ノーマルビュー

After Six Years, Two Pentesters Arrested in Iowa Receive $600,000 Settlement

2026年2月9日 04:35

🤖 AI Summary

**要約(日本語)**

2019年9月11日、コロラド州のサイバーセキュリティ企業Coalfire Labsに所属していたペンテスター、ジャスティン・ウィン(29)とゲイリー・デメルシオ(43)は、アイオワ州司法部が委託した裁判所情報システムのセキュリティテストの一環として、ダラス郡裁判所に侵入した。警官に身分証明書と説明書を提示し、州側の関係者と確認したにもかかわらず、郡保安官チャド・レナードは彼らを重罪(第三度侵入窃盗)で逮捕し、後に軽罪の不法侵入に減罪された。

逮捕後約20時間拘留され、最終的に窃盗容疑は取り下げられたが、前科が残ったことで就職活動に支障を来した。二人は2021年7月に訴訟を提起し、2026年1月にダラス郡が総額60万ドル(約6600万円)の和解金を支払うことで合意に至った。

- **事件の経緯**:州が依頼したセキュリティテストであることを示す書面を提示しても、郡保安官は「州が郡の建物への侵入を許可する権限はない」として逮捕。
- **法的結果**:窃盗・侵入ツール所持の重罪は後に取り下げられ、軽罪に減罪されたが、和解に至るまで長期にわたる訴訟が続いた。
- **和解金**:60万ドル(各30万ドル)を受け取り、弁護士は「許可された正当な業務であった」と主張。
- **影響とコメント**:ウィンは「この出来事はセキュリティ専門家に対し、政府の脆弱性指摘が逮捕や社会的信用失墜につながり得るという冷却メッセージを送った」と警告。郡検事は「今後同様のケースが起きた場合、法の最大限で起訴する」と姿勢を示した。

この和解は、政府依頼のペンテストが適切に管理されないと、関係者のキャリアや公的安全に逆効果をもたらす可能性があることを示す事例となった。
"They were crouched down like turkeys peeking over the balcony," the county sheriff told Ars Technica. A half hour past midnight, they were skulking through a courthouse in Iowa's Dallas County on September 11 "carrying backpacks that remind me and several other deputies of maybe the pressure cooker bombs." More deputies arrived... Justin Wynn, 29 of Naples, Florida, and Gary De Mercurio, 43 of Seattle, slowly proceeded down the stairs with hands raised. They then presented the deputies with a letter that explained the intruders weren't criminals but rather penetration testers who had been hired by Iowa's State Court Administration to test the security of its court information system. After calling one or more of the state court officials listed in the letter, the deputies were satisfied the men were authorized to be in the building. But Sheriff Chad Leonard had the men arrested on felony third-degree burglary charges (later reduced to misdemeanor trespassing charges). He told them that while the state government may have wanted to test security, "The State of Iowa has no authority to allow you to break into a county building. You're going to jail." More than six years later, the Des Moines Register reports: Dallas County is paying $600,000 to two men who sued after they were arrested in 2019 while testing courthouse security for Iowa's Judicial Branch, their lawyer says. Gary DeMercurio and Justin Wynn were arrested Sept. 11, 2019, after breaking into the Dallas County Courthouse. They spent about 20 hours in jail and were charged with burglary and possession of burglary tools, though the charges were later dropped. The men were employees of Colorado-based cybersecurity firm Coalfire Labs, with whom state judicial officials had contracted to perform an analysis of the state court system's security. Judicial officials apologized and faced legislative scrutiny for how they had conducted the security test. But even though the burglary charges against DeMercurio and Wynn were dropped, their attorney previously said having a felony arrest on their records made seeking employment difficult. Now the two men are to receive a total of $600,000 as a settlement for their lawsuit, which has been transferred between state and federal courts since they first filed it in July 2021 in Dallas County. The case had been scheduled to go to trial Monday, Jan. 26 until the parties notified the court Jan. 23 of the impending deal... "The settlement confirms what we have said from the beginning: our work was authorized, professional, and done in the public interest," DeMercurio said in a statement. "What happened to us never should have happened. Being arrested for doing the job we were hired to do turned our lives upside down and damaged reputations we spent years building...." "This incident didn't make anyone safer," Wynn said. "It sent a chilling message to security professionals nationwide that helping government identify real vulnerabilities can lead to arrest, prosecution, and public disgrace. That undermines public safety, not enhances it." County Attorney Matt Schultz said dismissing the charges was the decision of his predecessor, according to the newspaper, and that he believed the sheriff did nothing wrong. "I am putting the public on notice that if this situation arises again in the future, I will prosecute to the fullest extent of the law."

Read more of this story at Slashdot.

Cyber-Espionage Group Breached Systems in 37 Nations, Security Researchers Say

2026年2月9日 00:34

🤖 AI Summary

**要約(日本語)**

- **対象と規模**
- アジア拠点のサイバー諜報グループが、過去1年で政府機関や重要インフラを含む70以上の組織に侵入。
- 37か国以上で被害が確認され、5つの国家警察・国境管理機関、3つの財務省、ある国の議会、別の国の高官などが対象に。

- **攻撃手法**
- 高度にカスタマイズされたフィッシングメールと、既知の未パッチ脆弱性を利用してネットワークに侵入。
- 侵入後はメールサーバーや金融取引、軍事・警察作戦に関する通信などの機密情報を収集・外部に流出させた。

- **タイミングと目的**
- 外交交渉、貿易協議、政治的混乱、軍事行動など、地政学的イベントと連動して情報収集を実施。
- 一部システムには数か月間検知されずに潜伏。

- **具体的な被害例**
- チェコ共和国の政府機関、ブラジルの鉱山・エネルギー省、ベネズエラ政府とアジア企業の合弁施設に関連するデバイスが「おそらく」侵害されたと報告。
- ドイツ、ポーランド、ギリシャ、イタリア、キプロス、インドネシア、マレーシア、モンゴル、パナマなどでも活動が疑われている。

- **出所**
- カリフォルニア州サンタクララに本拠を置くPalo Alto Networks(ユニット42)の調査報告。ハッカー集団の国家的出所は公表されていない。

このように、同グループは広範かつ組織的に政府・インフラを標的とし、地政学的機会を狙って機密情報を大量に窃取していることが明らかになった。
An anonymous reader shared this report from Bloomberg: An Asian cyber-espionage group has spent the past year breaking into computer systems belonging to governments and critical infrastructure organizations in more than 37 countries, according to the cybersecurity firm Palo Alto Networks, Inc. The state-aligned attackers have infiltrated networks of 70 organizations, including five national law enforcement and border control agencies, according to a new research report from the company. They have also breached three ministries of finance, one country's parliament and a senior elected official in another, the report states. The Santa Clara, California-based firm declined to identify the hackers' country of origin. The spying operation was unusually vast and allowed the hackers to hoover up sensitive information in apparent coordination with geopolitical events, such as diplomatic missions, trade negotiations, political unrest and military actions, according to the report. They used that access to spy on emails, financial dealings and communications about military and police operations, the report states. The hackers also stole information about diplomatic issues, lurking undetected in some systems for months. "They use highly-targeted and tailored fake emails and known, unpatched security flaws to gain access to these networks," said Pete Renals, director of national security programs with Unit 42, the threat intelligence division of Palo Alto Networks.... Palo Alto Networks researchers confirmed that the group successfully accessed and exfiltrated sensitive data from some victims' email servers. Bloomberg writes that according to the cybersecurity firm, this campaign targeted government entities in the Czech Republic and the Ministry of Mines and Energy of Brazil, and also "likely compromised" a device associated with a facility operated by a joint venture between Venezuela's government and an Asian tech firm. The cyberattackers are "also suspected of being active in Germany, Poland, Greece, Italy, Cyprus, Indonesia, Malaysia, Mongolia, Panama, Greece and other countries, according to the report."

Read more of this story at Slashdot.

❌