ノーマルビュー

After Six Years, Two Pentesters Arrested in Iowa Receive $600,000 Settlement

2026年2月9日 04:35

🤖 AI Summary

2020年9月11日、コロラド州のサイバー企業Coalfire Labs所属のペンテスター、ジャスティン・ウィンとゲイリー・デ・メルシオは、アイオワ州司法部が委託した裁判所情報システムのセキュリティテストのために、ダラス郡裁判所に侵入した。警官に身分証明書と許可書を提示したものの、郡保安官は第三度重罪の侵入罪(後に軽罪の不法侵入)で逮捕し、約20時間拘留された。2021年に提訴し、2026年に同郡が合計60万ドル(約8億円)の和解金を支払うことで和解に至った。デ・メルシオは「仕事として正当に依頼されたもので、逮捕は不当」と主張し、ウィンは「政府の脆弱性検証が逮捕につながると、全国のセキュリティ専門家が萎縮し公共の安全が損なわれる」と警告した。郡検事は今後同様のケースがあれば「最大限に起訴する」とコメントしている。
"They were crouched down like turkeys peeking over the balcony," the county sheriff told Ars Technica. A half hour past midnight, they were skulking through a courthouse in Iowa's Dallas County on September 11 "carrying backpacks that remind me and several other deputies of maybe the pressure cooker bombs." More deputies arrived... Justin Wynn, 29 of Naples, Florida, and Gary De Mercurio, 43 of Seattle, slowly proceeded down the stairs with hands raised. They then presented the deputies with a letter that explained the intruders weren't criminals but rather penetration testers who had been hired by Iowa's State Court Administration to test the security of its court information system. After calling one or more of the state court officials listed in the letter, the deputies were satisfied the men were authorized to be in the building. But Sheriff Chad Leonard had the men arrested on felony third-degree burglary charges (later reduced to misdemeanor trespassing charges). He told them that while the state government may have wanted to test security, "The State of Iowa has no authority to allow you to break into a county building. You're going to jail." More than six years later, the Des Moines Register reports: Dallas County is paying $600,000 to two men who sued after they were arrested in 2019 while testing courthouse security for Iowa's Judicial Branch, their lawyer says. Gary DeMercurio and Justin Wynn were arrested Sept. 11, 2019, after breaking into the Dallas County Courthouse. They spent about 20 hours in jail and were charged with burglary and possession of burglary tools, though the charges were later dropped. The men were employees of Colorado-based cybersecurity firm Coalfire Labs, with whom state judicial officials had contracted to perform an analysis of the state court system's security. Judicial officials apologized and faced legislative scrutiny for how they had conducted the security test. But even though the burglary charges against DeMercurio and Wynn were dropped, their attorney previously said having a felony arrest on their records made seeking employment difficult. Now the two men are to receive a total of $600,000 as a settlement for their lawsuit, which has been transferred between state and federal courts since they first filed it in July 2021 in Dallas County. The case had been scheduled to go to trial Monday, Jan. 26 until the parties notified the court Jan. 23 of the impending deal... "The settlement confirms what we have said from the beginning: our work was authorized, professional, and done in the public interest," DeMercurio said in a statement. "What happened to us never should have happened. Being arrested for doing the job we were hired to do turned our lives upside down and damaged reputations we spent years building...." "This incident didn't make anyone safer," Wynn said. "It sent a chilling message to security professionals nationwide that helping government identify real vulnerabilities can lead to arrest, prosecution, and public disgrace. That undermines public safety, not enhances it." County Attorney Matt Schultz said dismissing the charges was the decision of his predecessor, according to the newspaper, and that he believed the sheriff did nothing wrong. "I am putting the public on notice that if this situation arises again in the future, I will prosecute to the fullest extent of the law."

Read more of this story at Slashdot.

Cyber-Espionage Group Breached Systems in 37 Nations, Security Researchers Say

2026年2月9日 00:34

🤖 AI Summary

**要約(日本語)**

アジア拠点の国家支援型サイバー諜報集団が、過去1年間で37カ国以上の政府機関や重要インフラを標的にし、70以上の組織に侵入したことが、サイバーセキュリティ企業パロアルト・ネットワークス(Unit 42)の調査で明らかになった。

- **被害規模**:5つの国家警察・国境管理機関、3つの財務省、ある国の議会、別国の高官などを含む。
- **手口**:特定対象向けに作り込んだフィッシングメールと、既知の未修正脆弱性を利用してネットワークに侵入。侵入後はメールサーバーや金融・軍事・警察の通信、外交関連情報を長期間にわたり盗み出した。
- **地政学的連動**:外交交渉、貿易交渉、政治的不安、軍事行動といった国際的な出来事とタイミングを合わせて情報収集を実施。
- **具体的な標的**:チェコ共和国の政府機関、ブラジルの鉱山・エネルギー省、ベネズエラ政府とアジア企業の合弁事業施設の機器が「侵害された可能性」あり。
- **その他の活動地域**:ドイツ、ポーランド、ギリシャ、イタリア、キプロス、インドネシア、マレーシア、モンゴル、パナマなどでも活動が疑われる。

パロアルト・ネットワークスはハッカー集団の出所国は明かさなかったが、政府レベルの機密情報を大量に取得した点で、史上最大級の国家支援型サイバー諜報作戦と評価されている。
An anonymous reader shared this report from Bloomberg: An Asian cyber-espionage group has spent the past year breaking into computer systems belonging to governments and critical infrastructure organizations in more than 37 countries, according to the cybersecurity firm Palo Alto Networks, Inc. The state-aligned attackers have infiltrated networks of 70 organizations, including five national law enforcement and border control agencies, according to a new research report from the company. They have also breached three ministries of finance, one country's parliament and a senior elected official in another, the report states. The Santa Clara, California-based firm declined to identify the hackers' country of origin. The spying operation was unusually vast and allowed the hackers to hoover up sensitive information in apparent coordination with geopolitical events, such as diplomatic missions, trade negotiations, political unrest and military actions, according to the report. They used that access to spy on emails, financial dealings and communications about military and police operations, the report states. The hackers also stole information about diplomatic issues, lurking undetected in some systems for months. "They use highly-targeted and tailored fake emails and known, unpatched security flaws to gain access to these networks," said Pete Renals, director of national security programs with Unit 42, the threat intelligence division of Palo Alto Networks.... Palo Alto Networks researchers confirmed that the group successfully accessed and exfiltrated sensitive data from some victims' email servers. Bloomberg writes that according to the cybersecurity firm, this campaign targeted government entities in the Czech Republic and the Ministry of Mines and Energy of Brazil, and also "likely compromised" a device associated with a facility operated by a joint venture between Venezuela's government and an Asian tech firm. The cyberattackers are "also suspected of being active in Germany, Poland, Greece, Italy, Cyprus, Indonesia, Malaysia, Mongolia, Panama, Greece and other countries, according to the report."

Read more of this story at Slashdot.

❌