1、JAPAN THREAT LANDSCAPE REPORTJune 2024/2Cyberint Copyright All Rights Reserved 2024JAPAN THREAT LANDSCAPE REPORTTABLE OF CONTENTSExecutive Summary4Phishing and Social Engineering5A Global Rise of Smishing5Generative AI7Data breaches8Fujitsu Incident8LINE Breach8An Increasing Targeting by Chinese-Spe
2、aking Threat Actors9Ransomware14Regional statistics and Impact14Lockbit17Tactics,Techniques,and Procedures(TTPs)18Latest Japan Incident18IOCs19ALPHV20Tactics,Techniques,and Procedures(TTPs)20Latest Japanese Incident21Notable IOCs21Hunters International22Tactics,Techniques,and Procedures(TTPs)23Lates
3、t Japanese Incident23Notable IOCs23Blackbyte23Tactics,Techniques,and Procedures(TTPs)24Latest Japanese Incident24Notable IOCs24/3Cyberint Copyright All Rights Reserved 2024JAPAN THREAT LANDSCAPE REPORTProminent Advanced Persistent Threat(APT)groups26APT1026Malware,Toolset&TTPs26Notable Activity agai
4、nst Japan27IOCs28APT4129T actics,Techniques,and Procedures(TTPs)29Software Tools30IOCs31Lazarus Group31Malware,Toolset&TTPs32IOCs33Hashes34Hacktivists Groups36Tactics,Techniques,and Procedures(TTPs)37OpJapan Campaign37Cyberint Recommendations38Ransomware Prevention38Phishing detection and mitigation
5、39An On Going motniroing of Undergournd Platforms39Combating Prominent Threat Acting Groups40Contact Us41Although direct cyber retaliation from Russia remains limited,Japans geopolitical positioning and strategic alliances with entities such as QUAD and NATO introduce significant cybersecurity chall
6、enges.In this report,we explore key Advanced Persistent Threat(APT)factions,ransomware groups,and hacktivist collectives-all known to target Japan.Notably,Cyberint identifies a rise in interest within the Chinese-speaking dark web community towards data breaches involving Japanese corporations and i