© 1996-2024 JPCERT/CC
Details
Details
NTT Security Holdings
Rintaro Koike is a security analyst at NTT Security Holdings. He is engaged in threat research and malware analysis. In addition, he is the founder of "nao_sec" and is in charge of threat research. He focuses on APT attacks targeting East Asia and web-based attacks. He has been a speaker at VB, SAS, Botconf, AVAR and others.
NTT Security Holdings
Amata Anantaprayoon is a security analyst at NTT Security Holdings and specializes in real-time threat detection, incident response, detection engineering, and cyber threat research. Amata regularly shares his insights at leading conferences such as Virus Bulletin as well as at closed events as a key member of NTT´s Threat Intelligence research community.
Mizuho Financial Group, Inc.
Hiroyuki joined Mizuho Financial Group, Inc. in 2017 after working for a security company as a consultant. As a member of its CSIRT, he is engaged in a wide range of operations from incident handling, SOC management and planning to threat intelligence. He is also responsible for security measures against phishing and unauthorized Internet banking transactions.
Mizuho Financial Group, Inc.
Tsukasa joined Mizuho Financial Group, Inc. in 2014. After working in its sales department in some local branches and engaged in planning/operation of customer products (mainly Internet banking), he moved to the current cyber security position. He first started with the overall security for the Internet banking system and currently oversees cyber security incident response including phishing.
Mizuho Financial Group, Inc.
Takuya joined Mizuho Financial Group, Inc. in 2020. In his previous position, he worked as a malware and forensic analyst as well as SOC operation lead. At present, he is in charge of log investigation and malware analysis, while operating and developing its threat intelligence collection system.
NSHC
Hankuk Jo is a researcher at the Threat Research Lab of NSHC, specializing in cybersecurity and threat intelligence. He is passionate about sharing his insights and primarily focuses on analyzing the tactics, techniques, and procedures (TTPs) employed by cyber attackers, leveraging threat intelligence data.
NSHC
Sangyoon Yoo is a seasoned professional in the field of cyber threat intelligence and research, currently working at the Threat Research Lab of NSHC. With a strong background in analyzing and researching various cybersecurity threats, Sangyoon has developed expertise in threat intelligence, game hacking tools, and malware analysis.
NSHC
Jeonghee Ha is a researcher at the Threat Research Lab of NSHC. Previously, JeongHee worked as an Incident Response Analyst and also has experience in CERT, analyzing threat events and providing first response. Jeonghee is primarily interested in threat data related to cybercrime groups and has a strong interest in digital forensic techniques.
LAC Co., Ltd
Takahiro is a malware analyst at Cyber Emergency Center in LAC Co., Ltd. He teaches at LAC Security Academy and authors some related publications. He has presented at international conferences such as PACSEC, AVAR, HITCON, Virus Bulletin and Black Hat USA Arsenal.
Trend Micro
Theo Chen is a Senior Threat Researcher at Trend Micro, bringing over five years of comprehensive experience in the cybersecurity domain. His areas of expertise include penetration testing, malware analysis, and threat hunting, with a strong focus on understanding and mitigating advanced cyber threats. Throughout his career, Theo has been involved in multiple initiatives aimed at strengthening organizational security, focusing on detecting advanced threats and designing proactive defense strategies. Currently, He specializes in tracking APT groups, particularly those associated with Chinese-speaking actors. His work involves in-depth analysis of emerging cyber threats and TTPs employed by these sophisticated adversaries.
Trend Micro
Leon Chang is a Senior Threat Researcher at Trend Micro. His major areas of research include APT campaign tracking, threat intelligence and malware analysis. He has also been a speaker at international conferences, including Black Hat Asia 2022, JSAC 2021/2022, CYBERSEC and AISA, etc.
Financial Security Institute
He is the CSIRT Lead at the Financial Security Institute in South Korea, with over two decades of experience in cybersecurity focused on the financial sector. His expertise spans vulnerability assessments, penetration testing, security operations, and incident response, ensuring robust defenses against evolving cyber threats. Beyond his primary role, he actively tracks Democratic People's Republic of Korea (DPRK) state-sponsored threat actors as a personal side project, managing the website lazarus.day and the X (formerly Twitter) account lazarusholic, where he shares in-depth analysis and insights on these cyber adversaries.
TeamT5
Yi-Chin Chuang is a threat intelligence researcher at TeamT5. She is passionate about reverse engineering and malware analysis. Her current research focuses on APT threats within the APAC region. She has shared her research findings at Underground Economy, JSAC, CYBERSEC, and TAS.
TeamT5
Yu-Tung Chang is a Threat Intelligence Researcher from TeamT5. He is interested in reverse engineering, vulnerability exploiting and malware analysis. He was engaged in network attacks research and rule writing. Currently, his research focuses on cyber threat intelligence in the East Asia region. He has spoken at Code Blue, TAS and JSAC.
ITOCHU Cyber & Intelligence Inc.
Satoshi engages in incident response and threat analysis at ITOCHU Cyber & Intelligence Inc.
ITOCHU Cyber & Intelligence Inc.
Shuhei engages in incident response and threat analysis at ITOCHU Cyber & Intelligence Inc.
ITOCHU Cyber & Intelligence Inc.
Yusuke engages in incident response and threat analysis at ITOCHU Cyber & Intelligence Inc.
Recruit Co.
Yuji joined Recruit Technologies Co.,Ltd in 2016. As a member of Recruit-CSIRT, he leads security incident response in Recruit. In April 2021, he launched the Cybercrime Countermeasures Group, specializing in analysis and investigation of fraudulent credit card use and spoofed logins for the purpose of cybercrime countermeasures. CISSP, GCIH, GCTI, GNFA.
Recruit Co.
Masaki is engaged in vulnerability assessment and penetration testing at Recruit Co. Currently, he focuses on security incident response, monitoring and threat hunting at Recruit-CSIRT.
ESET
Dominik is a malware researcher at ESET. Coming from academia, he joined ESET in 2019 to help track the activities of APT groups with a particular focus on the China-aligned group MirrorFace. He previously presented at AVAR and also at JSAC 2024. In his spare time, he plays video games and watches bad movies.
Tokio Marine Holdings, Inc.
Tomohisa has experienced penetration testing, security audit and incident response at a security company since 2009. Currently, at Tokio Marine Holdings, Inc., he specializes in security strategy planning, security architecture, threat intelligence analysis and incident response. He is a committee member for the Information-Technology Engineers Examination and Registered Information Security Specialist Examination, as well as a Cyber Security Expert at the Ministry of Internal Affairs and Communications. He also authors and translates some technical publications.
Tokio Marine Holdings, Inc.
Tatsuya was a Technical Official at the National Police Agency for 16 years, specializing in cyber crime and cyber terrorism. While seconded to the Metropolitan Police Department, he dealt with international criminal organizations. After moving to a security company, he was involved in forensics, intelligence and training for government agencies. Since 2022, he oversees security operations, incident response and security measures for local and overseas group companies at Tokio Marine Holdings, Inc.
Tokio Marine Holdings, Inc.
Hiroyuki started his career at Tokio Marine Nichido Systems in 2009. He had been tasked with cyber security measures for its group companies in 2016. Being seconded to Tokio Marine Holdings, Inc. since 2023, he is now responsible for security measures for the CSIRT and both local and overseas group companies. OSCP, CISSP, CISA, RISS and ITILv3Expert.
Sygnia
Aaron is a security researcher with more than four years of experience in various aspects of Cybersecurity including Incident Response, Red Teaming and Security Research. He is currently an Incident Response Expert with Sygnia, where he is part of the team that investigates security incidents ranging from advanced persistent threats (APTs) and ransomware attacks to data breaches.
Sygnia
Ren Jie is an Incident Response Expert from Singapore, with over four years of experience in managing and mitigating information security incidents. He has successfully navigated a wide range of challenges, including ransomware attacks, data breaches, advanced persistence threats (APTs), and financial fraud.
Trend Micro
Pierre Lee is a Senior Threat Researcher at Trend Micro, expertise in reverse engineering, threat hunting, APT campaign research across the APAC region. Prior to joining Trend Micro, Pierre worked as an Anti-Virus analyst, focusing on malware detection engineering using both signature-based and machine learning approaches.
Trend Micro
Philip Chen is an APT threat researcher at TrendMicro, specializing in reverse-engineering and threat hunting. His work focuses on identifying and analyzing advanced persistent threats, malware, and security vulnerabilities. In his free time, he also explores fuzzing technologies. His background in cybersecurity gives him a well-rounded perspective on both offensive and defensive strategies.
Trend Micro
Vickie Su is a threat researcher in Trend Micro. She is in charge of handling targeted attack cases around the Asia-Pacific region by malware analysis, performing correlating intelligence during the investigation, figuring out threat actors' Tactics, Techniques and Procedures (TTPs).
KRCERT/CC
ongwook Kim have been working for KRCERT/CC since 2013 as Computer Incident Analyst. He has a lot of experiences related to internet security incident response(Supply Chain Attacks, cryptocurrency exchange hacking and so on). Recently, He is tracking and analyzing specific hacking group targeting Korea.
KRCERT/CC
Seulgi Lee is currently a malware analyst at Korea Internet & Security Agency. He carried out research into cyber security such as cyber threat intelligence, SIEM for 7 years from 2012 in the R&D department. After moving to KrCERT/CC position, He has been analyzing threats targeting Korea and sharing insights based on the results to prevent the infringement cases and minimize the damage in Korea.
NTT Communications Corporation
Masaomi engages in investigation and analysis of phishing and various cyber crime as part of “NA4Sec”, a cyber threat intelligence project at NTT Communications Corporation. He actively shares phishing site information on social media
Google Mandiant
Steve Su is a Senior Security Engineer & Researcher at Google Cloud’s Mandiant Intelligence. His proficiency focuses on malware hunting, reverse engineering, and tracking state-sponsored campaigns over the Asia Pacific region. He had public talks on conferences such as Kaspersky SAS, Virus Bulletin, HITCON and Mandiant CDS.
Google Mandiant
Aragorn Tseng serves as a Researcher and Analyst for Google Cloud’s Mandiant Intelligence, specializing in tracking state-sponsored actors across the Asia Pacific region. His expertise spans various domains, including malware analysis, incident response, APT campaign tracking, and the application of deep learning to cybersecurity challenges. Aragorn has presented his research at conferences such as Black Hat Asia, CodeBlue, HITCON, Virus Bulletin, and JSAC. Prior to joining Google Cloud, Aragorn worked as a consultant, contributing to incident response and APT campaign tracking initiatives within Taiwan's law enforcement agencies.
Google Mandiant
Chi-Yu You (YCY) is a team lead on the Cyber Espionage Team at Google Cloud’s Mandiant Intelligence and also Blackhat Asia reviewboard. She leads a team that provides insights into nation-state threats in the Asia Pacific region. YCY has 8 years of experience in threat intelligence. Her expertise spans across threat hunting, reverse engineering, automated malware analysis, and campaign tracking. She has spoken at conferences including CodeBlue, HITCON, and JSAC.
NTT DATA Group
Yusuke joined NTT DATA Group in 2019, offering solutions for image processing and natural language processing as a salesperson. He moved to NTTDATA-CERT in April 2023, where he is currently engaged in incident response, IoC collection and sharing as well as promoting the use of AI in CSIRT operations. He has a strong interest in offensive security, including C2 framework development, OSS vulnerability scanning and bug bounty programs.
ESET
Facundo Munoz is a malware researcher, working for ESET since 2021. He focuses on hunting and analyzing advanced persistent threat malware from China-aligned threat actors, and writing reports for ESET’s threat intelligence services. Munoz has presented at conferences such as JSAC, BotConf, and NorthSec.
LAC Co.,Ltd.
Ryosuke belongs to the Next Generation Security Technology Laboratory of Cyber Grid Japan at LAC Co.,Ltd. He specializes in collection and analysis of exploit code and indicators as well as research and development on cyber threat intelligence and AI technology. He has spoken at conferences including FIRSTCON24 Lightning Talk and CSS2024
LAC Co.,Ltd.
Tomoya is a member of the Financial Crime Control Center at LAC Co.,Ltd, where he works on consultation on measures against financial crime and cyber crime. He is also involved in developing and promoting AI-based anomaly detection solutions. He actively participates in coordination activities with other related partners such as Japan Cybercrime Control Center and the Council of Anti-Phishing Japan.
CERT Polska
Jack of all trades, master of none at cert.pl. Busy doing everything that needs to be done at a national CERT - ranging from software engineering to reverse engineering and APT tracking.