リーディングビュー

After Six Years, Two Pentesters Arrested in Iowa Receive $600,000 Settlement

🤖 AI Summary

**要約(日本語)**

2019年9月11日、コロラド拠点のサイバーセキュリティ企業Coalfire Labsに所属していたペネトレーションテスター、ジャスティン・ウィン(29歳)とゲイリー・デメルシオ(43歳)は、アイオワ州ダラス郡の裁判所ビルに侵入し、警備官に逮捕された。二人は州裁判所行政部から依頼を受け、裁判所情報システムのセキュリティテストを実施する許可を得ていたが、郡の保安官は「州が郡の建物に侵入を許可する権限はない」と主張し、重罪(第3級侵入窃盗)で逮捕、後に軽罪(不法侵入)に減罪された。

逮捕後、二人は約20時間拘留され、最終的に窃盗罪は取り下げられたものの、重罪の逮捕歴が就職活動に支障を来たすと主張し、2021年に訴訟を提起。2026年1月、ダラス郡は訴訟当事者と和解し、総額60万ドル(約6600万円)の賠償金を支払うことで合意した。

**主なポイント**

- テストは州裁判所行政部の正式な依頼に基づくもので、合法的に実施されたはず。
- 郡保安官は州の許可が郡建物への侵入を正当化しないと判断し、逮捕に踏み切った。
- 逮捕は後に軽罪に減罪され、最終的に罪は取り下げられたが、記録が残り就職に悪影響を及ぼした。
- 和解金60万ドルは、二人の「正当な業務での逮捕は不当であった」ことを認める形となった。
- 事件は政府とセキュリティ専門家間の協働に警鐘を鳴らし、同様のテストが将来も不当に処罰されないよう求める声が上がっている。
"They were crouched down like turkeys peeking over the balcony," the county sheriff told Ars Technica. A half hour past midnight, they were skulking through a courthouse in Iowa's Dallas County on September 11 "carrying backpacks that remind me and several other deputies of maybe the pressure cooker bombs." More deputies arrived... Justin Wynn, 29 of Naples, Florida, and Gary De Mercurio, 43 of Seattle, slowly proceeded down the stairs with hands raised. They then presented the deputies with a letter that explained the intruders weren't criminals but rather penetration testers who had been hired by Iowa's State Court Administration to test the security of its court information system. After calling one or more of the state court officials listed in the letter, the deputies were satisfied the men were authorized to be in the building. But Sheriff Chad Leonard had the men arrested on felony third-degree burglary charges (later reduced to misdemeanor trespassing charges). He told them that while the state government may have wanted to test security, "The State of Iowa has no authority to allow you to break into a county building. You're going to jail." More than six years later, the Des Moines Register reports: Dallas County is paying $600,000 to two men who sued after they were arrested in 2019 while testing courthouse security for Iowa's Judicial Branch, their lawyer says. Gary DeMercurio and Justin Wynn were arrested Sept. 11, 2019, after breaking into the Dallas County Courthouse. They spent about 20 hours in jail and were charged with burglary and possession of burglary tools, though the charges were later dropped. The men were employees of Colorado-based cybersecurity firm Coalfire Labs, with whom state judicial officials had contracted to perform an analysis of the state court system's security. Judicial officials apologized and faced legislative scrutiny for how they had conducted the security test. But even though the burglary charges against DeMercurio and Wynn were dropped, their attorney previously said having a felony arrest on their records made seeking employment difficult. Now the two men are to receive a total of $600,000 as a settlement for their lawsuit, which has been transferred between state and federal courts since they first filed it in July 2021 in Dallas County. The case had been scheduled to go to trial Monday, Jan. 26 until the parties notified the court Jan. 23 of the impending deal... "The settlement confirms what we have said from the beginning: our work was authorized, professional, and done in the public interest," DeMercurio said in a statement. "What happened to us never should have happened. Being arrested for doing the job we were hired to do turned our lives upside down and damaged reputations we spent years building...." "This incident didn't make anyone safer," Wynn said. "It sent a chilling message to security professionals nationwide that helping government identify real vulnerabilities can lead to arrest, prosecution, and public disgrace. That undermines public safety, not enhances it." County Attorney Matt Schultz said dismissing the charges was the decision of his predecessor, according to the newspaper, and that he believed the sheriff did nothing wrong. "I am putting the public on notice that if this situation arises again in the future, I will prosecute to the fullest extent of the law."

Read more of this story at Slashdot.

  •  

Cyber-Espionage Group Breached Systems in 37 Nations, Security Researchers Say

🤖 AI Summary

**概要(日本語)**

- **攻撃者**:アジア拠点の国家支援型サイバー諜報グループ(正体の国は非公開)。
- **期間・規模**:過去1年間で、37か国以上、70組織のネットワークに侵入。
- **主な標的**:政府機関・重要インフラ。具体的には、5つの国家警察・国境管理機関、3つの財務省、ある国の議会、別国の高官など。
- **手口**:高度にターゲットを絞ったフィッシングメールと、既知だが未修正の脆弱性を利用。数か月間にわたり検知されずに潜伏し、メールサーバーから機密情報を抽出・外部へ流出させた。
- **情報収集の目的**:外交交渉、貿易交渉、政治不安、軍事行動といった地政学的イベントに合わせ、メール・財務取引・軍警察作戦の通信、外交関連情報を大量に取得。
- **具体的被害例**:チェコ共和国の政府機関、ブラジルの鉱山エネルギー省、ベネズエラ政府とアジア企業の合弁事業施設に関わる装置が「おそらく」侵害されたと報告。
- **その他の疑いがある地域**:ドイツ、ポーランド、ギリシャ、イタリア、キプロス、インドネシア、マレーシア、モンゴル、パナマなど。

このサイバー諜報活動は、政治・経済・軍事の重要情報を狙った大規模かつ長期的なものと評価されている。
An anonymous reader shared this report from Bloomberg: An Asian cyber-espionage group has spent the past year breaking into computer systems belonging to governments and critical infrastructure organizations in more than 37 countries, according to the cybersecurity firm Palo Alto Networks, Inc. The state-aligned attackers have infiltrated networks of 70 organizations, including five national law enforcement and border control agencies, according to a new research report from the company. They have also breached three ministries of finance, one country's parliament and a senior elected official in another, the report states. The Santa Clara, California-based firm declined to identify the hackers' country of origin. The spying operation was unusually vast and allowed the hackers to hoover up sensitive information in apparent coordination with geopolitical events, such as diplomatic missions, trade negotiations, political unrest and military actions, according to the report. They used that access to spy on emails, financial dealings and communications about military and police operations, the report states. The hackers also stole information about diplomatic issues, lurking undetected in some systems for months. "They use highly-targeted and tailored fake emails and known, unpatched security flaws to gain access to these networks," said Pete Renals, director of national security programs with Unit 42, the threat intelligence division of Palo Alto Networks.... Palo Alto Networks researchers confirmed that the group successfully accessed and exfiltrated sensitive data from some victims' email servers. Bloomberg writes that according to the cybersecurity firm, this campaign targeted government entities in the Czech Republic and the Ministry of Mines and Energy of Brazil, and also "likely compromised" a device associated with a facility operated by a joint venture between Venezuela's government and an Asian tech firm. The cyberattackers are "also suspected of being active in Germany, Poland, Greece, Italy, Cyprus, Indonesia, Malaysia, Mongolia, Panama, Greece and other countries, according to the report."

Read more of this story at Slashdot.

  •  
❌