Introduction | Spirit | History | Technology | Human Resource | Formation |
Technology
Technology cultivated for coordination
Our work is built on hard and steady application, and may be unglamorous.
But the technology we develop thwarts Internet threats and crimes each day, and occasionally even prevents attacks that could rock the economy.
Responding to huge numbers of incidents with equal care
On the Incident Handling Status page of the JPCERT/CC website, we provide daily updates on the numbers and types of incidents and phishing sites that are being handled. Highly sophisticated attacks are hidden among numerous and diverse attacks. Our job is to identify them by examining every single attack with thorough attention, and responding to them with the technology we have developed over the years. These efforts lead to coordination and further accumulation of knowledge.
Investigating incidents onsite, and analyzing them in the lab.
When it is found that an organization's server is being exploited as a command&control server for malware, we notify the organization of the situation, and in some cases we even visit them to investigate and analyze from every angle the artifacts that provide evidence related to the incident. In the case of malware, we run the program to examine its actual behavior. The binary program is deciphered directly through reverse engineering. It is an exploratory process that takes hard, steady work, but it allows us to directly examine the incident and find out how it works.
Highlighting attacker profiles through open source intelligence.
Open source intelligence is a profiling method that uses publicly available information. Experts can reveal a whole range of information about the attacker, including when he goes to bed, that attacks are carried out at roughly the same time of day, that attacks are triggered by commands, that the attacker may have few friends, and that the attacker is about the age of a junior or senior high school student. Needless to say, the more detailed the profile, the easier it is to plan a suitable defense strategy.
Introduction | Spirit | History | Technology | Human Resource | Formation |