The latest attack trend and how to minimize the damage

Curriculum and overview

  • Part 1 “Latest attack trends and methods for minimizing damage”
  • Part 2 “Countermeasures against money laundering required for virtual currency exchange”
  • Part 3 “Overview of technology trend over encryption currency / block chain”


Part 1 “Latest attack trends and methods for minimizing damage”

I mentioned two new threats, SIM hijacking and malware actually used for attack.
Especially in the case of SIM hijacking, smartphones are used for 2-step verification, but attacks of hijacking SIM used there are appearing in the United States.
It is dangerous to think that it is okay because there is multifactor authentication.
Next I would like to mention that I can not find the malware used for the attack.
So, we briefly summarized the policy on what kind of countermeasures should be considered based on such things, so I would like to introduce them.

As a recent threat, I tried to summarize what is related to the virtual currency. The first is to tamper with the transaction information of the block chain itself.
Then attack one of the nodes to infect malware and put a virus in one client dealing in the virtual currency and do illegal transactions.
Another thing is that there are cases like attacking virtual currency exchanges.

It is very difficult to tamper with the transaction information itself in the first block chain.
The block chain itself is a huge P2P network to say the extreme. When encrypting and delivering transaction information in it, when an error occurs, it corrects the error by a method like a majority decision, so to alter the transaction information itself, it is necessary to tamper with 51% of all nodes there is.
Since there are many nodes in the block chain of bit coins, it is impossible to alter the entire transaction information by tampering 51% of them.



Part 2 “Countermeasures against money laundering required for virtual currency exchange”

Today’s agenda, the report of the report “Interim report of virtual currency exchangers etc. inspection / monitoring summary” was announced from the Financial Services Agency in August, so I will briefly introduce it.
Then I will explain the fundamental concept of anti-money laundering and the flow of AML work and let me briefly explain the functions required for AML system based on that.
I will tell you a little about the case study of suspicious transactions in virtual currency transactions and I will talk about further advanced AML system.

I will excerpt the current status of inspection and monitoring announced by the Financial Services Agency in August.
Although it is a copy of the documents of the Financial Services Agency, there are three lines of defense of the business department, the risk and compliance division and the internal audit department at the 1st and 2nd lines to the 3rd line, We are not doing the maintenance of the internal management system according to the risk after evaluating the risk of sharing of funds with antispermanance, “and it is the present condition that advanced countermeasures are required for countermeasures against manor.

Next, the basic concept of anti-money laundering, we list three main things that support the business, one is customer management, the second and third are management of transactions.
Of course, it is an inseparable part because the customer makes a transaction, but here we divide it by dealing with customers.
Regarding customer management, it is called Know Your Customer and it is called KYC work, but it is also called CDD as Customer Due Diligence.
Although we manage transactions, we list two in the filtering and monitoring of transactions, and the filtering of transactions judges on the spot whether the transaction is through or not through the transaction when the transaction is requested from the customer, Judge beforehand, but it becomes a filtering business of the transaction.
The transaction monitoring business is a business that links several transactions by batch processing such as daily, weekly, monthly, etc. after the execution of the transaction, analyzes the transaction, and conducts transactions suspected of money laundering and terrorist financing It will be a task to show off.
There is a risk-based approach as a concept that follows these three tasks.
It was announced by the Financial Services Agency in February this year and it is said that it is the minimum standard that such a way of thinking naturally carries out …



Part 3 “Overview of technology trend over encryption currency / block chain”

Coinbase / Bitmain / Binance listed here are three mega players who can say that they are leading the industry right now.
Mining equipment manufacturers and exchanges are lining up, but I think that such players will come out one after another from now on, and I think players will come out in forms other than mining and exchange .
The important thing for doing encryption currency and block chain adaptation is what is it to use encryption currency or block chain?
Three keywords are cited as a purpose of utilization, but it is Internet of value, trast stress, non-centralized power.
When assuming to use for such purpose, encryption currency and block chain as a point of trying to take off or leap in industry, maturation of protocols, fitting of use cases, consistency with regulation I think that is where.

First of all, it is an overview of the main block chain protocol, but in the first place, I think that speaking the word block chapter vaguely with a general noun is at its limit.
There are so many platforms in the block chain, and we organized it in two axes from the viewpoints of transactions publicly on the vertical and horizontal axes, whether the transaction is public or flexible, and the flexibility of contract creation. Since time is limited, today I will focus on public matters of this matrix.
Although there is a direction to compare the current state of the block chain to the Internet of the 1990s, I think that the Internet has reached the maturity after chaos in the 1990s.
Maturity of the protocol that occurred at that time became available for internet banking and mobile banking in the process of increasing throughput, improving the accuracy of privacy, governance, security, standards progresses.
We can apply the five blocks seen by the maturity of the Internet to the block chain, and I would like to organize it with blocks called throughput, privacy, governance, security, and standards. I believe that the current block chain also has five problems that must be solved in the same way as in the Internet in the 1990’s, and I would like to see through throughput, privacy, governance, security and finally in the order of standard I think.

The first thing to mention is transaction and processing performance issues.
In the block chain, it is structured to store transactions that have flowed in the network in the bucket, and since the size of the block or bucket is decided at that time, there arises a problem that it is not decided that a large amount of transactions will arrive. I think whether there is a duplication of duplication and a dilemma of dispersion when trying to solve this.
A duplication dilemma means that block chains have duplicate copies of ledgers and then do not rely on a player like a certain rich player but have a mechanism to verify transactions with everyone who joins the network As shown in Fig.
Everyone verifies with the same ledger copy, so simply increasing the number of participants will not increase the performance of the verification.

Distributed dilemma means that if you want to process large volumes of transactions, you may want to increase the size of the bucket itself, but as soon as power concentrates on only the specific strength that distinguishes a large bucket However, at the same time, the risk of hacking also increases, so it is not preferable. These two are the scalability issues of transactions.
For example, in the case of distributed databases, throughput performance improves as nodes are increased, but since each participant verifies the entire data of the block chain in the block chain, even if the number of nodes is increased, the throughput Unfortunately performance is not improved …





  • 第一部 「最新の攻撃動向と被害の最小化方法」
     日本アイ・ビー・エム株式会社 小倉 秀敏氏
  • 第二部 「仮想通貨交換業者に求められるマネーロンダリング対策」
     SAS Institute Japan株式会社 水谷 剛士氏
  • 第三部 「暗号通貨・ブロックチェーンを巡る技術トレンド概観」
     株式会社野村総合研究所 畑島 崇宏氏



日本アイ・ビー・エム株式会社 小倉 秀敏氏

 最新の脅威として SIM ハイジャックと実際に攻撃に使われたマルウェアの二つを挙げさせていただきました。
 特にSIMハイジャックの場合、スマートフォンでは2段階認証でお使いになりますが、そこで使われる SIM を乗っ取るという攻撃が米国で出てきています。


 ビットコインのブロックチェーンは多くのノードがあるので、そのうちの 51 パーセントを改ざんして取引情報全体を変えてしまうことは不可能です。




SAS Institute Japan株式会社 水谷 剛士氏


 金融庁の資料のコピーですが、第1線、第2線でビジネス部門やリスク・コンプラ部門、内部監査部門の3ラインディフェンスということで第3線まであるわけですが、3 線ともに「セキュリティやアンチマネロン、資金共有のリスクを評価した上でリスクに応じた内部管理の体制の整備を行っていない」ということで、マネロン対策について高度な対応を求められているという現状です。

 顧客管理につきましてはKnow Your Customerということで頭文字を取ってKYC業務と呼ばれますが、Customer Due Diligence ということでCDDとも呼ばれます。




株式会社野村総合研究所 畑島 崇宏氏

 こちらに挙げました Coinbase/Bitmain/Binance は、現在、業界をリードしていると言ってもいい三つのメガプレーヤーです。

 ブロックチェーンには非常に多くのプラットフォームがあるわけで、簡便に縦軸、横軸でトランザクションがパブリックかどうか、コントラクトの作り込みの柔軟性という観点の 2 軸で整理しました。時間も限られますので、本日はこのマトリクスのうち、パブリックなものにフォーカスしてお話します。