ノーマルビュー

After Six Years, Two Pentesters Arrested in Iowa Receive $600,000 Settlement

2026年2月9日 04:35

🤖 AI Summary

**要約(日本語)**

イオワ州ダラス郡の裁判所で、ペネトレーションテスター(ペンテスター)であるジャスティン・ウィン(29歳)とゲイリー・デ・メルキオ(43歳)が、州司法局から依頼されたシステムのセキュリティテストのために深夜に侵入した。警官に身分証明の手紙を提示し、州側の許可があることを確認されたにもかかわらず、郡保安官チャド・レナードは彼らを第三級重罪の侵入窃盗(後に軽罪の不法侵入)で逮捕し、約20時間拘留した。

逮捕後、刑事告訴は最終的に取り下げられたが、重罪での逮捕歴が就職活動に大きな支障を来したと主張し、二人は2021年に訴訟を提起。2026年1月、ダラス郡は二人に対し総額60万ドル(約8,000万円)の和解金を支払うことで合意した。

- **事件の経緯**:州司法局が委託したコールファイア・ラボズ社のペンテスターが裁判所に侵入。警官は許可の有無を疑問視し逮捕。
- **法的結果**:重罪の起訴は取り下げられたが、訴訟により和解金が支払われた。
- **関係者の見解**
- デ・メルキオ:「我々の仕事は正当で公共の利益にかなうものであった」
- ウィン:「この出来事はセキュリティ専門家に対し、政府支援の脆弱性調査が逮捕につながり得るという冷ややかなメッセージを送った」
- 郡検事マット・シュルツは「同様の事態が再び起これば、最大限に起訴する」と警告。

この和解は、政府が委託したセキュリティテストの実施方法と、法執行機関との協調不足がもたらすリスクを示す事例として注目されている。
"They were crouched down like turkeys peeking over the balcony," the county sheriff told Ars Technica. A half hour past midnight, they were skulking through a courthouse in Iowa's Dallas County on September 11 "carrying backpacks that remind me and several other deputies of maybe the pressure cooker bombs." More deputies arrived... Justin Wynn, 29 of Naples, Florida, and Gary De Mercurio, 43 of Seattle, slowly proceeded down the stairs with hands raised. They then presented the deputies with a letter that explained the intruders weren't criminals but rather penetration testers who had been hired by Iowa's State Court Administration to test the security of its court information system. After calling one or more of the state court officials listed in the letter, the deputies were satisfied the men were authorized to be in the building. But Sheriff Chad Leonard had the men arrested on felony third-degree burglary charges (later reduced to misdemeanor trespassing charges). He told them that while the state government may have wanted to test security, "The State of Iowa has no authority to allow you to break into a county building. You're going to jail." More than six years later, the Des Moines Register reports: Dallas County is paying $600,000 to two men who sued after they were arrested in 2019 while testing courthouse security for Iowa's Judicial Branch, their lawyer says. Gary DeMercurio and Justin Wynn were arrested Sept. 11, 2019, after breaking into the Dallas County Courthouse. They spent about 20 hours in jail and were charged with burglary and possession of burglary tools, though the charges were later dropped. The men were employees of Colorado-based cybersecurity firm Coalfire Labs, with whom state judicial officials had contracted to perform an analysis of the state court system's security. Judicial officials apologized and faced legislative scrutiny for how they had conducted the security test. But even though the burglary charges against DeMercurio and Wynn were dropped, their attorney previously said having a felony arrest on their records made seeking employment difficult. Now the two men are to receive a total of $600,000 as a settlement for their lawsuit, which has been transferred between state and federal courts since they first filed it in July 2021 in Dallas County. The case had been scheduled to go to trial Monday, Jan. 26 until the parties notified the court Jan. 23 of the impending deal... "The settlement confirms what we have said from the beginning: our work was authorized, professional, and done in the public interest," DeMercurio said in a statement. "What happened to us never should have happened. Being arrested for doing the job we were hired to do turned our lives upside down and damaged reputations we spent years building...." "This incident didn't make anyone safer," Wynn said. "It sent a chilling message to security professionals nationwide that helping government identify real vulnerabilities can lead to arrest, prosecution, and public disgrace. That undermines public safety, not enhances it." County Attorney Matt Schultz said dismissing the charges was the decision of his predecessor, according to the newspaper, and that he believed the sheriff did nothing wrong. "I am putting the public on notice that if this situation arises again in the future, I will prosecute to the fullest extent of the law."

Read more of this story at Slashdot.

Cyber-Espionage Group Breached Systems in 37 Nations, Security Researchers Say

2026年2月9日 00:34

🤖 AI Summary

**要約(日本語)**

- **対象と規模**
- アジア系のサイバースパイ集団が、過去1年間で政府機関や重要インフラを含む70以上の組織に侵入。
- 37か国以上で被害が確認され、5つの国家警察・国境管理機関、3つの財務省、1つの議会、別の国の高官などが標的に。

- **手口**
- カスタマイズされたフィッシングメールと、既知の未修正脆弱性を利用してネットワークに侵入。
- 侵入後はメールサーバーや金融取引、軍事・警察作戦に関する通信を閲覧・情報を抜き取った。
- 一部システムには数か月間検知されずに潜伏。

- **地政学的背景**
- スパイ活動は外交交渉、貿易交渉、政治的混乱、軍事行動などの国際情勢と連動して実施されたとみられる。

- **具体的な被害国・機関**
- チェコ共和国の政府機関、ブラジルの鉱山・エネルギー省、ベネズエラ政府とアジア企業の合弁事業施設など。
- ドイツ、ポーランド、ギリシャ、イタリア、キプロス、インドネシア、マレーシア、モンゴル、パナマなどでも活動が疑われている。

- **出所**
- 調査はサイバーセキュリティ企業 Palo Alto Networks(米カリフォルニア州サンタクララ)の脅威インテリジェンス部門 Unit 42 が実施。
- ハッカー集団の正確な出所国は公表されていない。

**結論**
このサイバースパイ集団は、国家レベルの情報を大量に取得するため、広範かつ高度に標的化された手法で世界中の政府・インフラに侵入している。未修正の脆弱性や高度なフィッシングが主な侵入経路であり、長期間にわたり検知が難しい点がリスクを増大させている。対策として、脆弱性の迅速なパッチ適用とフィッシング対策の強化が急務である。
An anonymous reader shared this report from Bloomberg: An Asian cyber-espionage group has spent the past year breaking into computer systems belonging to governments and critical infrastructure organizations in more than 37 countries, according to the cybersecurity firm Palo Alto Networks, Inc. The state-aligned attackers have infiltrated networks of 70 organizations, including five national law enforcement and border control agencies, according to a new research report from the company. They have also breached three ministries of finance, one country's parliament and a senior elected official in another, the report states. The Santa Clara, California-based firm declined to identify the hackers' country of origin. The spying operation was unusually vast and allowed the hackers to hoover up sensitive information in apparent coordination with geopolitical events, such as diplomatic missions, trade negotiations, political unrest and military actions, according to the report. They used that access to spy on emails, financial dealings and communications about military and police operations, the report states. The hackers also stole information about diplomatic issues, lurking undetected in some systems for months. "They use highly-targeted and tailored fake emails and known, unpatched security flaws to gain access to these networks," said Pete Renals, director of national security programs with Unit 42, the threat intelligence division of Palo Alto Networks.... Palo Alto Networks researchers confirmed that the group successfully accessed and exfiltrated sensitive data from some victims' email servers. Bloomberg writes that according to the cybersecurity firm, this campaign targeted government entities in the Czech Republic and the Ministry of Mines and Energy of Brazil, and also "likely compromised" a device associated with a facility operated by a joint venture between Venezuela's government and an Asian tech firm. The cyberattackers are "also suspected of being active in Germany, Poland, Greece, Italy, Cyprus, Indonesia, Malaysia, Mongolia, Panama, Greece and other countries, according to the report."

Read more of this story at Slashdot.

❌