{"id":118372,"date":"2026-02-17T10:00:42","date_gmt":"2026-02-17T03:00:42","guid":{"rendered":"https:\/\/wp.eastgate-software.com\/?p=118372"},"modified":"2026-04-01T15:20:14","modified_gmt":"2026-04-01T08:20:14","slug":"state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks","status":"publish","type":"post","link":"https:\/\/wp.eastgate-software.com\/jp\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\/","title":{"rendered":"State-Sponsored Hackers Use AI Tools Like Gemini in Cyberattacks"},"content":{"rendered":"<p><span data-contrast=\"auto\">State-sponsored hackers are increasingly integrating artificial intelligence into cyber operations. Google\u2019s Threat Intelligence Group (GTIG) reports that actors linked to Iran, North Korea, China, and Russia are using models such as Google\u2019s Gemini to enhance reconnaissance, phishing, and malware development.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">According to Google\u2019s late-2025 AI Threat Tracker, large language models are now embedded across multiple stages of the attack lifecycle. GTIG researchers state that for government-backed threat actors, AI models have become essential tools for technical research, target profiling, and generating high-fidelity phishing lures.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Iranian group APT42\u00a0reportedly used\u00a0Gemini to create official-looking email addresses and conduct detailed research to craft credible pretexts. The group refined language and translated content to avoid traditional phishing red flags, such as grammatical errors. North Korean actor UNC2970 used Gemini to profile\u00a0defence-sector targets, mapping job roles and gathering salary data. GTIG noted that this activity increasingly blurs the line between legitimate professional research and malicious reconnaissance.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Beyond social engineering, Google\u00a0identified\u00a0a rise in model extraction attempts targeting Gemini.\u00a0One campaign used more than 100,000 prompts in an effort to replicate the model\u2019s reasoning capabilities.\u00a0GTIG also\u00a0observed\u00a0malware such as HONESTCUE leveraging Gemini\u2019s API to dynamically generate C# code, enabling fileless execution directly in memory. Separately, phishing kits like COINBAIT were\u00a0likely accelerated\u00a0using AI code-generation platforms.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Despite these developments, GTIG reports no breakthrough capabilities that fundamentally change the threat landscape. However, AI is increasing the speed, scale, and efficiency of cyber operations. For enterprise security teams, particularly in regions facing persistent state-sponsored threats, the findings highlight the need to strengthen\u00a0defences\u00a0against AI-augmented reconnaissance, phishing, and automated malware generation.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">\u30bd\u30fc\u30b9\uff1a<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.artificialintelligence-news.com\/news\/state-sponsored-hackers-ai-cyberattacks-google\/\"><span data-contrast=\"none\">https:\/\/www.artificialintelligence-news.com\/news\/state-sponsored-hackers-ai-cyberattacks-google\/<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>State-sponsored hackers are increasingly integrating artificial intelligence into cyber operations. Google\u2019s Threat Intelligence Group (GTIG) reports that actors linked to Iran, North Korea, China, and Russia are using models such as Google\u2019s Gemini to enhance reconnaissance, phishing, and malware development.\u00a0 According to Google\u2019s late-2025 AI Threat Tracker, large language models are now embedded across multiple stages of the attack lifecycle. GTIG researchers state that for government-backed threat actors, AI models have become essential tools for technical research, target profiling, and generating high-fidelity phishing lures.\u00a0 Iranian group APT42\u00a0reportedly used\u00a0Gemini to create official-looking email addresses and conduct detailed research to craft credible pretexts. The group refined language and translated content to avoid [&hellip;]<\/p>","protected":false},"author":238283293,"featured_media":118374,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1584],"tags":[1488,1646,1730,1729],"class_list":["post-118372","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-enthusiast","tag-ai","tag-cyberattacks","tag-gemini","tag-google"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>State-Sponsored Hackers Use AI Tools Like Gemini in Cyberattacks - Eastgate Software<\/title>\n<meta name=\"description\" content=\"Google\u2019s AI Threat Tracker reveals state-sponsored hackers are using AI tools like Gemini to accelerate phishing, reconnaissance, malware.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"State-Sponsored Hackers Use AI Tools Like Gemini in Cyberattacks\" \/>\n<meta property=\"og:description\" content=\"Google\u2019s AI Threat Tracker reveals state-sponsored hackers are using AI tools like Gemini to accelerate phishing, reconnaissance, malware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wp.eastgate-software.com\/jp\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Eastgate Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EastgateSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-17T03:00:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T08:20:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-13-e1770969150870.webp?fit=1360%2C615&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1360\" \/>\n\t<meta property=\"og:image:height\" content=\"615\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"huongnguyen253\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:site\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"huongnguyen253\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\\\/\"},\"author\":{\"name\":\"huongnguyen253\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\"},\"headline\":\"State-Sponsored Hackers Use AI Tools Like Gemini in Cyberattacks\",\"datePublished\":\"2026-02-17T03:00:42+00:00\",\"dateModified\":\"2026-04-01T08:20:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\\\/\"},\"wordCount\":288,\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/EGS-news-website-1366-x-768px-13-e1770969150870.webp?fit=1360%2C615&ssl=1\",\"keywords\":[\"Ai\",\"Cyberattacks\",\"Gemini\",\"Google\"],\"articleSection\":[\"Tech Enthusiast\"],\"inLanguage\":\"ja\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\\\/\",\"name\":\"State-Sponsored Hackers Use AI Tools Like Gemini in Cyberattacks - Eastgate Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/EGS-news-website-1366-x-768px-13-e1770969150870.webp?fit=1360%2C615&ssl=1\",\"datePublished\":\"2026-02-17T03:00:42+00:00\",\"dateModified\":\"2026-04-01T08:20:14+00:00\",\"description\":\"Google\u2019s AI Threat Tracker reveals state-sponsored hackers are using AI tools like Gemini to accelerate phishing, reconnaissance, malware.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\\\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wp.eastgate-software.com\\\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/EGS-news-website-1366-x-768px-13-e1770969150870.webp?fit=1360%2C615&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/EGS-news-website-1366-x-768px-13-e1770969150870.webp?fit=1360%2C615&ssl=1\",\"width\":1360,\"height\":615,\"caption\":\"State-Sponsored Hackers Use AI Tools Like Gemini in Cyberattacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"State-Sponsored Hackers Use AI Tools Like Gemini in Cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"name\":\"Eastgate Software\",\"description\":\"A Global Fortune 500 Company&#039;s Strategic Partner\",\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wp.eastgate-software.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\",\"name\":\"Eastgate Software\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"contentUrl\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"width\":124,\"height\":36,\"caption\":\"Eastgate Software\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EastgateSoftware\\\/\",\"https:\\\/\\\/x.com\\\/EastgateSoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\",\"name\":\"huongnguyen253\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"caption\":\"huongnguyen253\"},\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/jp\\\/author\\\/huongnguyen253\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"State-Sponsored Hackers Use AI Tools Like Gemini in Cyberattacks - Eastgate Software","description":"Google\u2019s AI Threat Tracker reveals state-sponsored hackers are using AI tools like Gemini to accelerate phishing, reconnaissance, malware.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"ja_JP","og_type":"article","og_title":"State-Sponsored Hackers Use AI Tools Like Gemini in Cyberattacks","og_description":"Google\u2019s AI Threat Tracker reveals state-sponsored hackers are using AI tools like Gemini to accelerate phishing, reconnaissance, malware.","og_url":"https:\/\/wp.eastgate-software.com\/jp\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\/","og_site_name":"Eastgate Software","article_publisher":"https:\/\/www.facebook.com\/EastgateSoftware\/","article_published_time":"2026-02-17T03:00:42+00:00","article_modified_time":"2026-04-01T08:20:14+00:00","og_image":[{"width":1360,"height":615,"url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-13-e1770969150870.webp?fit=1360%2C615&ssl=1","type":"image\/webp"}],"author":"huongnguyen253","twitter_card":"summary_large_image","twitter_creator":"@EastgateSoft","twitter_site":"@EastgateSoft","twitter_misc":{"\u57f7\u7b46\u8005":"huongnguyen253","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"2\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wp.eastgate-software.com\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\/"},"author":{"name":"huongnguyen253","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a"},"headline":"State-Sponsored Hackers Use AI Tools Like Gemini in Cyberattacks","datePublished":"2026-02-17T03:00:42+00:00","dateModified":"2026-04-01T08:20:14+00:00","mainEntityOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\/"},"wordCount":288,"publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-13-e1770969150870.webp?fit=1360%2C615&ssl=1","keywords":["Ai","Cyberattacks","Gemini","Google"],"articleSection":["Tech Enthusiast"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/wp.eastgate-software.com\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\/","url":"https:\/\/wp.eastgate-software.com\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\/","name":"State-Sponsored Hackers Use AI Tools Like Gemini in Cyberattacks - Eastgate Software","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-13-e1770969150870.webp?fit=1360%2C615&ssl=1","datePublished":"2026-02-17T03:00:42+00:00","dateModified":"2026-04-01T08:20:14+00:00","description":"Google\u2019s AI Threat Tracker reveals state-sponsored hackers are using AI tools like Gemini to accelerate phishing, reconnaissance, malware.","breadcrumb":{"@id":"https:\/\/wp.eastgate-software.com\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wp.eastgate-software.com\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/wp.eastgate-software.com\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\/#primaryimage","url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-13-e1770969150870.webp?fit=1360%2C615&ssl=1","contentUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-13-e1770969150870.webp?fit=1360%2C615&ssl=1","width":1360,"height":615,"caption":"State-Sponsored Hackers Use AI Tools Like Gemini in Cyberattacks"},{"@type":"BreadcrumbList","@id":"https:\/\/wp.eastgate-software.com\/state-sponsored-hackers-use-ai-tools-like-gemini-in-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wp.eastgate-software.com\/"},{"@type":"ListItem","position":2,"name":"State-Sponsored Hackers Use AI Tools Like Gemini in Cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/wp.eastgate-software.com\/#website","url":"https:\/\/wp.eastgate-software.com\/","name":"Eastgate Software","description":"\u30b0\u30ed\u30fc\u30d0\u30eb\u30d5\u30a9\u30fc\u30c1\u30e5\u30f3500\u4f01\u696d\u306e\u6226\u7565\u7684\u30d1\u30fc\u30c8\u30ca\u30fc","publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wp.eastgate-software.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/wp.eastgate-software.com\/#organization","name":"Eastgate Software","url":"https:\/\/wp.eastgate-software.com\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/","url":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","contentUrl":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","width":124,"height":36,"caption":"Eastgate Software"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EastgateSoftware\/","https:\/\/x.com\/EastgateSoft"]},{"@type":"Person","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a","name":"\u30d5\u30aa\u30f3\u30b0\u30a8\u30f3253","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","caption":"huongnguyen253"},"url":"https:\/\/wp.eastgate-software.com\/jp\/author\/huongnguyen253\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-13-e1770969150870.webp?fit=1360%2C615&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pf8Ne8-uNe","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/posts\/118372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/users\/238283293"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/comments?post=118372"}],"version-history":[{"count":3,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/posts\/118372\/revisions"}],"predecessor-version":[{"id":119515,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/posts\/118372\/revisions\/119515"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/media\/118374"}],"wp:attachment":[{"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/media?parent=118372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/categories?post=118372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/tags?post=118372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}