法侵入)で逮捕し、約20時間拘留した。

逮捕後、刑事告訴は最終的に取り下げられたが、重罪での逮捕歴が就職活動に大きな支障を来したと主張し、二人は2021年に訴訟を提起。2026年1月、ダラス郡は二人に対し総額60万ドル(約8,000万円)の和解金を支払うことで合意した。

- **事件の経緯**:州司法局が委託したコールファイア・ラボズ社のペンテスターが裁判所に侵入。警官は許可の有無を疑問視し逮捕。
- **法的結果**:重罪の起訴は取り下げられたが、訴訟により和解金が支払われた。
- **関係者の見解**
- デ・メルキオ:「我々の仕事は正当で公共の利益にかなうものであった」
- ウィン:「この出来事はセキュリティ専門家に対し、政府支援の脆弱性調査が逮捕につながり得るという冷ややかなメッセージを送った」
- 郡検事マット・シュルツは「同様の事態が再び起これば、最大限に起訴する」と警告。

この和解は、政府が委託したセキュリティテストの実施方法と、法執行機関との協調不足がもたらすリスクを示す事例として注目されている。
"They were crouched down like turkeys peeking over the balcony," the county sheriff told Ars Technica. A half hour past midnight, they were skulking through a courthouse in Iowa's Dallas County on September 11 "carrying backpacks that remind me and several other deputies of maybe the pressure cooker bombs." More deputies arrived... Justin Wynn, 29 of Naples, Florida, and Gary De Mercurio, 43 of Seattle, slowly proceeded down the stairs with hands raised. They then presented the deputies with a letter that explained the intruders weren't criminals but rather penetration testers who had been hired by Iowa's State Court Administration to test the security of its court information system. After calling one or more of the state court officials listed in the letter, the deputies were satisfied the men were authorized to be in the building. But Sheriff Chad Leonard had the men arrested on felony third-degree burglary charges (later reduced to misdemeanor trespassing charges). He told them that while the state government may have wanted to test security, "The State of Iowa has no authority to allow you to break into a county building. You're going to jail." More than six years later, the Des Moines Register reports: Dallas County is paying $600,000 to two men who sued after they were arrested in 2019 while testing courthouse security for Iowa's Judicial Branch, their lawyer says. Gary DeMercurio and Justin Wynn were arrested Sept. 11, 2019, after breaking into the Dallas County Courthouse. They spent about 20 hours in jail and were charged with burglary and possession of burglary tools, though the charges were later dropped. The men were employees of Colorado-based cybersecurity firm Coalfire Labs, with whom state judicial officials had contracted to perform an analysis of the state court system's security. Judicial officials apologized and faced legislative scrutiny for how they had conducted the security test. But even though the burglary charges against DeMercurio and Wynn were dropped, their attorney previously said having a felony arrest on their records made seeking employment difficult. Now the two men are to receive a total of $600,000 as a settlement for their lawsuit, which has been transferred between state and federal courts since they first filed it in July 2021 in Dallas County. The case had been scheduled to go to trial Monday, Jan. 26 until the parties notified the court Jan. 23 of the impending deal... "The settlement confirms what we have said from the beginning: our work was authorized, professional, and done in the public interest," DeMercurio said in a statement. "What happened to us never should have happened. Being arrested for doing the job we were hired to do turned our lives upside down and damaged reputations we spent years building...." "This incident didn't make anyone safer," Wynn said. "It sent a chilling message to security professionals nationwide that helping government identify real vulnerabilities can lead to arrest, prosecution, and public disgrace. That undermines public safety, not enhances it." County Attorney Matt Schultz said dismissing the charges was the decision of his predecessor, according to the newspaper, and that he believed the sheriff did nothing wrong. "I am putting the public on notice that if this situation arises again in the future, I will prosecute to the fullest extent of the law."

Read more of this story at Slashdot.

Cyber-Espionage Group Breached Systems in 37 Nations, Security Researchers Say

2026年2月9日 00:34

🤖 AI Summary

**要約(日本語)**

- **対象と規模**
- アジア系のサイバースパイ集団が、過去1年間で政府機関や重要インフラを含む70以上の組織に侵入。
- 37か国以上で被害が確認され、5つの国家警察・国境管理機関、3つの財務省、1つの議会、別の国の高官などが標的に。

- **手口**
- カスタマイズされたフィッシングメールと、既知の未修正脆弱性を利用してネットワークに侵入。
- 侵入後はメールサーバーや金融取引、軍事・警察作戦に関する通信を閲覧・情報を抜き取った。
- 一部システムには数か月間検知されずに潜伏。

- **地政学的背景**
- スパイ活動は外交交渉、貿易交渉、政治的混乱、軍事行動などの国際情勢と連動して実施されたとみられる。

- **具体的な被害国・機関**
- チェコ共和国の政府機関、ブラジルの鉱山・エネルギー省、ベネズエラ政府とアジア企業の合弁事業施設など。
- ドイツ、ポーランド、ギリシャ、イタリア、キプロス、インドネシア、マレーシア、モンゴル、パナマなどでも活動が疑われている。

- **出所**
- 調査はサイバーセキュリティ企業 Palo Alto Networks(米カリフォルニア州サンタクララ)の脅威インテリジェンス部門 Unit 42 が実施。
- ハッカー集団の正確な出所国は公表されていない。

**結論**
このサイバースパイ集団は、国家レベルの情報を大量に取得するため、広範かつ高度に標的化された手法で世界中の政府・インフラに侵入している。未修正の脆弱性や高度なフィッシングが主な侵入経路であり、長期間にわたり検知が難しい点がリスクを増大させている。対策として、脆弱性の迅速なパッチ適用とフィッシング対策の強化が急務である。
An anonymous reader shared this report from Bloomberg: An Asian cyber-espionage group has spent the past year breaking into computer systems belonging to governments and critical infrastructure organizations in more than 37 countries, according to the cybersecurity firm Palo Alto Networks, Inc. The state-aligned attackers have infiltrated networks of 70 organizations, including five national law enforcement and border control agencies, according to a new research report from the company. They have also breached three ministries of finance, one country's parliament and a senior elected official in another, the report states. The Santa Clara, California-based firm declined to identify the hackers' country of origin. The spying operation was unusually vast and allowed the hackers to hoover up sensitive information in apparent coordination with geopolitical events, such as diplomatic missions, trade negotiations, political unrest and military actions, according to the report. They used that access to spy on emails, financial dealings and communications about military and police operations, the report states. The hackers also stole information about diplomatic issues, lurking undetected in some systems for months. "They use highly-targeted and tailored fake emails and known, unpatched security flaws to gain access to these networks," said Pete Renals, director of national security programs with Unit 42, the threat intelligence division of Palo Alto Networks.... Palo Alto Networks researchers confirmed that the group successfully accessed and exfiltrated sensitive data from some victims' email servers. Bloomberg writes that according to the cybersecurity firm, this campaign targeted government entities in the Czech Republic and the Ministry of Mines and Energy of Brazil, and also "likely compromised" a device associated with a facility operated by a joint venture between Venezuela's government and an Asian tech firm. The cyberattackers are "also suspected of being active in Germany, Poland, Greece, Italy, Cyprus, Indonesia, Malaysia, Mongolia, Panama, Greece and other countries, according to the report."

Read more of this story at Slashdot.

A New Era for Security? Anthropic's Claude Opus 4.6 Found 500 High-Severity Vulnerabilities

2026年2月8日 11:34

🤖 AI Summary

**要約(日本語)**

Anthropic が新たに公開した大規模言語モデル **Claude Opus 4.6** が、ほとんど指示を与えずにオープンソースライブラリ内の **500 件以上の未発見の高深刻度ゼロデイ脆弱性** を検出したことが報じられた。

- **テスト方法**:Anthropic の「frontier red team」がサンドボックス環境で脆弱性解析ツールを併用し、モデルの「アウト・オブ・ザ・ボックス」機能だけでバグ探索を実施。すべての脆弱性は社内メンバーまたは外部のセキュリティ研究者により検証済み。
- **主な発見例**
- **GhostScript**(PDF・PostScript 処理ユーティリティ)のクラッシュを引き起こす欠陥
- **OpenSC**(スマートカードデータ処理)のバッファオーバーフロー
- **CGIF**(GIF 画像処理)のバッファオーバーフロー
- **意義**:AI がサイバー防御に大きく貢献できる転換点を示すと同時に、攻撃側にも同様のツールが利用可能になるリスクも指摘された。
- **今後の展望**:Anthropic の赤チームリーダー Logan Graham は、AI を活用した脆弱性発見ツールの導入を検討中。「モデルは極めて優秀で、さらに性能が向上する見込みがある。将来的にオープンソースソフトウェアのセキュリティ確保手段の主流になる可能性もある」と語っている。

この結果は、AI が自動的にゼロデイ脆弱性を大量に発見できることを示し、ソフトウェアセキュリティ分野における新たな時代の幕開けとなる可能性がある。
Axios reports: Anthropic's latest AI model has found more than 500 previously unknown high-severity security flaws in open-source libraries with little to no prompting, the company shared first with Axios. Why it matters: The advancement signals an inflection point for how AI tools can help cyber defenders, even as AI is also making attacks more dangerous... Anthropic debuted Claude Opus 4.6, the latest version of its largest AI model, on Thursday. Before its debut, Anthropic's frontier red team tested Opus 4.6 in a sandboxed environment [including access to vulnerability analysis tools] to see how well it could find bugs in open-source code... Claude found more than 500 previously unknown zero-day vulnerabilities in open-source code using just its "out-of-the-box" capabilities, and each one was validated by either a member of Anthropic's team or an outside security researcher... According to a blog post, Claude uncovered a flaw in GhostScript, a popular utility that helps process PDF and PostScript files, that could cause it to crash. Claude also found buffer overflow flaws in OpenSC, a utility that processes smart card data, and CGIF, a tool that processes GIF files. Logan Graham, head of Anthropic's frontier red team, told Axios they're considering new AI-powered tools to hunt vulnerabilities. "The models are extremely good at this, and we expect them to get much better still... I wouldn't be surprised if this was one of — or the main way — in which open-source software moving forward was secured."

Read more of this story at Slashdot.

Vibe-coded Social Network for AI Bots Exposed Data on Thousands of Humans

著者:msmash
2026年2月3日 03:01

🤖 AI Summary

**要約(日本語)**

- **Moltbook** は「AIエージェント専用」のReddit風ソーシャルネットワークとして先週公開されたばかり。
- サイバーセキュリティ企業 **Wiz** の調査によると、同サービスに重大なセキュリティ脆弱性が存在し、
- AIエージェント間のプライベートメッセージ、
- 6,000人以上の人間ユーザーのメールアドレス、
- 100万件以上の認証情報が漏洩した可能性がある。
- 脆弱性は **Wiz が Moltbook に報告後、修正** された。
- Wiz 共同創業者の **Ami Luttwak** はこの問題を「vibe coding(雰囲気だけで作るコーディング)」の典型的な副産物と指摘。
- Moltbook の創設者 **Matt Schlicht** は自らコードを書いていないと X(旧Twitter)で主張し、コメント要請には即座に回答しなかった。
- 同脆弱性により、**本人確認が行われず**、人間・ボット問わず誰でも投稿できる状態だった。

**ポイント**
1. AI専用と謳う新SNSが、ユーザー情報数千件と認証情報大量漏洩という重大リスクを露呈。
2. 原因は開発手法の甘さ(vibe coding)と、認証・アクセス管理の欠如。
3. 企業側は報告を受けて速やかに修正したが、運営者の開発姿勢や透明性への疑問が残る。
Moltbook, a Reddit-like social network that launched last week and bills itself as a platform "built exclusively for AI agents," had a security vulnerability that exposed private messages shared between agents, the email addresses of more than 6,000 human owners, and over a million credentials, according to research published Monday by cybersecurity firm Wiz. The flaw has since been fixed after Wiz contacted Moltbook. Wiz cofounder Ami Luttwak called it a classic byproduct of "vibe coding." Moltbook creator Matt Schlicht posted on X last Friday that he "didn't write one line of code" for the site. He did not immediately respond to a request for comment when reached out by Reuters. Luttwak said the vulnerability also allowed anyone to post to the site, bot or human. "There was no verification of identity," he said.

Read more of this story at Slashdot.

Notepad++ Compromised By State Actor

著者:msmash
2026年2月3日 02:00

🤖 AI Summary

**要約(日本語)**

- **対象**:テキストエディタ「Notepad++」
- **事件概要**:Notepad++ の開発チームは、同製品のアップデート配信が国家レベルの攻撃者に狙われたと発表した。
- **攻撃手法**:
- 攻撃者はホスティングプロバイダーのインフラを侵害し、`notepad-plus-plus.org` へ向かうアップデートリクエストを途中で傍受・改ざん。
- 特定のユーザーに対してだけ、攻撃者が管理するサーバーから悪意ある更新マニフェストが配信された。
- **原因**:Notepad++ のソフトウェア自体に脆弱性があるわけではなく、配信インフラ(サーバー・ネットワークレベル)の妥協が原因。
- **背景・推測**:Notepad++ がウイグル問題に対して取った姿勢が、攻撃者(国家レベルの勢力)選定の一因と見られている。
- **現状**:技術的な詳細は調査中であり、開発チームは今後の対策とユーザーへの注意喚起を行う予定。

**ポイント**:Notepad++ のアップデート配信が国家レベルのサイバー攻撃により改ざんされたが、製品自体のコードは安全である。インフラ層のセキュリティ強化が急務とされている。
Luthair writes: Notepad++ claims to have been targeted by a state actor, given their previous stance on Uyghurs one can speculate about a candidate. Notepad++, in a blog post: According to the analysis provided by the security experts, the attack involved infrastructure-level compromise that allowed malicious actors to intercept and redirect update traffic destined for notepad-plus-plus.org. The exact technical mechanism remains under investigation, though the compromise occurred at the hosting provider level rather than through vulnerabilities in Notepad++ code itself. Traffic from certain targeted users was selectively redirected to attacker-controlled served malicious update manifests.

Read more of this story at Slashdot.

White House Scraps 'Burdensome' Software Security Rules

著者:BeauHD
2026年1月31日 09:02

🤖 AI Summary

**要約(日本語)**

米ホワイトハウスは、バイデン政権下で策定されたソフトウェア・サプライチェーンのセキュリティ指針を撤廃した。
- OMB(行政管理局)は新たにメモランダム **M‑26‑05** を発行し、2022 年の「M‑22‑18」および 2023 年の「M‑23‑16」改訂版を公式に無効化した。
- これらの指針は「実証性に欠け、過度に負担が大きい」上に、実質的なセキュリティ投資よりも行政手続きの遵守を優先させるとして批判された。
- 今後は各機関の長官が、自機関のミッションとリスク評価に基づき、ソフトウェア・ハードウェア向けの独自のセキュリティポリシーを策定する責任を負う。
- 「一律の方法は存在しない」ことを強調し、プロバイダーのセキュリティは安全な開発原則と包括的リスク評価で検証すべきとした。
- なお、SBOM(Software Bill of Materials)やセキュア開発認証書類など、従来指針で推奨されていたツールの使用は任意で継続できる。

**主なポイント**
1. バイデン政権のソフトウェアセキュリティ指針が撤回。
2. 新方針は「機関ごとのリスクに応じたカスタマイズ」を重視。
3. 以前の強制的な要件(SBOM など)は必須ではなくなるが、使用は許容。
4. 目的は実務的なセキュリティ投資を促し、過度な行政負担を削減すること。
An anonymous reader quotes a report from SecurityWeek: The White House has announced that software security guidance issued during the Biden administration has been rescinded due to "unproven and burdensome" requirements that prioritized administrative compliance over meaningful security investments. The US Office of Management and Budget (OMB) has issued Memorandum M-26-05 (PDF), officially revoking the previous administration's 2022 policy, 'Enhancing the Security of the Software Supply Chain through Secure Software Development Practices' (M-22-18), as well as the follow-up enhancements announced in 2023 (M-23-16). The new guidance shifts responsibility to individual agency heads to develop tailored security policies for both software and hardware based on their specific mission needs and risk assessments. "Each agency head is ultimately responsible for assuring the security of software and hardware that is permitted to operate on the agency's network," reads the memo sent by the OMB to departments and agencies. "There is no universal, one-size-fits-all method of achieving that result. Each agency should validate provider security utilizing secure development principles and based on a comprehensive risk assessment," the OMB added. While agencies are no longer strictly required to do so, they may continue to use secure software development attestation forms, Software Bills of Materials (SBOMs), and other resources described in M-22-18.

Read more of this story at Slashdot.

Nobel Hacking Likely Leaked Peace Prize Winner Name, Probe Finds

著者:msmash
2026年1月31日 03:05

🤖 AI Summary

ノーベル賞のハッキングが、前年に漏れた平和賞受賞者マリア・コリナ・マチャドの名前の原因とみられることが、ノルウェー・ノーベル研究所の内部調査で明らかになった。

* ノーベル財団のシステムに対し、個人または国家的なハッカーが不正アクセスした可能性が高いと結論付けられた。
* この情報漏洩により、受賞が正式に発表される数時間前に予測プラットフォーム「Polymarket」でマチャドへの賭けが急増した。
* ベネズエラの野党指導者であるマチャドは、2025年の平和賞候補としては当初想定されていなかった。
* オスロにあるノーベル委員会の管理部門である同研究所のクリスチャン・ベルグ・ハルピケン所長は「デジタル領域が最大の容疑者」と述べた。
* 明確な犯行動機や証拠が不足しているとして、警察への捜査依頼は行わない方針が取られた。

要するに、ノーベル賞の受賞者情報がハッキングにより流出し、公式発表前に市場での注目が高まったが、捜査は進められていないということだ。
An anonymous reader shares a report: A hacking of the Nobel organization's computer systems is the most likely cause of last year's leak of Nobel Peace Prize laureate Maria Corina Machado's name, according to the results of an investigation [non-paywalled source]. An individual or a state actor may have illegally gained access in a cyber breach, the Norwegian Nobel Institute said on Friday after concluding an internal investigation assisted by security authorities. The leak had triggered an unusual betting surge on Machado at the Polymarket platform hours before she was unveiled as the award recipient in October. The Venezuelan opposition leader hadn't previously been considered a favorite for the 2025 prize. "We still think that the digital domain is the main suspect," said Kristian Berg Harpviken, director of the Oslo-based institute, an administrative arm of the Nobel Committee that awards the prize. The institute has decided against filing for a police investigation given "the absence of a clear theory," he said in an interview in Oslo.

Read more of this story at Slashdot.

County Pays $600,000 To Pentesters It Arrested For Assessing Courthouse Security

著者:BeauHD
2026年1月30日 07:02

🤖 AI Summary

イオワ州ダラス郡の裁判所で、2019 年にペンテスト会社 Coalfire Labs に所属していた Gary DeMercurio 氏と Justin Wynn 氏が、司法当局から正式に交付された「レッドチーム」実施許可書を持ち、ロックピッキングを含む物理的侵入テストを行った。テスト中に警報が作動し警官が駆けつけたが、二人は許可書を提示し一時は容疑が取り下げられた。その後、郡長が自ら介入し、許可が自分の管轄下では無効だとして逮捕。逮捕とその後の言動は不当として訴訟を提起し、最終的に全ての罪状が棄却された。裁判所は同郡に対し不当逮捕・名誉毀損として 60 万米ドルの和解金を支払うよう命じた。今回の事例は、正式な許可があるセキュリティ評価でも、権限の認識違いが法的トラブルに発展し得ることを示している。
An anonymous reader quotes a report from Ars Technica, written by Dan Goodin: Two security professionals who were arrested in 2019 after performing an authorized security assessment of a county courthouse in Iowa will receive $600,000 to settle a lawsuit they brought alleging wrongful arrest and defamation. The case was brought by Gary DeMercurio and Justin Wynn, two penetration testers who at the time were employed by Colorado-based security firm Coalfire Labs. The men had written authorization from the Iowa Judicial Branch to conduct "red-team" exercises, meaning attempted security breaches that mimic techniques used by criminal hackers or burglars. The objective of such exercises is to test the resilience of existing defenses using the types of real-world attacks the defenses are designed to repel. The rules of engagement for this exercise explicitly permitted "physical attacks," including "lockpicking," against judicial branch buildings so long as they didn't cause significant damage. [...] DeMercurio and Wynn's engagement at the Dallas County Courthouse on September 11, 2019, had been routine. A little after midnight, after finding a side door to the courthouse unlocked, the men closed it and let it lock. They then slipped a makeshift tool through a crack in the door and tripped the locking mechanism. After gaining entry, the pentesters tripped an alarm alerting authorities. Within minutes, deputies arrived and confronted the two intruders. DeMercurio and Wynn produced an authorization letter -- known as a "get out of jail free card" in pen-testing circles. After a deputy called one or more of the state court officials listed in the letter and got confirmation it was legit, the deputies said they were satisfied the men were authorized to be in the building. DeMercurio and Wynn spent the next 10 or 20 minutes telling what their attorney in a court document called "war stories" to deputies who had asked about the type of work they do. When Sheriff Leonard arrived, the tone suddenly changed. He said the Dallas County Courthouse was under his jurisdiction and he hadn't authorized any such intrusion. Leonard had the men arrested, and in the days and weeks to come, he made numerous remarks alleging the men violated the law. A couple months after the incident, he told me that surveillance video from that night showed "they were crouched down like turkeys peeking over the balcony" when deputies were responding. I published a much more detailed account of the event here. Eventually, all charges were dismissed.

Read more of this story at Slashdot.

Nike Says It's Investigating Possible Data Breach

著者:msmash
2026年1月27日 03:53

🤖 AI Summary

**要約(日本語)**

Nikeは、サイバー攻撃グループ「World Leaks」から同社の事業データが約1.4テラバイト漏洩したと主張されたことを受け、現在データ侵害の可能性を調査中であると発表した。Nikeは声明で「顧客のプライバシーとデータセキュリティを非常に重要視しており、サイバーセキュリティインシデントの可能性を調査し、状況を評価している」とコメントしている。World Leaksは自らのウェブサイト上で、Nikeの大量データを公開したと主張している。現時点で被害の詳細や影響範囲は明らかになっておらず、同社は今後の対応を検討している。
Nike says it is investigating a potential data breach, after a group known for cyber attacks reportedly claimed to have leaked a trove of data related to its business operations. From a report: "We always take consumer privacy and data security very seriously," Nike said in a statement. "We are investigating a potential cyber security incident and are actively assessing the situation." The ransomware group World Leaks said on its website that it had published 1.4 terabytes of data from Nike.

Read more of this story at Slashdot.

❌