© 1996-2024 JPCERT/CC
Details
Details
NTT Security Holdings
Rintaro Koike is a security analyst at NTT Security Holdings. He is engaged in threat research and malware analysis. In addition, he is the founder of "nao_sec" and is in charge of threat research. He focuses on APT attacks targeting East Asia and web-based attacks. He has been a speaker at VB, SAS, Botconf, AVAR and others.
NTT Security Holdings
Amata Anantaprayoon is a security analyst at NTT Security Holdings and specializes in real-time threat detection, incident response, detection engineering, and cyber threat research. Amata regularly shares his insights at leading conferences such as Virus Bulletin as well as at closed events as a key member of NTT´s Threat Intelligence research community.
株式会社みずほフィナンシャルグループ
2017年みずほ銀行に入行。前職セキュリティ会社のコンサルタントを経て、現在に至る。インシデント対応のCSIRTの担当やSOCの運用・企画、脅威インテリジェンスの担当など多岐の業務をこなす。インターネットバンキングの不正送金の対策業務、フィッシング対応も担当。
株式会社みずほフィナンシャルグループ
2014年みずほ銀行に入行。 都内店の営業課、本部の個人向け商品(主にインターネットバンキング)企画・運用部門を経て、現配属に至る。インターネットバンキングに関するセキュリティ全般(企画・運用)や不正送金・マネロン対策業務等を担当したのち、現在はサイバーインシデント(フィッシング対応やセキュリティ対策)対応等を担当。
株式会社みずほフィナンシャルグループ
2020年みずほ銀行に入行。前職ではマルウェアアナリスト、フォレンジックアナリスト、SOC業務のリーダーを経験。現職ではインシデント対応にてログ調査やマルウェア解析を行う傍ら、脅威インテリジェンスを収集するシステムの運用・開発を担当している。
NSHC
Hankuk Jo is a researcher at the Threat Research Lab of NSHC, specializing in cybersecurity and threat intelligence. He is passionate about sharing his insights and primarily focuses on analyzing the tactics, techniques, and procedures (TTPs) employed by cyber attackers, leveraging threat intelligence data.
NSHC
Sangyoon Yoo is a seasoned professional in the field of cyber threat intelligence and research, currently working at the Threat Research Lab of NSHC. With a strong background in analyzing and researching various cybersecurity threats, Sangyoon has developed expertise in threat intelligence, game hacking tools, and malware analysis.
NSHC
Jeonghee Ha is a researcher at the Threat Research Lab of NSHC. Previously, JeongHee worked as an Incident Response Analyst and also has experience in CERT, analyzing threat events and providing first response. Jeonghee is primarily interested in threat data related to cybercrime groups and has a strong interest in digital forensic techniques.
株式会社ラック
株式会社ラック サイバー救急センターにて、マルウェア解析に従事するほか、ラックセキュリティアカデミー講師や本などの執筆を行っている。PACSEC、AVAR、HITCON、Virus Bulletin、Black Hat USA Arsenalなどで登壇。
Trend Micro
Theo Chen is a Senior Threat Researcher at Trend Micro, bringing over five years of comprehensive experience in the cybersecurity domain. His areas of expertise include penetration testing, malware analysis, and threat hunting, with a strong focus on understanding and mitigating advanced cyber threats. Throughout his career, Theo has been involved in multiple initiatives aimed at strengthening organizational security, focusing on detecting advanced threats and designing proactive defense strategies. Currently, He specializes in tracking APT groups, particularly those associated with Chinese-speaking actors. His work involves in-depth analysis of emerging cyber threats and TTPs employed by these sophisticated adversaries.
Trend Micro
Leon Chang is a Senior Threat Researcher at Trend Micro. His major areas of research include APT campaign tracking, threat intelligence and malware analysis. He has also been a speaker at international conferences, including Black Hat Asia 2022, JSAC 2021/2022, CYBERSEC and AISA, etc.
Financial Security Institute
He is the CSIRT Lead at the Financial Security Institute in South Korea, with over two decades of experience in cybersecurity focused on the financial sector. His expertise spans vulnerability assessments, penetration testing, security operations, and incident response, ensuring robust defenses against evolving cyber threats. Beyond his primary role, he actively tracks Democratic People's Republic of Korea (DPRK) state-sponsored threat actors as a personal side project, managing the website lazarus.day and the X (formerly Twitter) account lazarusholic, where he shares in-depth analysis and insights on these cyber adversaries.
TeamT5
Yi-Chin Chuang is a threat intelligence researcher at TeamT5. She is passionate about reverse engineering and malware analysis. Her current research focuses on APT threats within the APAC region. She has shared her research findings at Underground Economy, JSAC, CYBERSEC, and TAS.
TeamT5
Yu-Tung Chang is a Threat Intelligence Researcher from TeamT5. He is interested in reverse engineering, vulnerability exploiting and malware analysis. He was engaged in network attacks research and rule writing. Currently, his research focuses on cyber threat intelligence in the East Asia region. He has spoken at Code Blue, TAS and JSAC.
伊藤忠サイバー&インテリジェンス株式会社
伊藤忠サイバー&インテリジェンスにてインシデントレスポンスや脅威分析に従事。
伊藤忠サイバー&インテリジェンス株式会社
伊藤忠サイバー&インテリジェンスにてインシデントレスポンスや脅威分析に従事。
伊藤忠サイバー&インテリジェンス株式会社
伊藤忠サイバー&インテリジェンスにてインシデントレスポンスや脅威分析に従事。
株式会社リクルート
2016年より株式会社リクルートテクノロジーズに入社。リクルートCSIRTとして、リクルートにおけるセキュリティ事故対応のチームリードを行う。2021年4月に、サイバー犯罪対策グループを発足、サイバー犯罪対策のためのカード不正やなりすましログインなどを専門とした分析調査を実施。CISSP、GCIH、GCTI、GNFA。
株式会社リクルート
株式会社リクルートにて脆弱性診断やペネトレーションテストに従事。現在はリクルートCSIRTとしてセキュリティ事故対応、監視対応、脅威ハンティング等を行う。
ESET
Dominik is a malware researcher at ESET. Coming from academia, he joined ESET in 2019 to help track the activities of APT groups with a particular focus on the China-aligned group MirrorFace. He previously presented at AVAR and also at JSAC 2024. In his spare time, he plays video games and watches bad movies.
東京海上ホールディングス株式会社
2009年より、セキュリティ専門企業にて、侵入テスト、セキュリティ監査、インシデント対応などに従事。現在は、東京海上ホールディングスにて、セキュリティ戦略立案、セキュリティアーキテクチャ、脅威インテリジェンス分析、インシデント対応などを担当。また、情報処理技術者試験委員・情報処理安全確保支援士試験委員、総務省サイバーセキュリティエキスパート、執筆や技術書翻訳なども行っている。
東京海上ホールディングス株式会社
警察庁技官として16年間従事し、サイバー犯罪対策やサイバーテロ対策の技術支援を担当。警視庁出向時、国際犯罪組織対策に携わる経験も持つ。その後、セキュリティ専門企業にてインシデントへのフォレンジックやインテリジェンス、政府機関向けトレーニングの企画開発等を担当。2022年からは東京海上ホールディングスにて、セキュリティ運用、インシデント対応、および国内外のグループ会社向けのセキュリティ対策に従事している。
東京海上ホールディングス株式会社
2009年に大学卒業後、東京海上日動システムズへ入社。2016年からサイバーセキュリティ担当となり、東京海上日動、東京海上あんしん生命のシステムへのセキュリティ対策の導入推進やインシデント対応やポリシー策定などの業務を担当する。2023年から東京海上ホールディングスへ出向し、CSIRT及び国内外のグループ会社向けのセキュリティ施策を担当する。保有資格はOSCP、CISSP、CISA、情報処理安全確保支援士、ITILv3Expert。
Sygnia
Aaron is a security researcher with more than four years of experience in various aspects of Cybersecurity including Incident Response, Red Teaming and Security Research. He is currently an Incident Response Expert with Sygnia, where he is part of the team that investigates security incidents ranging from advanced persistent threats (APTs) and ransomware attacks to data breaches.
Sygnia
Ren Jie is an Incident Response Expert from Singapore, with over four years of experience in managing and mitigating information security incidents. He has successfully navigated a wide range of challenges, including ransomware attacks, data breaches, advanced persistence threats (APTs), and financial fraud.
Trend Micro
Pierre Lee is a Senior Threat Researcher at Trend Micro, expertise in reverse engineering, threat hunting, APT campaign research across the APAC region. Prior to joining Trend Micro, Pierre worked as an Anti-Virus analyst, focusing on malware detection engineering using both signature-based and machine learning approaches.
Trend Micro
Philip Chen is an APT threat researcher at TrendMicro, specializing in reverse-engineering and threat hunting. His work focuses on identifying and analyzing advanced persistent threats, malware, and security vulnerabilities. In his free time, he also explores fuzzing technologies. His background in cybersecurity gives him a well-rounded perspective on both offensive and defensive strategies.
Trend Micro
Vickie Su is a threat researcher in Trend Micro. She is in charge of handling targeted attack cases around the Asia-Pacific region by malware analysis, performing correlating intelligence during the investigation, figuring out threat actors' Tactics, Techniques and Procedures (TTPs).
KRCERT/CC
ongwook Kim have been working for KRCERT/CC since 2013 as Computer Incident Analyst. He has a lot of experiences related to internet security incident response(Supply Chain Attacks, cryptocurrency exchange hacking and so on). Recently, He is tracking and analyzing specific hacking group targeting Korea.
KRCERT/CC
Seulgi Lee is currently a malware analyst at Korea Internet & Security Agency. He carried out research into cyber security such as cyber threat intelligence, SIEM for 7 years from 2012 in the R&D department. After moving to KrCERT/CC position, He has been analyzing threats targeting Korea and sharing insights based on the results to prevent the infringement cases and minimize the damage in Korea.
NTTコミュニケーションズ株式会社
NTTコミュニケーションズ株式会社にて、脅威インテリジェンスプロジェクトNA4Secのメンバーとして活動し、フィッシング詐欺を中心にさまざまなサイバー犯罪の調査・分析に従事。SNSでフィッシングサイトの情報発信を行っている。
Google Mandiant
Steve Su is a Senior Security Engineer & Researcher at Google Cloud’s Mandiant Intelligence. His proficiency focuses on malware hunting, reverse engineering, and tracking state-sponsored campaigns over the Asia Pacific region. He had public talks on conferences such as Kaspersky SAS, Virus Bulletin, HITCON and Mandiant CDS.
Google Mandiant
Aragorn Tseng serves as a Researcher and Analyst for Google Cloud’s Mandiant Intelligence, specializing in tracking state-sponsored actors across the Asia Pacific region. His expertise spans various domains, including malware analysis, incident response, APT campaign tracking, and the application of deep learning to cybersecurity challenges. Aragorn has presented his research at conferences such as Black Hat Asia, CodeBlue, HITCON, Virus Bulletin, and JSAC. Prior to joining Google Cloud, Aragorn worked as a consultant, contributing to incident response and APT campaign tracking initiatives within Taiwan's law enforcement agencies.
Google Mandiant
Chi-Yu You (YCY) is a team lead on the Cyber Espionage Team at Google Cloud’s Mandiant Intelligence and also Blackhat Asia reviewboard. She leads a team that provides insights into nation-state threats in the Asia Pacific region. YCY has 8 years of experience in threat intelligence. Her expertise spans across threat hunting, reverse engineering, automated malware analysis, and campaign tracking. She has spoken at conferences including CodeBlue, HITCON, and JSAC.
NTTデータグループ
2019年にNTTデータグループに入社し、営業として画像処理や自然言語処理ソリューションなどを販売。2023年4月より同社のCSIRT部隊「NTTDATA-CERT」に異動し、インシデント対応、IoCの収集~配信業務、並びにAIを用いたCSIRT業務の効率化に従事。また、C2フレームワーク開発、OSSの脆弱性探索、バグバウンティプログラム参加などオフェンシブセキュリティに強く関心を持つ。
ESET
Facundo Munoz is a malware researcher, working for ESET since 2021. He focuses on hunting and analyzing advanced persistent threat malware from China-aligned threat actors, and writing reports for ESET’s threat intelligence services. Munoz has presented at conferences such as JSAC, BotConf, and NorthSec.
株式会社ラック
株式会社ラック サイバー・グリッド・ジャパン 次世代セキュリティ技術研究所に所属。Exploit Code・indicatorの収集分析、脅威インテリジェンスとそれを効率化するAIの研究・開発に従事。FIRSTCON24 Lightning Talk、CSS2024などで登壇。
株式会社ラック
株式会社ラック 金融犯罪対策センターに所属。金融犯罪対策、サイバー犯罪対策のコンサルテーションに従事。また、AIを用いた不正取引検知ソリューションの開発におけるデータ分析やAIのモデル構築、導入支援にも関わる。さらに、日本サイバー犯罪対策センターやフィッシング対策協議会などの関連外部団体・組織と連携した活動等に従事。
CERT Polska
Jack of all trades, master of none at cert.pl. Busy doing everything that needs to be done at a national CERT - ranging from software engineering to reverse engineering and APT tracking.