You are on page 1of 120

HTTP://COEIA.EDU.

SA

 


W 

 


W 

 
"#$%&'K (
"#K&01-.-/ *+,
 2.&3
K."1$% 435

    

 


W 

1429 2008 -


    
 "#$)('&W%  0)
/.- , L+

   342 6/ 781429

0002 <24C17
= 978-603-00-1453-8W
? J1 ? J2-@  0
?  K34B6BKHEE= FF CI 



 
 
 


  005,8J6



 



 1429L5884

=<L)6 1429L5884W
= 978-603-00-1453-8W


>;=83 *789:;0
*/0? 
2009-@A1429 

 

 W


  

      .*

MN6=7O7P 8,4 Q- B B //6  S 6


U774 77V77776ME= 77W77L77 X - 77077 @77477 
E= 7WK7# ( S- Y
+= Z8+= X\( Z
K7]^- 7YX774M 7Y 4_/7W) 7Y `O7 I- 7=4aM
773O/d77777777
77- 7 <77c&MN6= 7 (377
=U774 77bS
- 76$M7Z _

=/3O/df =gZ
<h_/
+77i- 776$77- 7777?M'77 +./77U774 77bS77 (6/+77i
+=a- 7777? 77kM77  4 77bbl- Y77WU774 77bS 77 77 (6/
M077O - 7777?M77bb^77 - 77]77776m77Kd6= 77
77? 77kM77 36=-=77-/77n o77776 <77`6677ZFi77b
 K- 

    .*
7 &('$-p 7q 7&/U7r7 (@ 7 (+ 7IL//6  S 6
-$ 77bO$ ?/77- 777 I`O 7"LM 77 (77c&?g37  ` 777 (@
7  7- <c&MgZ
6= (3t
=U4 # SK?6Z
+ Y7WU74 7,6? 7# SK 76/ 7 Q- 0 @4
vS 8EProject Management ProfessionalFd6= +=aM  4 bbl
K Q- B B /M

 


W 

 
9.....................................................................................................
: 14...........................................................
1.1 15.................................................................

1.1.1 )15 ................................... (E-Mail Client


2.1.1 )16 ..................................... (E-Mail Server
2.1 17.....................................................
3.1 18..........................................................

1.3.1 18 ...............................................
2.3.1 18 ......................................................
4.1 19.....................................
5.1 21...........................................................................
6.1 22..................................................................
: )24................................ (Spam
1.2 26..............................................
2.2 31.............................................

1.2.2 : )31 ................... (E-Mail Spoofing


2.2.2 : )31 ............ (Open Mail Rely
3.2.2 :

)(Image-based Spam

32

4.2.2 : )34 ........................ (Dictionary Attack


3.2 34...................................

1.3.2 : )34 ................................... (Filtration


2.3.2 : )35(Black lists / White lists

 


W 

3.3.2 : )37 ...... (Commercial Whitelists


4.3.2 : )37 ................ (Integrity Check
5.3.2 : 38 ........................................
6.3.2 : 38 ..................
7.3.2 : )39 . (Spam Reportin
8.3.2 :
)41 ...................................................................(SMTP RFC
9.3.2 : )41 .... (Fake MX Records
10.3.2 : )43 ..................... (Greeting delay
: )45............................................... (Phishing
: )65...................... (Phishing Techniques

1.4 : )67 ................. (DNS Poisoning


2.4 : )70 ............ (Hosts File Poisoning
3.4

: )71(Content Injection

4.4

73 .

5.4

: )76 ..................... (Address Obfuscation

)(Man-in-the-Middle Attack MITM

6.4 : )80(Malware Attack


7.4 :
)80 ....................................................................... Phishing
8.4 : )81(The Popup Attack
(Search Engine

9.4 : )83 ................... (Fake Address Bar

(Phishing

)91................................................................................... Countermeasures

1.5 : 92 ...........

 


W 

1.1.5 92 ........................................
2.1.5 )92 ...................... (Bounced E-Mails
3.1.5 93 ..................................................
4.1.5 94 ......................................................
5.1.5 94 ............................
2.5 : )98 ..................................... (Filteration
3.5 : ) (Security Patches
)99 ...................................................................... (Firewalls
4.5 : )100 ..(Cross-Site Script - XSS
5.5 : )101 ............... (Visual Keyboard
6.5 : )102 ......... (Two-Factor Authentication
7.5 : )104 .............. (Mutual Authentication
8.5 :
)105 ..................................................................... Toolbars
9.5 : )110(Anti-Phishing Software
(Anti-Phishing

111.....................................................................................
117................................................................................................

 


W 



 


W 

10

?xI?/b4)&'&/L 73Lw7`47&7F7b 7B^7  YO


BO/7" (76?za?y37#^7)&'&/7?w7- 7Zm7I7$
(7g/7rK? 736/Ly37# 77(6Jx7m7 r^7)&'& 7Bw7
- Z/r7g7 x ]I 74K  7  7d7OM+= 7V`/7
 B 33 n6`/ I# "L"/{rBO6^)&'& 33y3#?w
B/L68?_p  YI#<Yr?  <Y3 33Z6 K= " ?m
x8( I6H?S " =@6%78 "7#$)('&%7Jx7
F M03Z6L -^  b= L-  Zi6/Z (I3 
7`r Y 40O'677O7@K-  7Z/7Z6x78(7OH 7
((  7&?/Y7W? I 3/Z0  7 7Y36t7 7o "7#p
 in)
/.-O6 L ZK- VC} L ~r] M  = 7
n(  Km 8H
a?&/haU7743O 77(/(77 f77\77i 77Yx778M%77/ 77
@ 77Z?U77I?&{77rx778<Y77Z6(%^77Z77 4OMH 77)&'&77w77
 " = K 8= h `O
.    

    

11

 


W 


?Ui77n776)('&77(E-Mail)%77 77 77bO$@776 +x77

 


W 

12

 = &$"//d= 6\ZU4./r?<7c%]rK- cI


-$ k 4 S6)('& % EFaxF I+ bO?   K
6)('&m]b% /OJ? 7m7 7/O 7\/7 ? 7
'(aw& .& ?Lm&{r$6/4.%  ( Cp^7 Y
8_g8_   c& Y 4}t6)('& K%
x8L I6( FH  0M^Zp6)('&%
(  .%)
/.- , C+< 7Z`OL(7br7ZzaH 7K
] b c&/676)('&%7] 7b 7=L 7I6%& 776
)('&g77%77ESpamF77/}77n77`776(H 77N /77778
"#$)('&EPhishingF%7( 7Jx77n]7b7 zav7
 KN
3O?x8 8( m& MH 64O+%^7Z7Y
 /
@ 0(3  EInternetF 76x'74 776)('&7S?%7
?&<Y"77   77M77`I77@ 77\77i 77kM%77/<77Y 77ZS
 V?  K-
 

13

 


W 

 

14


W 

  
"#    




15

 

 W


7`6/m7O &(v7 S7%&)('6 c& 8  b]x8/6


(3774%7&)('76 7/O7 ]  7,6?/76Kd Y, Y4
M- 7L "I. ? c&= 'M ^Z -$ Ov S  
76 7=7 ( C/7W 7b]x78/7 MK%7&)('76 /O 4
 K%&)('
 

1.1

EData NetworkF- 7& 3(37WU74 I3EApplicationsF- ` 3"(O


U74377 3"O%7&)('76 ?7KEserverF 7 EclientF 7 4
 77 EE-Mail

ClientF%77&)('776 77 47777(677Yr- 77& 3(377W

 KEE-Mail ServerF%&)('6

(E-Mail Client) 1.1.1


m7Y
78EMail User Agent-MUA)^7Z76/ 7 7,6?UZ6
 KEE-Mail ServerF %&)('6 ^Z I 3
 W%8%&)('6 4F
^7 EE-Mail ServerF 7M76H 7ZS776'
7
 KEPOP3F60( O/
 K= +-  `za I /3n
76 &` O/ ^EE-Mail ServerF za / <ZO
KESMTPF Z3
K%&)('6 c&M%&)('6 4dLE1-1F (yn6

 

 W

Microsoft

16

?q 777&/%777&)('7776 777 4q/777U7774777777


.?wr/(6 ? /WE1F?Outlook

(E-Mail Server) 2.1.1


Jx778 KEMail

Transfer AgentMTAF76 7`& 7 7,6?U7Z6

%7&)('767 za7%&)('6 = 3`` 6


 KEInternetF  (3U4\/ 
Microsoft Exchange ?q &/%&)('6

q/U4

 K?wr/(6 ? /WE2F?Server


776 77c&M%77&)('776 77 d77LE1 J1F (77 7 ,6?y77n6
 K%&)('

 ( 1-1 )
 Ewww.microsoft.com/outlook/F  (3U4q &dLE1F
 Ewww.microsoft.com/exchange/default.mspxF  (3U4q &dLE2F

17

 


W 

 

2.1

)(Web-based E-Mail webmail


'(a6/ %8& 7bOp+7%7p7 7y]7b(37  7
y]b Y r 6}EInternetF(3  = 46)('& K%
U46)('&%U4(3  ?Gmail?7 7
Egoogle.comF? 77

? /77W77Egmail.comF My777777n778 77 (777777
 KE2-1F
 

2-1

 

 W


18

3.1

 77 L-p 77O/77


B776%77&)('776 77c&M776 77'
7 7 r ?7 7 . /O 4M_/ (UIZ6+ }
%7 &)('776 3`77777 (~ O}+77-77"  773O 77Cp 7 77
Km =a

1.3.1
(Simple Mail Transfer Protocol - SMTP)
(377U774%77&)('776 77'7   %77 `77 O778
7`i7` h1 821 <7L=ERFCF- 7` 07` hm]6/O  
 K2 1123<L=
U74 Z36 &` O/-$ bO%&)('6  3`ZO
<L=g O(KE3-1F (Myn8  EPort 25F25<L=x]I
K /6 3Lx]I

2.3.1
 (POP3 Post Office Protocol)
776'
77$%77&)('776 77 4m^77Z6Jx7777 O778
<77L=- 77` 07777` h77 Ox778F776/OK 7777%77&)('

 KEhttp://tools.ietf.org/html/rfc821F` h^)('& ZIE1F


 KEhttp://tools.ietf.org/html/rfc1123F` h^)('& ZIE2F

19

 


W 

 K1 1939
 43<L/< Ozag6^7ZI@  77^7Z
x8 O%8^ZI  K
77  3`77ZO776)('&%77/-$ 77bO77 O(077U774776
110F110<7L=x7]I

My7n78 7 EPortKE3-1F (7(?7g776

/6 =<L Kx]I

) (3-1 SMTP

POP3

4.1 
< "I8.BXI4M?@?p4%O6Jx76)('&K%7
E3F^ZI)('& . Ehttp://tools.ietf.org/html/rfc1939F` h

 

 W


20

 K?abc.com?8?xyz@abc.com?J6I" I<pr
- 7&(7S?78EDomain

Name System - DNSF- 7L "I. 7? 7c&

K 7YI  7 r 7 ( (7 7O +4(6  (3  


v7 S6/7 7YI6 I4- 7L "I. 7?7/778 cIx8-  <8?
f= 7347(m7&aJ?m707 ^/7 7^J/Ir/$
777
7I4 7 37U7rK7  (3737ZI FO C 
- & E213.230.10.197F C VZJ/IEwww.ksu.edu.saF
 7 - 7L "I. 7?7 7S?MppS +(
Ofx8/
 KE4-1F (Myn8
 

 

( 4-1)

 
p7$%78- 7L "I. 7? 7c& Y7`6t7\/ - \Sa
/7 ?E 7I87(67`rK" <&" 3O/%&)('6 . ?4

21

 

 W


gr7 7a7.=037Z767S 7"&<7)%7&('a76/ 7 


77 7"I<7U74+g7(- 3" d6O/+4 Z
 KE Failover?Backup F S gr?ELoad BalancingF
. 77? 77 {77r%77&)('77677377ZI p77$77 SM
Mail exchange Records F? / 3O-pV?77_/O-pVZ/6- L "I

 .E MX records
 

5.1
(Mail exchange records MX records)
< 7Z 76B7 7/ 7b6a7 ]  / 3O-pV
preference

F 7  (% ,]O<L=d 3`Z}%&)('6 . 


 KEnumber
 

 


W 

22

 
) (5-1

/<L/7]07 O/O78% 7,7 7  7(rK=<7L] 7,


 7
?w77& /77#77  S 77#OM77 ? 77VI 77/x77C{77r 77  /
 bO$?d$ J<L/&{rUyVI6 bO$037Zm7
  m&{rd Myn8  m 6Jx(  KE5-1F
6.1  
(66)('&B
?+4% W%8.

)(Header
U4J- & 3   
 77(6U74W 7b
  WEFromFI /} J76
 J  /
Kxsender]@[source domain namez

23

 

 W



/} %&)('6H ZS<Wsender
 . /mI-=#Jx" ^ I<Wsource domain name
 7&I4J7?7(K 3`7Z} J767I :EToF 3`Z J
 777bU7774 3`777Z 777I4777(6K3`777Z} 7774k?777 Sp3`777Z}
K[receiver]@ [destination domain name]
  3`Z} %&)('6H ZS<Wreceiver
 .m a /} =Jx" ^ I<Wdestination domain name
%7&)('76 7 7 7/ =Z% b]O WERouteF= Z J
\/77  "77 77=/77 3`77Z %77&)('776 77 za 7
/
 7 4q/7/7O$+ 74.U74za ]7B ZZ0ZS3O/
 Y7n/4^7Z 7({7(76d7+/W 3= Z- & %&)('6
= 77Ya?= 77 ^ %7 &)('776 77 4q/77M+/r77- =77 776/774
$ 77/776E7-1F (77K? 77

?%77&)('776 77 4M? 77#
 K= Z
 K /n :(Subject)
 K / &:(Body)
 %&('a6/ =E6-1F (W

 


W 

24

) (7-1

) .(7-1 .

"!  
 )  ('&   $ #$
)(Spam
 

 

 

25

 


W 

 

 W


26

 7Y]6/Ov7 S77/g7%&)('6 = b]x8L I6


 K- cI/r\ZU4=/n?m33ZO  Yr8?
7776 777=aM^777Z0  777 777b]x7778L 777I6777777
 K C+ ,-./
)H/g%&)('
 

1.2
(Spam)
 77c&^77+. 77a 77Y&77/g77%77&)('7 6 77=_/77O
7EBulkF 7 8<7  7={EElectronic Messaging SystemF7 & )('/
fx77C3`77Z 773L7777/?77L?77"g77 77 77/
Electronic

F%77&)('776 77cIESpamF77  773O= 77W77`K 77/

 777/ 777J?U7774 7 7,6?7773"IO 777Y&a$aEE-MailF =777b ?EMail


W  &)('
KEBlogsF- &
KESMSF+gb` bI /
KEForumsF- 6I
KEWeb Search EnginesFvi3- /
 KEInstant MessagingF/W 3' L%&' 
 7Cp 7J= 7Vp74)8 /fx8/(6  3
F  7(7&$/7c&+7 87](O/7Z }76/6 74p747IV6
7 &p4)+ 7B7 Y\7  U4 rK- &p4)fxY+ 4"3O/  

27

 

 W


 K\/ p4) ` =& Pn]( = c&J?4 8/&


 7Ofx8 S$  /fx8 Y r  ZO}\/ ?/? ,6?E I8
7`6/"fx787,O$v7 S ESocial EngineeringF7 4 
$7ICH w
 3`7Z} 7I4J/73%4 7
$07& X 7ZO =7`7 I`-/7$p
 7 t7 ?76gV &M7 '3- =7$ ?7=7Ix8U4$ K /
M%78- =7 7
?77   73 76i 7/ 3`Z}  ILa YI_C
d77r/F7y7] 7/ 3`7Z}  7ILa7 78/ $ K 8@` `
M 77I 67 rd7"`?+=77#?%7b&F7F77x7787m77 Y6{ 7/
 >KKgr8 ` `@
 777/777ir (J777Z777q 777& 8=777#?1  777bSaM
377Z&?377OENational

Saudi Anti-Spam ProgramFE77/g77F77  iL$

 JB Yt- U4. IH/g%&)('6


K `67ZO 7= 7Yc 7 2007 754w7EISPF  (3
SMS

F77/g77+g77b` 77bI 77/377Z& ?7,6? 77bS)-/77Y?

w7 J6ZM` IFO C%+=- U4. IESpam


5 I63  2P6x206=  YI652007 1.7
 .\/ ?/?-5<YO
 

 I`O-$ bO$P 8?6Z /(M  iL$ /8/dn` <O? E1F


(http://www.spam.gov.sa/Statistics-Arabic.doc)

2008 J781429- 

 

 W


28

7742 ESymantecF?&  77?W /77WmO=77#?1 J/Y77W/776/`O/77Y?


7637Z&?2007 747/76r/Y77/g%&)('6= 
MK%7 &)('776 77=% 77a7769 77H77/g77%77&)('
377ZIfx778?/77Y?4 ECommtouchF?77O77 ? /77WmO=77#?/77 3 /776/`O
7 7== 7 140J? 87w72006 74M67w72005
 K2005 4430 8=L+ 6B == 160% a
3777ZI 3rK- 777cI/777r 7774a=777b777  3777ZIfx7778 (777O
07& XU7rK 7/fx78 Yh7iO}?7(7 I?7  = " ?E I8- cI
 W% 
K] 3L Y ]bO /x8+./` , - 4 
 773L77 77YO./L77@ 77/x77877]@ 77,77 I6B^S 77Z
KEFF 3`Z
E-Mail

F%7&)('76 7 U74J=/7,gETrafficFr
KcIEServer

Data Network

(1)

F 777bO$+ 777IL777ZJ=/777,g777EpY777$

The State of Spam, A Monthly Report February 2007, Generated by Symantec


Messaging and Web Security
(http://www.symantec.com/avcenter/reference/Symantec_Spam_
Report_-_February_2007.pdf)

 ESymantec.comF- ?- ` 3"O kMbb^ /W%8 E2F


(3)

2006 Spam Trends Report: Year of the Zombies, December 27, 2006,
Commtouch Software Ltd.,
(http://www.commtouch.com/documents/Commtouch_2006_Spam_
Trends_Year_of_the_Zombies.pdf)

 %&)('6- ?- k/Mbb^ /W%8E4F


Ehttp://www.commtouch.comF

29

 

 W


77LKEInternetF77  (377774 77bO$77Z 7,6?7cIEBandwidth


?7O7 ? /7W74= 7b2006 71 /g //6/`O/Y?
F4 w77776 3 g7777O1700w(Y7777 7777/fx77778?2 ECommtouchF
MEImagesF=77b^77?2006 774MEw776 5 77( 1,700,000,000
- 76 37g37 747=7bm73"O 7EpY7$37Z&dr=L /fx8
KETextFbI &= ` Y  Yc]@EBytesF
+77i- 776$  77 &=]  776$ 6/7777P C 77YO/
?6 77=M
 87S7 (6/- 7cIw7]  7/77 4Ifx78?-/Y? (6/
F  (O ,(])&
fx8 O2007 4M =13/ ?
 K /fxCJbp`\ - k-
 W0& XU4
 76t7(37 7,6? 3`Z Y
/O ?/fxC(
 7/d77`r/- 7]76/4- g]- V8  YXx8 Y 4
(1)

2006 Spam Trends Report: Year of the Zombies, December 27, 2006, Commtouch
Software Ltd.,
(http://www.commtouch.com/documents/Commtouch_2006_Spam_Trends_Year_of_
the_Zombies.pdf)

 %&)('6- ?- k/Mbb^ /W%8E2F


KEhttp://www.commtouch.comF
.

 1000O  E3F

 m?w?7KEbitFw8(OH @M- 6Bl L+S%8EbyteF w6 E4F


K?0???1? a  L
.

 1O  E5F

. Ehttp://www.spamlaws.com/state/ca.shtmlF- bb^ 4 &=]  =E6F

 

 W


30

J7O7Lt7 7/ I,(  3=6/4? &)('


+777`6/"fx7778U7774$ 777Km777 ?g777rF777x777 ]IOza 8=777
y77r776/74+77fx778-/7&K2004/6 77I6Mw]77 t7?MyDoom?
F77 7/ 3`7Z 7Y6{7%7&('a76/ 7=d77r/F7
x7C 3`7Zy7r7I4?MyDoom?+8` `@M/]%b&Fr/
 7={ 7#)/7h?77` r+7fx7Y  by3b6f Y
{rr/F
K1  i, Y
M]\/ ? &('a6/6 I4za /^Z&
 77I /76/ 77
?7 7Y r77/g7 7/^77<76</7

? 76gV &M7 '3- =7$ ?7/  7 S$ 7=%8]_8


K 7 `6/r?H7I
76=YM%& 7& J/7 7` 7,6?K 8/ Z
7 O7666 7I7 7 8<7( 7=7/ 7=? I4b`fx8?3O
7876x7C 73`7Z 7 7 2 7&/7_$- PQ
7876 m7IH7"x7]&x(m 4w"&Jx6 & . 6/hS?
 7Lm7#7I4 7 `6/r?H7I
6=Y_ 6=?SI4za08x6?
76]7Z6 7mS/7p7)m78?76]3 mr " /
 K3 H/g6xCm in( rfL
 ?F-Secure?-  ?/W- g]F# E1F
 KEhttp://www.f-secure.com/v-descs/novarg.shtmlF
 K `6/r?HI
6=YX6`I%8ERandF&/ E2F
SA cops, Interpol ?I2004\ Z6\316=  `6/r?HIX"24= 3 ??+6/
E3F
http://www.news24.com/News24/South_Africa/News/0,,2-7-Fprobe murder
. E1442_1641875,00.html

31

 


W 

2.2
x778L 77I6F77.B77X0  77 77=aM^77Z= 77776
)('&g%K/

1.2.2 : )(E-Mail Spoofing


7777 O/7777`]6&` 777777776 7777# zaESMTPF 7777Z367777b
 77() m77&a\? 7 77=a=77I4J77 77776/
U774EAuthenticationF  /
'(a&6/4%'04p?=Z6EHeaderF /6 @` ??
 77/ rK 77` 77I47777'(a776/&%77
EFromF77I4 77Jx77  /
K 77x778077& X 77=aMmp77
/77, N77(O$= 77b^W77` `S+  /
g66/4 H/ S$EspoofingFfx8/}6za 7/
 = I4/6L?_/7b<7  7W/ /7W7r 7Y6a 7
7
6Q 3`Z /?& L Yh=bK
 77 Spx7787777I7777y77bI6 77/y77r]- 7777`r/
?EAttachmentsF/ELinksF
M+a /(OK7L /
- ] r7(OL`r/gr- 7/77O7Lgr 7 zaJ?- 7
za `IO K bdL
 

2.2.2 : )(Open Mail Rely


 6)('& = 3`O%6)('&=7bJ?%
 za 8/6/? \/fx8"M7Yw& `6/ 76(37z

 

 W


32

O  (36 4`/c&%&)('6 = b6a ,  


 7 7bO$U74= 7Lg7 7/m7I-=7#Jx7 7 7 {r 6
 77 770776/L77]/77  77 za C 77b6am77& ({ 77LU774m77&{r 3`77Z
K/7 w7LM / b6aM] ^ ,r?#/rE I8 (r 3`Z
g7 7/%7
/}  73L7 Cp7 I?+/hw(W 'M fx8
7S]7 7(O76@77p 7L74{7rx7/c&/
E 7I87S]777 ` 7/ 3`6$6@6
./g /fx8(O 6L$ S

3.2.2

(Image-based Spam)
J ] /&M=b^za/g /
/} V6
7P 8U74I77,O<76 7Y r%7bI\7oU74+7] 7b 4
 K /&M+=#
77 ?W /77WmO=77#?2006 771 7 /g77 77//776/`O/77Y?
w7=7bU74+/g /3Z&?2 ECommtouchF?O
7% a70w(Y Y&?/g /4% a35
7/g7 7/7Y7ZEData Traffic BandwidthF- 7& 3r7O+ 7IL
(1)

2006 Spam Trends Report: Year of the Zombies, December 27, 2006,
Commtouch Software Ltd.,
(http://www.commtouch.com/documents/Commtouch_2006_Spam_Trends_
Year_of_the_Zombies.pdf)

%&)('6- ?- k/Mbb^ /W%8E2F


Ehttp://www.commtouch.comF

33

 

 W


 KEw6  V  1,700,000,000Fw6 gO1700W7+=`


 7"&7EpY737Z&d7r= /fx8M=b?^3OL
 Y7  7Yc]@EBytesF- 76 37g3 4=bm3"O - & 3rO
  KETextFbI &= `
Optical Character Recognition F 7n_/7@U74_/74 7Z67L

EpatternsF/8 77cU774_/77Eheuristic

methodsF77 36/V/77"

EOCR

 7/77Ix78 7J7bM ( /] bOM^Z


K=7#7P 8U747bI M+`$ (W?x ? Yc /g
 W  3Ur
K = (<V@I( Wg O
K_/@ br
K/ = (F+=bU4&d`dn
 K /i=b^
7 ?^7 r/g /Jb r wZ  8S] b
M77 r77V &%" 777/g7 77/+ 7,-./77
)777(=7L
 K(=L L?za/g /` 
 77`r=7b I7B77I47/g7 7/%/}FL6$
 7h- 7]MI77, \/7 ?- ]- P 8 #^za\6
Microsoft

F?wr7/(6 ?70(q/- ] #za?EPDFFo


 KEXLSFEDOCF EOffice
 

 


W 

34

4.2.2 : )(Dictionary Attack


 7g77776H77/` 77 77I477lM776/6
^77Z677L } /
'(a& . 7?r 7na76/747+=Y7- 7L "&. 7U7I-
fxY"(6`6/ I4'(a6/6&  K
 . 4VI(O + L. 7?`K+=Y7H 7U7S
a &<cw .
gVIM+?$adLYiZ6x3M
l4 L I6 7Zza/cI 7i ib" 7aM7`6/fx78
 I K6
 )( U74_/7 7I674k7" 7I 7I677VI
`  /7U74? 7/d73O/77&M7,%7"6 7/
 7=a7I4m^7Z6 7
 ?U46/  7  7& 3`Z  /
/} $
6B K/g /

3.2

x8L I6F.BX)
/7.- 7, 7/+76)('&g7%7
K/
 
1.3.2 :) (Filtration
77(O ]77bO 77/776)('& 77?U774%77?B77
?77S. 77/
   W
?/O- 77&(77S?=77Z6EHeaderF 77/77I4 77YI  77/
 KEFromF

35

 

 W


 KESubjectF /n
 KEBodyF /&
7 7r /  <7`\7Sad7 7`76 7b \7Saw` "O{r
=?77Z6'377ZI +77< 77L?7 &('a776/6 77I  77Y&?U774 ]77b
{77rI7?77n377ZI Eregular

expressionsF77r-g377O ?77/

 K=6x8=/Lx^6
 7YI(7/g7 7/J7b7`3"-./
)/ ?%8 ]b
77#  ]7b7 4 7Y 4+7&7`- 7V6n/4
&77LM6g377 `77L(&6 77+ 7746x7777/g77 77/%77/
K1  ]b
 
Black lists

) : 2.3.2
(/ White lists

- 77L "&. 77??7 &('a776/6 77I4U774.77Z77 `J77


7776/77EIP

addressesFw777&'&$777 O/6 777I4?EDomain NamesF

p7 7=/ 6 IO )('& ` /y Z6}$ &('a


77S?d77 77`%77&)('776 77b \77Saw77` "O{77rK 3`77Z 77
za=/ 7m7y 7Z6}$.7Z7 `7(6m&{r LU4 `/# I4
 K 3`Z 6/
(1) M. Gupta, C. Shue, "Spoofing and Countermeasures", Book chapter in "Phishing and
Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft",
edited by Jakobsson and Myers, 2006, Wiley.

 

 W


36

 7/] 7b 3`7Z}37ZI %7&)('76 7 4a )(


]I7b 7/r/f4a( ,6?.Z`<U4 4$ `
Junk F77+ 74_/6 3`Z H ZSM

kz Y`&?.Z` 

 /. `{ a 3`Z} @fx8M=/`E/OESpamF?EBulkF?EE-Mail


 K YrxS?
776 rK.77Z<77`77 7  N77(U774%77Yr. 77, 3<77` 77?
\77Saw77` "Oa=/ 77m77y 7 Z6}.77Z77 ` 77aU77S 77`
77  7,7 7LU74. 7, 37 `/7# I47S?dmb b
m] IbOaUS 3`Z 6/H ZSzaY_/?` 6#
%78. 7, 3<7`^77$\/7 ?7`6/E 7I8K.77Z7 `7n7
M+7o7?- 7L "I?6 7I77` 76 7/`r Z
. 7, 37 `7n7FI7bOt7 7/g. , 3` 
7`6/M 7 ^7Z H 7ZSM 77za C 7b6a ?Y7,r=<76m&{r
 K.Z]  ^`<b
]Ib /_xS J`^ -4{ J /6{(
U774. 7I 3`77Z H 7ZSM 7 77kza Y7`&?.7Z77 `7 7  a
. 7I.7Z7 `/73ZI + =/ <` O}v SEscoringF< `
7
=w& a+ 4K Y`& ?/_x=/` x^6< `=
U4
 ?Y7,r=<76m7&{r 7/U74w7`3"&L/<caJ?  4< `
7p 7L74?J?7 &} < 7 `7
=w& {rKN( N(K YrxS
 K 3`Z H ZSM za Y`&<6m&{r /U43"&L/

37

 

 W


g7 7/J7b7 r g7 87S. 7, 3<7`.Z`<


 7`O 7Y&{r. , 3`<3ZI3 rK bSa YI `M4 ZO a/
 77/<7c'?r 7Efalse

positivesF77( 7  )q 7I7S7

<7`^7 7,6?  7/ r/ } +g#4k '/


 K /] bOM.Z & ` hS/ . , 3
Commercial

) : 3.3.2
(Whitelists

77677 7 `} 77`?77Z- 77Y


"77 773}O<77L77c&?%778
 K 3`Z zaf6/# , 
/ mr6% 3  `%&)('
EscoringF< 777 `%7778777c&fx7778 777M^777Z0  777777
=77b77 77Y& 77/ /77O77U774. 77IEcertificatesF- Y77
 K 3`Z 6/za=/ yVIOh

(Integrity Check) : 4.3.2


M^7Z6}Jx7ESMTPF 7Z376 7`&7 O/&  ` ?/  
67777b 7777# 7777`]67777  (37777U77774%7777&)('77776 7777/O
 ?i i77#77(6?+=/77, N 77K 7
/ 77I4% 77 EAuthenticationF
76/7I4J? 7/ 7`SMd7,6^WJ( r 
/ b^WN(6
77477/g77 77/ 77=aM Cp7777 I+/77fx778%77&('a
 .EspoofingF S$6/

 

 W


38

=?7Z6/O 7 6/4  (`i /ir )(


d77EFromF?77?777 77`SM= x77 77
/ 77I477&= `EHeaderF 77/
M4 77ZO77`6/"fx778KEReceivedF? ?=77`@M7 Z6/OM+77
77 `
 K1 /g /  _

: 5.3.2
(377- i]77#Mw77& .777  d77LMJ77677I77 
q7777n/4 Y77 778g? 77`I- 774k?77h o_/77?77  
g77776 77=aM^77ZOt77%77&)('7766 77I77 d77 V
 77 7YJ 7]%7&)('6I4/6./
a/YxCKH/
 K dLMJ6m&I4 (^/"naqfx8
77(?@?B/ 7 ?at?W7(377./7
)fx78U7477
?xyz at abc dot com?/67i7y37bO?xyz@abc.com? 7?K?"`I ?dot?
_/77%7%7&)('766 7I4d q/d "ZO$`6/"fxY
 KI b6M/-?L(O Y&{r  ` m 4
M  7b&B7=%&)('6I4  ./
)fxC\/ 
 KIU4_/ d Vq/U4=x6%  +=#F

: 6.3.2
EBulkFg3  C =a<6/g /{rF6/M &/  
7za/67`O 7L?U747 C#? U4 666 I
(1)

Technologies to Combat Spam, Thomas A. Knox, GIAC Security Essentials


Certification (GSEC) Practical Assignment, Version 1.4b, Option 1, June 16, 2003,
SANS Institute 2003.

39

 


W 

 ?U747$/7 7L
fx8 IK6/U4g /%"6/  /
I4&  K/g\/ ? 3`Z =MmZ r%` `S
N]I"{r`6/g /=U4J/)7I4
 ) =a_ `6 / 3`Z 7L\/7
 3`Z`  /} 66
(6_C@` `%=x8./a 68 I4  " & 3`Z
? K$
? =d  `6/ ,rg6748/ 7Yir)p7
M\/I   YI4)
/. , Kd Z

7.3.2 :
)(Spam Reporting
4 Z6L)p 7=4g776M7/`  7YI 7J7b
<6K C)pfx7874 7bO$  7/`7 776)('& 7/ %7
g /7(K7/7`U74_/777<7 7"IM7I
K /}J6   {7r ` 7f/7<7 7"I78.B7X7%O76Jx7
77I4M?@?W77p4776)('& p77rK%7<77 77"I77IJ776
? 7() ?abc.com?8?xyz@abc.com@7b- 7& U74 7bO$J<7
&"  ? m/O1 ?WHOIS(6? /?x78 J 7
 VZO- & +4 LJ K- L "I
bOp E1FxY B6

Y^ppb 3"O6/4 a?4
S?6/U4dL(3  `Ot

p$ . Ewhois.netFWdL

 

 W


40

 7 6Jx7%7&)('76 }` pa8p/ \ZE I8


U7 r==77S? 77bl^77Zp77)/7777K 3`77Z 7760S 77#m77
- 7p 77I4d7VO I4Kp%&)('6 4M^Z Y

? 7/=7b}  7pa YI# -./


ax^6m&{rmZ]&6U4+g
 K\/ ? == ap3`Z(6pr.Z` M / I4dn
 7/} 7677Sza7 r7/g /+ ,`6/"fx8
 K/ ^<&" %  /  `za&` $ Cp 
77677  773L7777E1 J2F (77M1 %& 77 3<77/y77n6
 7773L 777za 777`H777/g77777763777Z&2 EGmailF%777&)('
  ]7777777b

 

( 1-2)

(gmail.com )

(1) mail uses Google's innovative technology to keep spam out of your inbox,
gmail.com, (http://www.google.com/mail/help/fightspam/spamexplained.html),
December, 2007.
. Egmail.comF  (3U43%&('a6/ `E2)

41

 


W 

&3Zg6H/ 3LmI43  K3`Z


 }/Y c6</{r%& 3&3Zg6H/ 7L? (7Om7I473
4% a1g / K/
 

8.3.2 :
)(SMTP RFC
^77Z6}77L7777`i"- 773]77 I77 O&` 77776 77Z3
MESMTPF6=` g /7/` 777t7
fxY `O$"K- 73%7/}776g776^7Z6H7//7q
=?P6 <Y4 " N` - 73" 7]7 I7 O&` 776 7Z3
`ESMTPFM<Y6<(i /6JxmI 4Jx(6 7+
7Y
 in 'KEHackersF/ 3LmL
 

9.3.2 : )

Fake MX

(Records
?7S)
/7.- 77,+] M7  77/J7b76)('&g77%7
8/ 3O-pVdn= =7I4]6B 7?. 7U74- 7L "I
0p 46)('& "&<$% K
  c&?W brM &/76)('&{7r?%7d7  7,]O 7L=E 7I8
M V/?/x807 O/O8<L/7 7  7(rK=<7L
]w7& /#? ,7  S 7#OM7 ? 7VIK 7/x7C{7r 7

 


W 

42

  / bO$?d$ J<L/&{rUyVI6 bO$m7


 m&{r 03Zd Km 6Jx
4&E I8-pVZ 4$ ]6BU4<L/] W VZ% ,
 


)(Fake Lowest MX Record


774 7
&/7c" 7=7 376)('&g7%7 /O} 7Y& M7/
 774{ 877 +77 77bO$ 77776
+g377077?M 77 S /}<77Y6$
)('& SM% r bO$`I6 zaIJ6  K%
3O V,O\b6 /#?% ,]O<L/F6BM-pV7Z
/77 77  773L77?. 77077U774- 77L "Ip77$77 774776
)('& "&<$% (   rg / K/
?0 73O V7/W6 7/&U77I4zaF76B 7& 7
77(6v77 25F25<77L=x77]I

x77CEPort 77` 77, 7p77 77/

4`r/  K\/
 


)(Fake Highest MX Record


/}.J36Lg / / bO$d7 7J<L/7
]% ,$U4 J<L/]% ,& S$U 7 78g37
J<L/]% 7, U74 7/7d7 7 S7ir (7 4 r 7L?q

43

 


W 

g /d&= `/  K\/


3O V,O U4?% ,]O<L/F6BM-pVZ/77
 3L? .0U4- L "Ip$ 46)('&<7$%
&"  ]  xCJb =aMHg / K/
 3O V /U4(6LF6B?_/g7I4zag6
/ O&'&?Edead IP addressF  wI4za/W6 v7 %` `S
(6xEPort 25F25<L=x]I ` K
(6p  3"O4I-pVZ/7
a7]6B 7,.?M 7  7,r
(  KE2 J2F

) (2-2

 

10.3.2 : ) (Greeting delay


7  73L7+g7bL+']/ O876)('&%7  73L 3`7Z
/0U4 bO$ '(a6/& K/ %
 7 `3- ]77#]77 O77 I&` 7777677m77&{rESMTPF 77Z3

 


W 

44

0 bO${rU4 7  7/7@= 7c&$ 3`7= 7'707 S


  =a 3L 3`Z6)('& Km a%
( ]$+'7r+g7 7/J7bfx78/ 77 7/
} 4 Y //cI6$+= '/6 0 S0+/W 3 bO$ K
 )( 4a 7fx78_ 7 $"7`6/d7"L<7h7 7bO$d7
  K /

45

 


W 

"!  -
./0 ('& 
)(Phishing

 

 W


46

m77r8?m77]6/Ov77 S77%77&" )('77#$ 77b]x778L 77I6


 K- cI/r\ZU4m 43O'=/n
 77b^- 77& 3L/77WEPhishingF%77&" )('77#$ 77=77O
 7b^ 7i&/7%7&)('76 7=76/74 Z@6/Z
 i7, 7Y6a7I 7cI?_= 7b7S? 7b^W 7i&6/4
 Km 8?0"6Q
 Y 77
/}%77&('$" 77#$ 77= 77/7777Ix778%77
77 78g6/77Z 7L=" 7#$ 7" %7&)('776 7=^7Z6
 K  (3%^Z/\/  Z@ b^- & 3
 77={77rESpamF77/g7777 & )('77/M 77@%778 77
- ` 3"Oza 8O 7"`r%&)('6U4/b`O$%&" )('#$
?7 & 7/ESMSF+g7b` 7bI 7/ \/7 ' )('& 
M7(6_p7 $7(m7Z]&U7`36Y] EInstant MessagingF+/W 3
/7 %78%7&)('6(= Kmp /Xx ]IO<6Jx 
 K1 %&('$" #$- V8x ]IOM 4 W
?ph?r/7@37Z6 + 74EHackersF7  (37%7L' ?
7  (37I7#/Ld7kJ?<Y7kM+76
-  . &)?f?_/@ 
- I 7ZOMEPhishingF7 -7&KF7l7 (7(m7Z]&787"I 
KZ" #OtEfishingF(6//`
ESpamF/g66 /  Y%&" )('#$= 
(1) A. Emigh, "Online Identity Theft: Phishing Technology, Chokepoints and
Countermeasures", Radix Labs, October 3, 2005.

47

 

 W


M77]077& Xzar 77n) %4 77


$077& X77Z6 7,6? Y 77
/}77
77ICH 77w77=77I6 ` 77/77 77 x778 i77,U774 77 S$77 4
 KESocial EngineeringF 4 
$
7 ` `S- 7cI 8=7b?7 &" )('7#$ 7=7/}%46
 77b^m77O & . 77r)776x778 3`77Z}7777 M77   =_77b
B7=^7Z <7  7_/7bM%7b^H 7Z@U74 - & 3
77 & $EVISAFB77 r77L "3 77 & $- 77L "3- 77& ?%77b^F776/
 K `S$ i, b^W i& YL//
?%47O%7&('a76/ 7=%&('$" #$ /J `O
ESMTPF 7Z376 7`&7 O/{r ` / }  K?_?/b 8=b
?+=/77, N 77 7/ 77I477 EAuthenticationF67b 77# 7`]6
x78MK 7/ 7I4 7`074p7(m& / b^W` `SN(6
 7Y6)_/7bx7 7"I<7  743 `]  66/ &I4 / d,6
g776 7=^776/74K?_?/7b78 8=7b 3`Z
 K &)('66 I4 8 /fx8 /OESpamF/
- 77& . 77r) 3`77Z 7777`6/" 77/fx778\77077(6_77
7 (7_/7bx7%7&)('dL4%b^m ZSza 
7.p77Y
766_/7b 7=EStyleFI7Y `6/" /
f= 7WELogoF_/7bB7=d7nELook and FeelF ZS)/cIv S
 KEslogansF
7. 74$78 /  \Mw^}t0  ?S?

 

 W


48

P3O$m&?-]IL 3`Z}%b^H Z@za -$


=B77d77L/77x77877(6 77/ 77
/77M77
77I
/77cI 77,6?v77 S77%77#_/77bd77L< 77bO 77" <77bESpoofedF
7P 87 f= 7WfB7=_/7b<7d7nELook

and FeelF 7ZS)

077%77bIB77 '77%778$?77 &)('d77L. 77&) 77 77


d7L7=bZ&- Y 3 EHypertext Markup Language HTMLF
_7CpY7/7?m7 (%7&)('dLZ&US?\/ )('& 
7_/7bx7 7 4m7&?_ 7#Jx7 3`Z   8
^7Z<7(O 7+ 74t7%7&)('H 7Z@za - & L/Z
 K%b^F6/B=
707"6EformFI+B YZ]& &)('6(= OL
77I <77Z? 77/ za\/77 ?+/77 C 77=<77h77m77P3O 3`77Z
%7&)('767 SM7  (37U74d7LI4zam rP3- & 3 
 KEWeb-based E-Mail webmailF  (3U43
 i7,Hx7
Jx7<7"w7 766 / ?Z M
d7L 7  7I _/7b7\7p 4(6 _?#m&? &/   Jx
 Km" i," #Jx+= IbHp =B
" 77777#$ 77777=M^77777Z+=Y77777\/77777  7777777777
 W1 %&('$
707"O 7_/bM 3`Z H ZSM(E I8?%4O = J
(1) A. Emigh, "Online Identity Theft: Phishing Technology, Chokepoints and
Countermeasures", Radix Labs, October 3, 2005.

49

 

 W


 K /M=
BdL( ^=y ibdL+= 6 3`Z
m7 4/7O/7" M 7_/7bM 3`7Z H ZS?%4O = J
 K- p $ir (q &/M VZ
 7Y3" 3`Z `<6]6B #M%8-  3+=O r = J
 KF6B0"x8. ) /M
/ 3`Z B6
M/77bH 77Z@U774d77Lg77g 77O77bF776B= 77Wa 77= J
 Kg x8M/cI/ 3`Z B6 3`Z}
U74/7O 7_/7bM+76
7  - 7 B7&%4O = J
 KL+'] & kfx8U4b@#/r  Sp 4m&  3`Z
=B7d7Lzam7
6 7/ 3`7Z}{7r` 7Z-$ @ S M
 77b^W 77i&M 7 `S$? 77b ?Y^77Z6t776/77Z- 77& 3d77X
 K\/ ?   ?a- 4M i,
 W  -"M%&('$" #$- V8= b (
K%&('$" #$VC "^  J1
KF6BdLB Y  J2
77S?^77 77(O77L77]6B 77/7777 877   77=a  J3
.ESpamF/g /0  ?

/d3O /y]`6+=B /3`Z 4  J4


KF6BdLM"- & 3<  h /M

- 77b^W77iI6<77h776/77Z- 77& 3L/77Z6 77b  J5
K 6 i,

 


W 

50

7771 7 7- 777VC777 L "777#$'($& 777=%7 77776


)('&M  %( E1-3Ft7<7ZL?7 7Y&? Y7/}<74 7?M
? 3 ?_/b?  
$4 3`Z 7 4?Wf' ? 77n
="  `&pi]#za' 7OJx7?y7,Ofx78d7L%78i]7b
? 3 ?dL< b "F6B S &%#/7cI) 7ZSlook and F

EfeelEstyleFIB=dnM  _/b(  KE2-3F


 

) (1-3 ""

 
 
?E1F @  ]L =h "#$'($&%
.pYSEI3Z ?6+6/
 6/
Z614w3ZJ@2006/6 I614 J781426V J K13718

 

51

 

 W


 736/Lm7nza746 7b?7_/7b" I<M I`La


787mr 7 i7, 7 U740} 7b6%7 y i7b" I<
 7"I<7  I Esamba.comF8 3 _/by ib" I<Kz
/7 =B7d7L 7"I<MEsambaonlineaccess.comF8=BdL
%77"6%S6 7/7W 3 7bO$77OEonlineaccessF/7 _/77b<7
 KdL 4/ 4 3"&
 

 

"( "2-3)

 

 W


52

=B7dLm \%# 3 dL8E3-3F (


K%#dL

 

"( "3-3)

 
d7L ?7,6?7Sp&K? 76/_?/7bd7L8=BdL/ 
 (7M 7 _/7b%#dL< " #E4-3F (M  =B
 K ZS)/cII= v SE5-3F
d7L 7"I<7Eriyadbank.comFW78%#dL" I<
 KEriyadonlin.net.msFF6B

53

 


W 

0  7??W 7brML II "7#$)('&0  7? 7b] (7?%7


77 S$BOM/776d77L.B77
ML II77)
/77.- 77,+- 77 S$
 $^]_  $dLB= K+

) (4-3 ""

 

 


W 

54

) (5-3 ""

 
/Yc6( /7 $ E6-3Fd7L "7#$'($&%7x78 7
 K?H ?_/bdLB=< 7"IEsabb.net.msF<7$m 7 7"I
dLM  Esabb.comF%#KE7-3F (7&? 7,6?\/7d7LB7=
 " <#dLv S%#I =/cI) ZS K

55

 


W 

6-3 "" 

) (7-3 ""

 

 

 

 W


56

(3U4 8#=Echat roomsFh o_/3L/w 1 =M


" 77#$- 77V8?-/77Y?EphishersF 77b 77Y r 77 77 t7777  
- 7VCfx78.=a 77S^7W 73L 7x] IO}$ 4 (%&('$
EphishersF6 77b77 77 +4 77Z77 77kM77b^ 77 /77 ^ 77W?
77OB776BOMEhackersF/ 7 ^EspammersF77/g77 77/%77
/}
 7777- 774k+774E 77I8w77& m77&?77=fx778-77
K- 77VC
 7 EcashersF7boEcollectorsF7EmailersF7/ bb^
 W% M_/ 8
EspammersF7/g7 7//} a<8WEMailersF/ J
g7 / 84= aU4+=`<Y66xEhackersF/ ^ ?
KEfraudulent emailsF S$_Y/
d77LB77Y
6x77EhackersF77/ ^<778WECollectorsF77 J
 7776<7776t777 777 S$/777Efraudulent

websitesF777]6B77 &)('

d7Lfx78<YI707"O 77/g66 / 3L  Y a 6 i,


 K & $L "3<L=?=/<L=^Z {<6/- & 6BO
EmailersF7/ I4=/(.p4<8 =?wcS$
 K/g / )= 6  3r6<8
L/7Z6/7Z- 7& 3x `66x<8WECashersFb
o J
(1) Christopher Abad, The economy of phishing: A survey of the operations of the
phishing market, First Monday, volume 10, number 9, September 2005,
(http://firstmonday.org/issues/issue10_9/abad/index.html). M. Jakobsson, S. Myers,
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic
Identity Theft, Wiley, 2007.

57

 

 W


- 7L ". 7&{ /7+7p7$x]I6K Cp<h 3L


J`I0iZ^ZO]6B r/b-  ZS- L "?]6B -  ZS
./7?EAutomated Teller Machine ATMF%7_/ 7b+B7Y
?/W 3
 K Y"d 3
. 77`77za/77W 3J 77dr77  77a77r/77bi .$778
 Kbo6`I- L/Z3Z&<Y "4{?L/Z6/Z- & 3
- 7& 3+7
U747O37ZI76/74?+/W 3.4r6  3
- 7VCU4bo+=LU4 ,6?O V 3L  Y  +B
^77Z-  77ZS- 77& 377`- 77cIF77U774+x77]I-$ 77 S$
 K
%7&('$" 7#$- 77V8?wi7n?t777=w7b  7I8za
 7Y&?$a 7M7 /
)-  b <cI` "cI-  b4 8.=F`O
7  (37 74J?%7&)(' 7M<76 8x ]IO?M`r YI4Fl
 KEInternet worldF
6
p 4`O Y&?%&('$" #$= M% I$.%
- 77 S$M 773 m778  7777877 &)('77 I- 77VC 774
7776 @=777VrKJ/7773 777 7778$?- 777cIM777 I- 4 r777
ESecure

Socket Layer SSL CertificatesF77 I- Y77EFirewallsF

 78g(Intrusion Prevention Systems IPS rules)'7 $d7I7c&?&7L


%7&7hp7F7LO?7($7](c8 3 I6 @ 
7I4 8=/7nF7L6$tcI(   34Eonline trustF

 

 W


58

Mg37 =/7n7Saza 86 `r6/Z b^ - & H/ZO


%7/7 7c&?7  (3774.]^ bO$`  h
K- cI  bO$< 8g?FO C4
The Anti-Phishing

F%7&" )('7#$ 7/J7b 7474k

- 4 I7bF7\7ZU747  4 %8K1 EWorking Group APWG


 7=747 I b^ i&- Jb&&] `a Yr8
 K%&" )('#$
J7b 744kmO4?Jx2007 4r&/YW2 /6/`OM
 W/YMw3`4?/Y?EAPWGF%&" )('#$ /
K" #= 4 p28074
- 7cI7 &('ad7L4]6B &('adL4 p23630
K ` `S
 7=-p776/74Ebrand hijackF Y] 6BO6= p4178
w7LU7S7S/Y7WM V7Z<7L=U74?<L/7x78K%7&('$" #$
K/Yx/6/`=#a
U74-7S 7YI473%7&('$" 7#$= k34.3
 777KEdomain

namesF- 777L "&. 7 7?777P 8U7774777 &('ad777L777=

KExyzbank.comF

(1)
(2)

The Anti-Phishing Working Group, www.apwg.com.


Phishing Activity Trends, Report for the Month of November, 2007, Anti-Phishing
Working Group (APWG), apwg.org

59

 

 W


U774-77S 77YI4773%77&('$" 77#$ 77=77k776


KE10.212.21.33F K6/46 I4P 8U4 &('adL=
KmLpa 3LF6BdL. `8 6?hph
KF6BdL. `+?%8 630
- 77 4M77/77MrY77Z77  - 77cI774 776
K6= VpF 6BO
% 77a7793.8m377Z& 77 rY77/77 77  - 77cI 77cO
KrYZ\/ - 4 Ib
774M7 (6/+7i- 76$bw"l/YM
24.21m3Z&  &" )('#$dL ],Z
%77&('$" 77#$- 77p774E8-3F%i 77n( 773776
 7777m77Z]&/Y77za2006r77&/Y77W77+'77]p77  6/Y77W77Z
K2007
%777&('$" 777#$d777L7774E9-3F%i 777n( 77737776
 77m7Z]&/Y7za2006r7&7+'7]p7  6/YW](+6X
K2007
v77 S77- 77cI77&?7777& 77(377ZIE1-3F77X3776
K C%&('$" #$- 4_Y
 K &" )('#$dLr ,3Z&Mz/E2-3FX36

 

60


W 

 

) (8-3
2006 2007

 

) (9-3
2006 2007

61

 


W 

) (1-3

) (

 -   EFinancial ServicesF

 93.8

 ERetailFBV d 3

 2.8

B (3   EISPF

 2.2

@(` - 4 Ib  EGovernment & MiscellaneousF\/

 1.2

) (2-3

 1
 2
 3
 4
 5
 6
 7
 8
 9
 10

 

) (
 24.21

- 6$+i  (6/

 23.85

 b
 IC
=  
 I6 O
= &  
? &  
= 6  IX
( +i
  Z&/r

 9.39
 8.06
 4.64
 3.53
 3.41
 2.42
 1.47
 1.47

 

 W


62

77 (6/+77i- 776$M/ 77Z?/77Y?EGartnerF771 77 M


3.2za2007 74M bw]O=L%&('$" #$- V8 I
%7&('$" 7#$- 7V8M 4 ]O= ,6?/6/`/Y?K%(6/?=$6p
- 77L "3-  77Z77&= ` r/77b-  77Z@776= X- 77L "3-  77ZSU774
_= 7b7I4 7 S$- 4_  c&?Fnza03Zd
/6) & 
 K & $- L "3- /Wza3ZI  YI4
 747N"7Z?/Y7WMJ/7
?p"7U74. 7Im7&? 7,6?7/
- 7V8?37O7 (6/+7i- 76$M^7W4500/ 2007
 777 777&= `2007 777M777 ? 7 7S w777``S%777&('$" 777#$
774" 7# 7=3`76x7^ 77W7K3,337Z&w7 L` 7Z
" 77#$ 77=0377Z77  / 77Z77n/O<77Y&a%77&)('776776/
J?m`377Jx77 77Mm77Z]&.%7777n/O2.377777&= `%77&('$
Y 77- 4p"77U774. 77I2005 77772.9777 77,6?77&= `2006
.EGartnerF 3Lw6/
?

77  - 77 77"L77FI77bOt772?PayPal? ?7,6?77/7


 7n/O/7  7&( O/77BV d7 3" LFIbOt3 ?eBay?
KEbrand spoofingF6= Vp i&- 
U4  I8%&('$" #$- V8 4&E I8
(1) Media Relations, 2008 Press Releases, Gartner, Gartner Survey Shows Phishing
Attacks Escalated in 2007; More than $3 Billion Lost to These Attacks, 05-March2008, (http://www.gartner.com/it/page.jsp?id=565125).

 K &  )('-p6i- 4rMbb^ /W E2F


K  (36/4BV d 3Mbb^ /WE3F

63

 

 W


 7  J 7b 7Z67Ix8MKESocial EngineeringF 4 


$IC
 7i&76/^7 %7&('$" 7#$- 7 4MJ/73-0& X& /
 7"7b+=B7d7Lza 3`7Z m7
Espoofed

emailF b^7777777

- 77& 3. 77r) 3`77Z 77 77/d7777r/7777P3O? 77#?d77L


 K6/Z b^
U7747777I778%7 &('$" 77#$- 77V877/77 77I
q/7=B77Ix8M b`6Etechnical subterfugeF I]0  
 77b^- 77& 3L/77 7 Cp 77<77O 6 i77,+B77Y
?MESpywareFN77Z
 77i&- 77 4M 7 `S$ Y&^77Z6v77 S6 77bza C 77=a6/77Z
 K1  b^

Anti-Phishing Working Group, apwg.org. E1F

 

64


W 

65

 


W 

"! 1
  2 ./0 ('& 
)(Phishing Techniques
 

 )(DNS Poisoning

)(Hosts File Poisoning

)(Content Injection

)(Man-in-the-Middle Attack MITM

)(Address Obfuscation

)(Malware Attack

Search Engine

(Phishing

(Attack

)(Fake Address Bar

The Popup

 


W 

66
 

67

 

 W


 K%&" )('#$M^Z0   b]x8L I6

(DNS poisoning) : 1.4


7`6?H7x787`6/K7 374=BJ?EPharmingF ,6?UZ6
Domain Name Server

F- 7L "I. 7? 7 U74VC 7EhackerFH/7^


 K-pVZ 04pEDNS

- 77&(77S?778EDNSF- 77L "I. 77? 77c&{77r ` 77 77&/ 77


 (7 7O- 7L "I. 77 +747(6  (3  
6/7 7YI6 I4- L "I. ?/8 cIx8-  <8?K  (
 77() J?m77077 ^/77 77^J/7777I77r/7777$m77&
-4F (7M 7  7 3UrK  (33ZI FO C f= 34
 7C V7ZJ/77IEwww.ksu.edu.saF7<&" 
E1
777S +777
777(Ofx7778/777- 777& E213.230.10.197F7778
 K- L "I. ? S?Mpp
za+= 7W)zaJ76 76/76 Ig -pVZ 04p(6
 7Zp7$ 7  7 {7r77 
M (rK]6BdL
?7$3r XJ/I Jx VZ 04p
77
 7"&<7$y i7bJ/77I- 7L "I. 7? 7 d

/6}
 K=BdLzag6 ] 6/4 &I4d
gm&{r
- L "I. ?U43"I6m&{r 
M  @ x
07"Ot7d7L7 78g =_7b- L "I. ? YIn\/ 
 K6/ ZS b^W- & 6BO

 

 W


 

68

( 1-4)

 
77778?_?/7777b 7777"I<7777?E2-4F (7777M 7777 /7777]I
" I_??`  )</by ibJ/I?Exyzbank.comF
x7 7"I<7^ W  IrE88.33.22.11F8Exyzbank.comF
^77 77Y
 `77EInternet

BrowserF77  (377y]77bM_/77b

?_?/7bJ/7777I774p77) y]77bq 77&p77 77 


 77 7 _7#{7rK- L "I. ? zap$0{=
( 7777=B7777J/777747777Ig7777m7777&{rE3-4F (7777M 7777  7777Z
_/7b%7#d7L77ZIZF76Bd7Lzag76JxE92.45.67.89F
m73 Jx778_/7b 7"&< ? ?i,m/6Jx??
77IM074p7` 7Z7M 7I6?= 7 N mI mZ]I
 Ky ibI g3 Sza Y m
v S

69

 


W 

) (2-4

 

 

) (3-4

 

 

 W


70

(Hosts File Poisoning) : 2.4


H7?- 77Sza-%&('$" #$0  ?Hx8m36
< 7ZEhackersF7/^7`6H7x78MK- 7L "I. 7? < ZO
 K i, Y
M
Ehosts fileF] ,F
m]7b6/7 7YI6 I4- 7L "I. 7?7] 7,7F7/6
ElocallyF 7 m7<(i ](,F?$a- L "I. ?
 K^Z Y
 3L
77I774v77i3 $?77`6 77  77Y
{77r 77d77L07777I4
7J/77I74p7$ 73L7- 7]M 7<7$J/
 K- L "I. ?
 7c&M] 7,7F7M%7$ V7ZE4-4F (7/6
 .EMicrosoft WindowsFI6wr/(6  
7/7-pV7{7r- 7L "I. 7? < ZOH?M &/  
za 6 i7,m7
/ ^ 3L  8g O<66/ YI6 I4- L "I. ?
7`6v S] ,F< ZOH?M ,6?mZ]&]@ 6BdL
77 i77, 77Y
M] 77,77F77< 77Zm77Z]&.%77 77/^
 KF6BdLJ/4I<&" /6
 Vdn
 i7,m7
O< H/ ^ 3L _ , VZE5-4F (/6
m7&I4 ?I7n'rJx7%7#d7L7$7E92.45.67.89FF6BdLza
 KE88.33.22.11F
 

71

 

 W


localhost

 

127.0.0.1

( 4-4)

 
xyzbank.com

92.45.67.89

( 5-4)
Content

) : 3.4
(Injection

Emalicious contentFv7 3 \7r 7n{ 7b7`6Hx8M


v77 3\77ox77877`6?77(KElegitimate

siteFy i77#d77LM77I`S?

 W%  
 K\/ ?dLzay ibdL/m
O+ 4a J
 KdL/ Y
MEmalwareF 3 q/0 /O J
 K%&('$" #$ zadLM - & 3m
O+ 4a J
 W\o`S"" #p  ??&hphE I8
EhackersF7/ ^7` r7  (37 7 M I?+/hp J
 KEmalicious contentFv 3 \iElegitimate contentF%#\o3 
EhackersF / 7^y7ZO7  (37 M I?+/hp J
Cross-Site Script F77+/7fx78_/7OK7fx78M7 3

 73L 7_ 7,\77q}7I6EProgramming

 k/`? S

FlawF%7k/ 7

%78EXSS

 

 W


72

< 7 `O?EblogsF- &7M=B7- 7` O 7 3U4K%


= =b
?Ediscussion boardsF 7`I- `SM =?Euser reviewF qI=B
U747%7&)('76M+?= =vi3- /Mv- 
 KEweb-based emailF  (3
7L` 7Z7M 7 7
= = 7b 3L_ ,\ox8 
 73L/]8   Y ]bO<6 3  k/( ? WU4\(6
m7I4q7I6 7=B7 73L- r na 3`OtdLfx8 ] ,Z
 KdLi]#/4I4 6 i,y]bU4 3 fx8 4
1 ECNET

News.comF= 73

?M =77Ix78U74 L

<YL77M77 I?+/77hy i77bO774p4) 77gY772?PayPal?d77L 77L 77I4


+ 74azaJ76<YL7Mv7 3 dL`S  (3U4%&)('
 KF6BdLza & $L "3- &  ai]#0I4 i,m
O
78\7o7`S"7%7&('$" 7#$7&?7v7 I J
773 /p77$7776/7477`@+/77hU7ZOd77LM7 I?+/77hp7
- 77& 3+774 LM/77?x77 ]IO<77677`6/"fx778MKESQL

injection vulnerabilityF

+74 LM06/7ZOmI4qI6LdLF ,Z MEdatabase commandF


 K- & 3
7 37 k` S  Y3 /p$6/4`@
 73L7/7]78 7  Y ]7bO 78)7V & 78Ecross-site

script XSSF

(1) PayPal fixes phishing hole, by Joris Evers, Staff Writer, CNET News.com, Published:
June 16, 2006 4:12 PM PDT, (http://www.news.com/PayPal-fixes-phishing-hole/21007349_3-6084974.html).

K  (3U4BV d dL (2)

73

 

 W


 K- r na 3`OtdLfx8 ] ,Z


747`@"7%7&('$" 7#$H7 L1 S?
 /7Wd7L7S 78ESQL injection vulnerabilityF3 /p$6/
B
77S%77"ld77L=77S?" 77 77I4Eknorr.comF?=77I ?77  776x
d77LM77 I?+/77hp77776/774Elogin

authenticationF

77677bO

7 I+/7p7 7  7Z3K73 /p7$ @`"wi


<7
'O73 /p7$7M7`I7# ]?;?`I# rr n{fx8
y 7n/7`rb`Yrx ]IMm 8?$ O 8%O6 ?za
true logical

Fi i77#77 `"I+= 7734EHackerF'77^d77,6?%77](6K/77 ?$

p77777777777$777V &777(p777$M777`I777# ] 7773LEexpression


7 7  7`SMEor x=xF7 `"I+= 3dn  3777777777U4i i#
 K6bB
S%"^ @OM ] =/^ Z<
 
Man-in-the-Middle

) : 4.4
(Attack MITM

r/7"7 7  7b^W 7i& 7  7b7`6Hx8M


M 77 d7L^7Z 77  (37U74/7W 3 7bO$7 4p7
+/7W 3 7 7 7 7<'76?%78i i7b7 @KE6-4F (
 KE7 J4F (M  r/"p(Yk J?
(1) Knorr.de SQL Injection and XSS Vulnerabilities, Sebastian Bauer, 01/12/07,
(http://blog.gjl-network.net/blog/index.php?/archives/78-Knorr.de-SQL-Injection-andXSS-Vulnerabilities.html)

 


W 

74

<776 773L77 77 77b. 77&a776/774 77bO77 77( 77b]I


^77Zd77L/77 77bO$m7777(6 77bM77F77bI^77Z
 by 6 dL` 3- & 3 b=+^Zza7 4Md7L
bO$EInstant MessagingF/W 3<7h 7Y074p 74a+/7 C 7=a+
? za\/dL Jx?c6- & 3= Lm a+^ZK  
 SM)=   SMx/{r b?`6 ,6 ` C 3 74a<7h+
za C =a^Z  M(  KE8-4F
x8M?/Yc6H bO$$?r/77<6 7Y
 78^7Z
?F E
Y?FdL M<8(KE@` `'6774- 7& 3

Y / ?7_/6M
/? KEMan-in-the-MiddleF
 

) (6-4 " "

 

 

) (7-4

 

75

 

 W


 

 

( 8-4)

 
^7Z 7 7 '4p M
/V8  r(OL
 K  '4?dL
? 7I7V8?77 7U7ZO 7'7 4p7 7VC7 4 r(O
^77Z 77- 77& 3r77Op77 EcontentF\77og 77EActive

AttackF

 76i/7m7 4_/7b7 7'7 SM 7 37UrdL


H 7Z@<7L=EHackerF'7^ 7b/7 6}7LE9-4F (W-  Z@% 
Jx7H 7Z@7$7E4444<7L=H 7Z@zapFm a 6/
73`7M 7
/d7 7'6\x7_/7b7` r 7 dfS
 K bfSJxH Z@za%  6ix]I60"
7VC???7SpV8?7 7UZO  '4 4 ](O
<7{ 6/7Z- 7& 3 7`7 7b7(7EPassive AttackF?7Z
d7Lza^7Z 73L C =a SM%b^F6/B=^Z
 K^Z b^W i&M `S$ Y^
 

 


W 

76

) (9-4 .

 

 
\77Sa"/77"77V8?77 3M 77
/ 77 < 77ZO%778?77?. 77
6/4EDNS PoisoningF- L "Ig 7-pVZ 04p 7I66/7
zagO%U74$ 7K7]6Bd7L077p7$747IJ/7
?_/b?{r  p$ Z VZ 04p 7Jx

7 d?. 7- 7L "I7I


IxJ/?$3r_/b} /6

I4d&g76 7] 6/74 7


J/ "&<$y ib?_/b? / }m&{r
BdLza=4dL?_/b%#? K
x8d`6dL+/" 7wF6B 7b B76 7IrK 7 7 4_/7b
FdLE i,< F6B^Z=B7F76/^%7b 77
(776m 77ZSza 77bfx77877r/77- 77& 36/77Z77`6<77h77 77b
 ^ d0dL?_/b%#? b^WxpiI  K i,
 

5.4 : )(Address Obfuscation


`6 bx8M dLF 6BHw7m7n 7"&<7
m36<&" dL KU#
6 bx8M?zaH(6<&" d7L 736/LF76B

77

 

 W


 Kz8mr  i,U40b6% y ib" I<


%S776U77Z77(6?778F776Bd77L 77"&<77$/77 = 77  E 77I8
 KdL 4/ 4 3"&%"6
 778%7#d7L 7"&< m 3WF6BdL<&" U4$ 
 77"I<77$ " 77Z77 77b _77n?77Lf/77 77Z?H 77?_/77b
Esabb.comF%7#d7L 7"&<$m Esabb.net.msFy3b y ib
 7" <7#=B7d7L ?7,6?\/7&KE11-4FE10-4F(M 
 K ZS)/cI= Iv S%#dL
(77My77nf/77 77Z? 3 77?_/77b 77M 77  77,6?
%S776F776Bd77L 7 77h@ 77OM 77b =77 E13-4FE12-4F
M/7 7Lm&?KEsambaonlineaccess.comF8$?dL 4/ 4 3"&%"6
%S6 77/77W 3 77bO$77OEonlineaccessF77 _/77b 77"I<77
778? 3 77?_/77by i77b 77"I<77 77I d77L 4/77 7 4 3"&%77"6
7%7#d7L 7" <7#=B7d7L ?,6?\/&KEsambaonline.comF
K ZS)/cI= Iv S

 

78


W 

) (10-4 ""

) (11-4 ""

 

 

79

 


W 

) (12-4 ""

) (13-4 ""

 

 

 

 W


80

: 6.4
(Malware Attack)
p77 77H77x778ME i77,F^77Z- 77 4d77 y377bO
q77za776F77(x7780377K6 77br77(77  (377y]77b
 K^Z Y
M4=BEmalwareF 3
p7 7+x]I- d 3L/ b 3qfx8yZO
 7bO7I4 7 37U7rK( i7,^)7Z 73L  (3y]b
^7Z<7$^7Z76BO7I4 7_/7b%&)('dL ^Z
fx78 77
7 S%7]rM/bm ZSU4 %b^F6/B=
 7bza C 7=a6/7Z- 7& 3fx78 7`a< 7Zr i, Y
Mq
_/7b%&)('dLd  M^Z b^Wf= iI Jx
 K%` `@ m&?U4 bd   Jx
77S-/77`& V77Z077 /O%778H77x77C+=Y77/77"\77Sa
 V77Z77`6m7777Jx77 i77, 77Y
MEKeystroke

LoggerFy O 77]

f=77`6Jx bza C ={`6<hy O `SU4-/`I


 K i, b^W i&$- & 3p^ Y i
 

: 7.4
(Search Engine Phishing)
7BV d7 37 &('ad7L. 7&a%78" 7#p\/ ?`6/
O
77 778d77Lfx77877/77K77 8- 77VI77  (377U774ERetailF

81

 

 W


 K./  (3U4I - VI4S 3


<6  (3U4vi3- /M/Y]dLfx8 a<6
S 3HxXZZr I= ]- VI ,6?dLfx8 P3O
 K- VIfx8 4
t7v7i3- 7 /S?6/4qI4 ^Wvi36 I4
d7L7{7r%7&('$" 7#$ Y7n/7BV d dL/Yr Y r
 KH"qIfI4
6 a-vi3V & -Z/ 
7 4 7a/7m7&{r7qI./dLfx8^Z+= 6I4
MH 7ZS. 7&) 7a76/- & 3%&('aP3OmI0"6./
m7O & m 7r{d7Lx7 i7nJ'7d7` r% 7 6i?dL
 Km b^W i&M `S$^ZOLt6/Z
 
The

) : 8.4
(Popup Attack

x7rId7&
/c&@+= I0  Hx86
x77  (37- i]7b<7cM% ? (EPopup BlockerF`3I
 7 H7x78?$aK+g7 7&MHx8 -$wL`r
 K- i]bMd&fx8  
3L Sza$ r
+x77r &%778E14-4F (77M 77 H77x77C776 `77`6/"
+x7r Ifx78MK_/7bd7L y i7#d7L+7(+x7r & 7?73IO+/b
^7Z <7 6/7- 7& 3m7P3O^7Z 707"677
6`3I

 


W 

82

/= `iI?J6g7 7H 37


}^Z `"I 33%"6P3I K
_C@` `%+xr I(F ++xr I. 7"4a787`3I ^7Z
? 77 4_/77b=77W i77, 4/77"077 77SM77 77#_ &m77
xp 4 K_/b

) (14-4

83

 

 W


(Fake Address Bar) :

9.4

m7p 7<6%&('$" #$0  ?/" ?Hx8 6}


(377y]77b+x7r &77U774.B7XM77I6/77F76B6/77W37
7 &('ai]7#/747 7bH7x787(KEweb

browserF7  

 Ki i# Y&?U4i]b/B3O I   ( ]6B


Java F?w/( r
? ]- I`O{^H7777x8x ]IO<6

 KEJava AppletF?w ? r


?EScript
7+7-74{7  (37y]7bMI6/W. ] a(
x77C?w/(77 77r
?77=r 77n{77<776%77&)('d77Li]77# 773L
/7bI76?window.open? EfunctionF7] ^776/7
 K?no? ` ?location?
76/74- 7 37U74-^7Z 76I4Hx83"6
y]7b&U4dL_/6F6BdLza-%&('a6/ =M=
y]7bM%7` `@7I6/7W. 7] a<h+/W 3/B 3L ^Z
 7r
? 77]- 7 I`O- 7&/ 7 -^7 mF6B/ 3
+=7#d7n(US?EJava AppletF?w ? r
??EJava ScriptF?w/(
 KI6/W
/BEimageF
M07 ~ =} +=7#7P 8U74F76B7I46/7WE15 J4F (7yn6
EInternet ExplorerF1 ?==3Z aw&'&a?  (3y]bi]bU4?
F77d77LzaEwww.nike.com/main.htmlF77Ig77677 ` `S 77Y& 773
1 http://www.microsoft.com/ie

 

 W


84

www.contentverification.com/graphic-F77777777777777n/i]77777777777777b777777777777774

 KEattacks/demo/adbarframeset.html
/7 y]7b^7 7(mZ]& Z E16-4F (/6
774 F77(IOv77 S9.23<77L=^77ZIEOperaF1 ?/77??77  (377
77I/774%778/77?y]77bM+77
 77# 0377Z77IF77 6BO
M 7,6?K7n/i]7b 73L7I6/W. ] a SMdL%` `@
77I6/77W\?/77&F776B77I6/77W 77b /774m77Z]& (77
 KEgifF$ EimageF+=#8F6B
 

 
(1) opera.com.

( 15-4)

85

 

 

 W


"( "16-4)

 
t 7?_/7b1 7S 8F6BI6/WH?U4/ 
777iI777 &('a7776/ 777=w777=? 777I4%777(6/ECitibankF2 ?777I
777778 77777/ 77777I4 77777 E17-4F (77777M 77777 _/77777b 77777b^W
?7It 7d7%&)('E6/`?WIsupport@citibank.com
(1) http://www.antiphishing.org/phishing_archive/Citibank_3-31-04.htm
(2) www.citibank.com

 

 W


86

6x80"6K?It ?W_/b.p4<86x8 3LrYZP]


7I4777`i 4 )  / 
/U4,m3`Z}
_/7b7L "<7L=mI0"6/B/Yc6/d3OI4K%&)('f6/
PIN Personal

F%77b^F776/B77=EATM/Debit

card numberF%77

fx787`i7 47/7 ?7/Ow4EIdentification Number


77$7 7
?7m7&?766<YI6 7I7b6.p77?8
K?It ?_/bF6BdL+=#/6E18-4F (>>`i
N77(6$%77&)('776 77=M 77
/ 77I4a ` 77 77&/ 77
 7`074p7(v7 S Z  SM   / b^W+=/, 
 Km r LJ?dnEFromF /
 K?It ?_/by ibdL+=#E19-4F (/6
07" 4/7WU7476f/8 77=U74 Z M /-S
 777YS$ Ehttps://web.da-us.citibank.com/signin/citifi/scripts/E-Mail_verify.jspF
d7Lzag7O7` `@M 7YI(_/7b<%8?citibank?(U4/
7777?7777 Ehttp://69.56.202.82/~citisecu/scripts/E-Mail_verify.htmFF77776B
 7Cp 7 76EHypertext Markup Language HTMLF07%7bIB7 '
 773L77+/77fx778p7777L77I774F77I77/77/774
 K 6 i, M6 b
 
 
 

87

 


W 

 
 

) (17-4 " " 

 

 W


88

"( " 18-4)

 
?< 77@%77bI6/77?U77Z6F776B77I6/771 /7 H77?
 77(M. 77, 77 ]EText

FieldF%77b& 77`Sd77n778Ehovering text boxF

7 Yr 7 0b6E19-4F (M  y]bM%` `@I6/W


 Kz8
 
(1) http://www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/

89

 


W 

%"6( / `} +/c&E20-4F/747I47  7bi]7b


/776v7 S7I4i]77b@` `%7+x77r &76/77I46/77Wza 7b
I/Yc6@`  Kn%bI
 
 

 
) (19-4

 

90


W 

 
) (20-4

91

 


W 

"! 45 6
(9  <  ./: ('& 
)(Phishing Countermeasures

)(Filteration

) (Security Patches )(Firewall

)(Cross-Site Script - XSS

)(Visual Keyboard

)(Two-Factor Authentication

)(Mutual Authentication

Anti-Phishing

(Toolbars

)(Anti-Phishing Softwares

x8L I6]F b)
/.- ,- VC+ "#$)('& K%
 

87

 

 W

1

92

: 1,5

%7&('$" 7#$- 7V8 73L7 YrY7 o- cI{( 


" 777#$- 777VC- 777cIfx77787 7` 777Z Y&777W777-./777
a 7 7l
" 77#$- 77V877q77IO77Lt77/ 77Z 77 `O 77Y4L 773L%77&('$
 K%&('$
 W% -./
)fx8 O

1.1.5
 7/74p7)<CUIZ %&('a6/IcI.p46BO
 77/fx778w77& a 77/776/`H 77Z@x778y77Z6K77cI 77b^77iI
 K6=
" #- V84=x&a ,6?%"6$?i i#

(Bounced E-Mails) 2.1.5


U774 7777cI 77b^77iI%77&('$" 77#$ 77=J7777L
 3`7Z 7 7`i6 I4KdLM+
g ] &('a6/6 I4
= 7Wad7 7/ 7za 7Y
grm76V7Zg Y&?6 Ifx8
 Km6 VZgm& 3`Z za bO /fx8
 7b+7O/ /{r cI b^WiIw =? / ?
- 7 4zag7O+7O/766 /+/ K Y b^W iIcI za
 K6=
" #
1<77L=+77"MEbouncing

emailF77O/776E1-5F (77y77n6

 77iI 77b 7 3L 77 7 


/ %77&)('776p77  3`77Z 77 77`6
(1) A. Emigh, "Online Identity Theft: Phishing Technology, Chokepoints and
Countermeasures", Radix Labs, October 3, 2005.

93

 


W 

^ 7bv7 S?xyz.com?7cId7n 7b<7 7"IM7cIK 77/


 `6  `i  3`Z< ^Z? V7Zg7m&??ahmed
zaJ? 77
Mm776 77cI77` r M 77" 77
={2<77L=+77za 77/  /
I
M@` EFromF K /
 

 
) (1-5 )(Bouncing Email

3.1.5
/77  773L-$ 77bO$77 3= 77Z]$-77=/za+ 77 B77

 

 W


94

d7L74 77r= 7- =7Z]$7+7o7&37rK.p


 K" #- V8
%SOL%&)('

4.1.5
-$ 7777d77Lg7777 -  77Z@U774- 77 F77773L/
?-p6777i?%777b^F7776/B7 7=g 777O?-  777Z@za 777
 K   =_b SM- iZ

5.1.5
r ,Z/-= =#- ] & ^S? b 6
M7 =7#- 7]^77$77]6B<YLMrYZcI 3L
 K]6B<YO i]b] ,ZM?<Y
F 77,Z7  (377 7  773L7-$ 77@fx78 77_ 7 7(
 8= 7WcIB==#- ]%  F ,ZcI%&)('dL
 7`I7 O/07d7 7`EreferrerF?/7W ?7`S77`i76/4
+=7bF7 7 iEHTTP Hypertext Transfer ProtocolF07%7bI
 77`S 77 aK+=77b/77t7777 &)('i]77b77I4 (77Jx77
07r/76 7{7r7YkI4za?cII4gzag6?/W?
+=77#-/77 p7S7  6} 77 77/77677L?+=77bF77 77 iHTTP
 K"+=b$m 3I6/6x
7 O1 - 7` 077` h0ZirK Sza r./
)x8
 7+7 ]d7nEreferrerF?/W` ?S{rEHTTPF0%bI` I
 KEhttp://tools.ietf.org/html/rfc2616F` h^)('& ZIE1F

95

 

 W


 7`@77 Lg 7O 7  7({?p7(UIKJ=  ` Sm&?


J? 7Y rd7nO7L ` `@i]bzagO?$3rK 6 i( & a%  
 KEblankF= rE'O? L
77 L77`i+] $dI$?/W` ?SM 6 i( & a
377rK%7 &('$" 77#$- 77VCJ77b 77,./77
a77 77 77`@
077&XMp8 77
%7 &('$" 77#$ 774M 77377(677L6 77b
 7M 6k?/W` ?S`i (r S$x8 w]6pr I]
K-$ @fx8
?/7W` ?S L`i\b`+] p\/ ?- S'LE I8
7 7,6?`i 7 %7&('$" 7#$- VCJb ,./
am]#
 7,+=7bFzar n)   3LF0Lm&?
7(67F777Lhi]7#7 7L+=7bF7 7 07?
K 78B=7cI =7W=7#- 7] 7 i7Lh- i]7b`\r 
 7({{7r6 7b 73L7?/W` ?SM 6 iaUS`6/"fxY
7La M n)`i6/4+=bF0=b  
V Iw& a$?mZ]&+=bF0 =bF0
07 " 7/76 7&/  7 ?+=bF 0r/6{ r?$?
 K brML/6xi Y 3IO+=b+=bF
76o=7b^773L/?J? 7, ./7
)x78y 7n1 
77S? 77L 77I42 ?N 77O?_/77b77S 778? 778B=?77cI =77W
(1) F-Secure (http://www.f-secure.com/weblog/archives/archive-042006.html)
(2) http://www.chase.com/

 

 W


96

 77#_/77b =77W+=77#^77 774?F776Bd77L. 77&{6 77b


 KE2-5F (M  _/b  3Lr ,Z
?N 77O?_/77b%77` `@d77L+=77#/776E5-5F (77/76
 K?N O?_/b= +=#/6E3-5F (
? 78B=?cI =W6o=b^3L/? , ./
) 3"O
77`i 77rK77O%77&('$" 77#$77V877_/77b77%77i  77
" 77#$77 4F77(  77 _/77b =77W+=77#F77 77 077= 77b
 (7M 7 /6x7i7 Y 3IO+=7b/  C ra_/b(%&('$
Md7`6 ?73L i7,/7Bm7 3IcI =WF/$E4-5F
 K%&('$" #$r
 7x78ME4-5F (7M-=t776/6xim7 3I 7=\
<7L=d7n?KKK77 7bOJ/7Z7L=07(Opr 7/fx8w6?=a?8
 K bOp

97

 


W 

 
) (2-5 ""

) (3-5 ""

) (4-5

 

 

 


W 

98
 

 
) (5-5 ""

 

2.5 : )(Filteration
} 77= ]77bO7  O776)('&%77M YS/77W377t77] 77b%& 77
/7
a Y]7b 77,.g77 7/ 77, 7Y& M77 r 7,6?ESpamF7/
- 7VC "77#$'($&%77 77=U774+776)('&M%7777
 KEdeception-based phishing emilsF
 

99

 

(Security

 W


) : 3.5

Patches

(Firewalls)
- 77 I`U7747777I778%77&('$" 77#$- 77V877&?77S?
 7Y
M7 I-/7p7m7p 7<76Etechnical

subterfugeF7 I]

 KEmalwareF 3q0 /OESpywareFNZVq/=B i,


Eoperating systemsF 77c&7 I- 67i/7 07 /O 6}
=7
F7 +B7Y
76 EInternet BrowsersF7  (37- i]b
p7U74+7%7&('$" 7#$- 7VC$ 7 r 7,./
a6 X
 K I-/
  (37777- 777i]bM I-/pU41 
EMozilla

FirefoxF?N7777 r/6 rp677?y77]bM77 I+/77" 77#77 4

Unified Resource Locator - F7IF7 6BO074pwS O?t1.0^ZI

^7Z 7  7SM73IOt7Edownload windowF 7 i+x7r &MEURL


 K dLF
 77 i+x77r &77 y]77b <77bOM77" 0377Zwh77S+/77fx778
K/7"^^7Z / 7O}7L+/7fx8K.%  (6"6 I/O
76/74%78+/7fx78p77V & i7n^7Z7L`6/H/L?
<7h7F76Bd7Lzag76Jx77 &('a6/ =M=U4,
 Y&?U4 i,^Z/YcOxYF6BdL 3 q/ 
(1) Firefox flaw raises phishing fears, by Ingrid Marson, Published: January 7, 2005
11:06 AM PST , (http://www.news.com/Firefox-flaw-raises-phishing-fears/21001002_3-5517149.html)

 

 W


100
 Ky i#dL 

Zp- 6i?N r/6 rp6?-=#?+/fx8_  


7L/7" J 7]m76y]7b%^7Zd7 U7407
+/fx8
 K+/fx8p$ in
 
Cross-Site Script

) : 4.5
(- XSS

7Emalicious content injectionFv7 3\o`SH?M &/  


v7 3 \77`S?r n{`66 b?%&('$" #$0  ?
\7ox787`6?7(KElegitimate siteFy i#dLza Emalicious contentF
 W%  v 3
 K\/ ?dLzay ibdL/m
O+ 4a J
 KdL/ Y
MEmalwareF 3 q/0 /O J
 K%&('$" #$ zadLM - & 3m
O+ 4a J
M7 I?+/7hp776/74\7o7`H7(` 
fx78M7 3 7 k/7 ?7`SEhackersF / 7^y 6   (3 
%77k/ 77 %778Ecross-site

script - XSSF777+/77fx778_/77OK77

 37U74K%
= 7 =7b 73L7_ ,\qI6Eprogramming flawF
Euser reviewF 7q7I=B7` <O?EblogsF- &M=B- ` O
- 77 /Mv77- 77 ?Ediscussion

boardsF 77`I- 77`SM 77=?

7777  (3777777U77477%77&)('776M+ =77777777=?v77i3

101
 

 W


 KEweb-based emailF
H77%77&('$" 77#$ i77n77L/77" J 77]U7777`6/"
 77M 77Yc]S 773L 778 a77 fx778 ]77bO778v77 3\77o77`S
 K=B- i]bU4 Yn/44 n%  
 

(Visual Keyboard) : 5.5


<7676 `7`6/"746/7Z- 7& 3 7 )76`6/fx8O
= 7777 & )('77i]77#M77 /y O 77]77S776/774 77C a
y O 7]7S7H7" 7]U74/`I+=]6/" YI^Z
 KW U4 /
776/7746/77Z- 77& 3L/77Z 77,./77
a77 /y O 77]77S773"O
 7Y
7Ekey loggingFy O ]S-/`& VZOtEmalwareF 3q
p^7 Y7 i7`6Jx7 7bza C 7={7`O<7h i,
 K i, b^W i&$- & 3
^77Z =_77b77S77 /y O 77]77SE6-5F (77/776
 Km ZSza 6/Z - & )
/67"OU7S6 7b7Z6<r Sza  r /y O ]S
^77L 7M7 /y O 7]S43"- & 3` $ 3 q/
 K &)('dLM /y O ]S
- 77& 3U774_/7777 3 q/77/677"O77 7`S$77/ ^(77677L
 K /y O ]S"(

 


W 

102
 
 

) (6-5

6.5 : )

 

Two-Factor

(Authentication
?77 7,6?_/7667b`x78MKEStrong AuthenticationF?J7)
/7.
<6^/`6/ ,6b=
?U4 K6b
/-phE I8 W6b

103
 

 W


 K=/ ^Z <W?what you know??_/O  J


 Esmart cardF xL "3 W?what you have??  J
d37#)7b3 76 @- ]7b%78W?what you are??w7&?7 J
 KEfingerprintF
 7Y r<76I%86b 4M^Z6 ``6/"
 7bO$ 4Mr/"( r/L- & 36b0 6BO
 K=/ ^Z <
76B fp74?+= x77&4&<^6% I6bM
 K xL "3?^d3#b=/ ^Z<
^77ZOt77EATM

cardF_/77b77L "% 77I677bU774 77

 7 7`6J7`I0i7Z7 4MK%7_/b+BY
?J`I0iZ
7  { ,6?`6?? %& IOtL "3{ 
 K?_/O? I6Jx=/
77  776/77Z- 77& 3/7ZO%77&('$" 77#$- 77 4M+ 74
\/7 ?- 7& 07<76x?_/O? IFIbOt=/
67b7&?76/7 4Iza%IO- & 3 6b 4M r na
 K?w&? ???? 
74%7&('$" 7#$- VC ,./
a^Z6% I6b
" 7777#$EMan-in-the-middle

AttackF7777M 7 77
/7777V877776/

 KEIdentity AttackF b^ i&dLF 6BO6/4%&('$


 

 

 W


104

(Mutual Authentication) : 7.5


x78MKETwo-way AuthenticationF?f $% I6b?7 ,6?_/6
677b 7777` r/77  Y77, 77 77 77 7 7 b6}./77
)
N 6 7` 6b fg?%b^F6/B=6/4 
m7&?77`i6 7  73L7 6bO<6 ,6?EBiometricsF6 @
 K ]6B L(6   b^ iIN b`  b
77`i 7L/ 7bO7 4Mr/7"7 7( 736by 6
 K3 Y,68i#
 (7y7n6f 7$J 7S67b7 4E7-5F (yn6
 K 36b 4E8 J5F
7`67Sm7&?%78  3L 6b^Z/"\Sa
^7ZOEphraseF7?+=7#= 7 7 {7r 7 \VZ  
7`6 7  bO. &aIrK  3L 6b `S$
+=7bw7& {r VZ 4M `3Z+oX+=b/
 K 6bO<6i i#X
74%7&('$" 7#$- 7VC 7,./
a^Z6 36b
" 7777#$EMan-in-the-Middle

AttackF7777M 7777
/7777V877776/

 KEIdentity AttackF b^ i&dLF 6BO6/4%&('$

105
 


W 

) (7-5

) (8-5

 

 

8.5 :
)(Anti-Phishing Toolbars
6/77W?+774J776/77W778-== 7777I F 7777(6
4M+YX/76KEApplicationF 77 3"O7766/7WE9-5F (7
?y]77bU774? 77

?-(377777777  F?==377777Z aw77&'&a?77
 KEExplorer

Internet

 

 W


106

- /7777776 77L%7 &('$" 77#$- 77V8/77" U774=


-?/777W? 777& ?wr777/(6 ?7777 - 777 k%777VI?eBay? /777
U7774EAdd-onF- r 777na0777 /O%7 7&('$" 777#$777ir (M777bb^
 KEE-Mail ClientF%&)('6 4q/  (3- i]b
" 7#d7LmO= 6I4^Zm 3IO8 4 (/Wfx8]
U74_/7%7&('$" 7#$ir (-?/W?p  6K83
m7O= 6/7d7L74p$6/4%&('$" #$?= dL
 7Y r V
 7ZO}EdatabasesF- 7& 74L7=764?^Z 3L
 Y67<76t83(]?.%&('$" #$= dL
76/74?%7&('$" 7#$d7L _7 M7bb^- Y
 3L
M7` 7L/^7ZO-7K6/ ^Z+=- p3
77 36/V/77"77 3" %7 &('$" 77#$d77L 77=U774_/77
" 7#$- 7 4_ 7 $EpatternsF/8 7cU74_/Eheuristic methodsF
 K%&('$
" 77#$77ir (-?/77W?F77^77 LE1-5F77X/776
 K  (3U4 Y"=zar n) %&('$
Phishing

Fq 7&/%7&('$" 7#$ir (-?/W?U4$ 

x77877`i6K 77Z^77ZI==?377Z aw77&'&a?y]77bd77q771 EFilter


8377i]77bw77& a 77YO= 6^77Z077"6i]77# 77 77q 77&
/6x77i/]77# 77=-77I6/77W077& Q-y]77bU774?M/Yc 77Zr
(1) Microsoft Phishing Filter: A New Approach to Building Trust in E-Commerce
Content, anti-phishing white paper, Microsoft.com,2005

107
 

 W


- 7& J?. 7ra7y7bIO7 Y 3IO =/=BU4, ^Z


 KE10-5F (M  i]bfxC b^W?6/
 73L7m7O= 6H7"dL?EPhishing

FilterFq &/ O SM

7I6/7W07& Qy]bU4?M/Yc  J" #dL8^Z


" 7#$i]7#/74dI 7m&?r n) ^Z /6xi/= 
i]7bp7a 7a =7  Y r6/6xi]# YI$/6%&('$
 7 ^7Z  7ZU4%&('$" #$i]#/4M=/$?
 KE11-5F (M
-5F (77M/771 ?SpoofGuard?-6/77W778/77  77
LdL{ r^Z 3LmO= 6/dL+fx8`iOKE12
+d"7ZOa./77&`6?+/7Zr" 7#dLm&?U4_/ 4}
./]7#7&`6?+/7Zr$" ?7#d7Ld7L a U4_/
 K./, &`6?+/Zrm&?U4dL`ia
 
 

"( " 9-5)


(Internet Explorer)

 

1 crypto.stanford.edu/SpoofGuardL

 

 W


108

. .(1-5)

microsoft.com/ie

Internet Explorer 7 Phishing Filter

pages.ebay.com/ebay_toolbar
www.callingid.com
cloudmark.com
earthlink.net
toolbar.trustwatch.com
crypto.stanford.edu/SpoofGuard

eBay
CallingID
CLOUDMARK
EarthLink
TrustWatch
SpoofGuard

 
 

 
( 10-5)
""

109
 


W 

) (11-5 "
"

) (12-5 ""SpoofGuard

 

 

 W

Anti-

110

) : 9.5
(Phishing Software

- 77V877n776 @Esecurity

softwareF776 @q/77<77c77,O

p77U77477? 77/U77477 77Y 4I%7 &('$" 77#$


 K I-/
" 777#$ 777=d777LU7774_/777 7 74q777fx7778d "777ZO
%7&('$" 7#$ir (-?/W?M3 YZ]&`6/" %&('$
(377- i]77bU774- r 77na-?/77W?077 '77`O776 @q77r
 K%&)('6 4q/  
" 77#$- 77VCJ77bzar 77n) 3rK77 ($77S776 @y 77O
-/77`&-pV77 ZEmalewareF77 3q77yr 77(O 7 ,6? 77Y&{r%77&('$
 K b^6/Z- & 3L/zaJOLtEkey loggerFy O ]S
 K YI+
/+ ]` i% ?/W/Z6 @q/v6
77n776 @U77477776 @q7777 L/776E2-5F77X
 K  (3U4 Y"=zar n) %&('$" #$- V8
 
( 2-5)
  (3=
kaspersky.com
symantec.com
mcafee.com
trendmicro.com
bitdefender.com
grisoft.com
pandasecurity.com

 6 @q &/


Kaspersky Internet Security
Norton Internet Security
McAfee Internet Security Suite
Trend Micro Internet Security
BitDefender Internet Security
AVG Internet Security
Panda Internet Security

111
 

 W


)( 
Access

bO

Active Attack

IVC

Address Obfuscation

I6O

ATM
Anti-Phishing Toolbars

 %_/b+BY
?
" 77777777#$77777777ir (-?/77777777W?
 %&('$

Anti-Phishing Softwares
Application

 %&('$" #$ir (q/


  3"O

Attachments

- `r/

Attacker

<
Y

Authentication

6b

Backdoors

 ] H?

Bandwidth

  bO$+ IL

Bank

 _/b

Biometrics

6 @N 6 `

Black List

.Z` 

Blog
Bounced E-Mail
Browser

 &
 +O/%&)('6= 
y]b

 

 W

Chat Rooms
Commercial Whitelists
Computer
Configuration

112
 h o_/
 6= V. , 3`<
H S
3nL4LP YO

Content

 \

Cracker

H/

Database
Data Integrity
Dialog Box

 - & +4 L
- & 3E  (O?Fp
J=SI#

Dictionary Attack

 ` V8

Discussion Boards

 ` I- `S

DNS Poisoning
Domain Name
Download
E-mail

 - L "I. ? < ZO


" I<

%&)('6

E-mail account

%&)('6H ZS

E-mail address

%&)('6I4

E-mail client

%&)('6 4q &/

E-mail Filtering

%&)('6] bO

E-Mail Header

  /=?Z6/O

E-Mail Route

 %&)('6 == Z

113
 

E-mail Server
Fax

 W


%&)('6 
 EN ]F &

Filtering

 ]bO

Firewalls

6 @
=

Form

 

Forums

 - 6I

Hackers

E/ CF  (3L'

Heuristics Methods
Hosts File
HTML
HTTP
Inquiry
Install
Instant Messenging
Internet
Integrity Check

 36/V/"
 ] ,F
 0%bIB '
 0%bI` I O/
p
w 3OL0 bIOL0 /O
/W 3' L%&' 
   (3
   (`i

IP Address

w&'&$ O/I4

IPS

 - L '$dIc&?

Junk mail
Keystroke Logger
Locally

H/g6
y O ]S-/`& VZ
 %

 

 W

Look and Feel
Malicious content
Malware
Man-In-The-Middle
Message body
Mutual Authentication

114
  ZS)/cI
v 3 \
 3q
 M
/V8
 /&
  36b

OCR

  n_@U4_/

Online

 /W 3 bOL%& bO

Online trust
Open Mail Rely
Operating System
Passive Attack
Password

Pharming

Phishing

 %&h
 ]%&)('6 
   c&
 ZVCLSpVC
 =/ 
- 7L "I . 7? -pVM04p
  34=BL
%&('$" #$

POP3

 60( O/

Popup

`3I- i]b

Programming Flow
Regular Expressions
Scam

 %k/ 
 r-g3
  4

115
 

Search Engines
Security Updates
Server
Smart Card
SMTP
SMS
Social Engineering
Spywares
Strong Authentication
Subject
Text Field
Tools
Traffic
Two-Factor Authentication
Upgrade
User name
Version number
Virus
Visual Keyboard

 W


 vi3- /
 I- 6i

 xL "3
  Z36 &` O/
 +gbL b& =
  4 
$IC
NZVq/
 J`6b
 /n
 %b& `S
+4 Z-
 r
 % I6b
 L'-=#a
^Z<
^ZI<L=
gr
  /y O ]S

Vulnerability

+/h

Web browser

   (3y]b

 

 W

Webmail
White List
Window
Worm
www

116

   (3U43%&)('6

. , 3` 
 +xr &
+
  (3
 
 

117
 

 W


+ *
 
Jonathan B. Postel, "SIMPLE MAIL TRANSFER PROTOCOL", RFC 821,
(http://tools.ietf.org/html/rfc821), August 1982.
Network Working Group, "Requirements for Internet Hosts -- Application and
Support", RFC 1123, (http://tools.ietf.org/html/rfc1123), May 1996.
Network Working Group, "Post Office Protocol - Version 3", RFC 1939,
(http://tools.ietf.org/html/rfc1939), May 1996.
Network Working Group, "MAIL ROUTING AND THE DOMAIN
SYSTEM", RFC 974, (http://tools.ietf.org/html/rfc974) , January 1986.
Network Working Group, "Common DNS Operational and Configuration
Errors", RFC 1912, (http://tools.ietf.org/html/rfc1912) , February 1996.

7P 8?67Z7 /(M  iL$ /8/dn` <O?

2008 J77777777777781429- 7777777777777777777777 I`O-$ 77777777777bO$


Ehttp://www.spam.gov.sa/Statistics-Arabic.docF
The State of Spam, A Monthly Report February 2007, Generated by
Symantec Messaging and Web Security
(http://www.symantec.com/avcenter/reference/Symantec_Spam_Report__February_2007.pdf).
2006  Spam Trends Report: Year of the Zombies, December 27, 2006,
Commtouch Software Ltd.,
(http://www.commtouch.com/documents/Commtouch_2006_Spam_Trends_Ye
ar_of_the_Zombies.pdf).
CALIFORNIA BUSINESS AND PROFESSIONS CODE, DIVISION 7,
PART 3, CHAPTER 1, ARTICLE 1.8.Restrictions On Unsolicited
Commercial E-mail AdvertisersK

?Virus

description service" from "F-Secure", (http://www.f-secure.com/v-

descs/novarg.shtm).

WI2004\ Z6\316=  `6/r?HIX24= 3 +6/

SA cops, Interpol probe murder ?

(http://www.news24.com/News24/South_Africa/News/0,,2-7-

 E1442_1641875,00.html

Thomas A. Knox,Technologies to Combat Spam, GIAC Security Essentials

 

 W


118

Certification (GSEC) Practical Assignment, Version 1.4b, Option 1 , SANS


Institute, June 16, 2003K
Gmail uses Google's innovative technology to keep spam out of your inbox,
gmail.com, (http://www.google.com/mail/help/fightspam/spamexplained.html),
December, 2007K

? Nick Johnston, PDF Spam: Spam Evolves, PDF becomes the Latest Threat",
Anti-Spam Development at MessageLabs, A MessageLabs Whitepaper,
August 2007K

Anti-Spam Research Group (ASRG) of the Internet Research Task Force


(IRTF), (http://asrg.sp.amL).

Mark Ciampa, Security + Guide to Network Security Fundamentals, 2nd


edition, THOMSON, 2005.
M. Jakobsson, S. Myers, Phishing and Countermeasures: Understanding the
Increasing Problem of Electronic Identity Theft, WILEY, 2007.
R. Lininger, R. Vines, Phishing: Cutting the Identity Theft Line, WILEY,
2005.
L. James, Phishing Exposed, SYNGRESS, 2005.
A. Emigh, "Online Identity Theft: Phishing Technology, Chokepoints and
Countermeasures", Radix Labs, October 3, 2005.

EI3S.pY
%&('$" #$= h]  @ L?

77V@J7714w377Z677Z 776/+776/
7777 ?677Z
13718 J2006/6 I614 J781426
Christopher Abad, The economy of phishing: A survey of the operations of
the phishing market, First Monday, volume 10, number 9, September 2005,
(http://firstmonday.org/issues/issue10_9/abad/index.html). M. Jakobsson, S.
Myers, Phishing and Countermeasures: Understanding the Increasing Problem
of Electronic Identity Theft, Wiley, 2007.
The Anti-Phishing Working Group, www.apwg.com.
Phishing Activity Trends, Report for the Month of November, 2007, AntiPhishing Working Group (APWG), apwg.org
Gartner, Media Relations, 2008 Press Releases, Gartner Survey Shows
Phishing Attacks Escalated in 2007; More than $3 Billion Lost to These
Attacks, (http://www.gartner.com/it/page.jsp?id=565125), 05-March-2008.
Joris Evers, Staff Writer, PayPal fixes phishing hole, CNET News.com,

119
 

 W


(http://www.news.com/PayPal-fixes-phishing-hole/2100-7349_36084974.html) , Published: June 16, 2006 4:12 PM PDT.


Sebastian Bauer, Knorr.de SQL Injection and XSS Vulnerabilities,
(http://blog.gjl-network.net/blog/index.php?/archives/78-Knorr.de-SQLInjection-and-XSS-Vulnerabilities.html) , 01/12/07.
http://www.antiphishing.org/phishing_archive/Citibank_3-31-04.htm
Ingrid
Marson,
Firefox
flaw
raises
phishing
fears,
(http://www.news.com/Firefox-flaw-raises-phishing-fears/2100-1002_35517149.html), Published: January 7, 2005 11:06 AM PST
Network Working Group, "Hypertext Transfer Protocol -- HTTP/1.1", RFC
2616, June 1999, (http://tools.ietf.org/html/rfc2616)
Microsoft Phishing Filter: A New Approach to Building Trust in E-Commerce
Content, anti-phishing white paper, Microsoft.com,2005

You might also like