ãHow Malware Expands A Phishing Networkããã September 26ï¼2008 posted by Elad Sharfï¼Nicolas Brulezï¼Security Researcher ç±³ã¦ã§ãã»ã³ã¹ã®ã»ãã¥ãªãã£ã»ã©ãã§ã¯ï¼Webãã¼ã¹ã®è å¨ããã¦ã¼ã¶ã¼ãä¿è·ãããThreatSeekerãã§æ¥å¸¸çã«çãããURLãè¨é²ãã¦ããã2008å¹´9æä¸æ¬ã«ãããURLã詳ãã調ã¹ãã¨ããï¼ã¹ãã ã»ã¡ã¼ã«ã«è¨è¼ãããURLããæã«å ¥ãèå³æ·±ããã¡ã¤ã«ã«æ°ä»ãããThreatSeekerããã®ã¹ãã ã¨æãããæªããã¡ãã»ã¼ã¸ãéé¢ãéå§ããããï¼ãã®URLã®å ã«ããåé¡ã®ãã¡ã¤ã«ã調æ»ãï¼ä½ãèå³ããããç¹ããªãã確èªãã¦ã¿ããã¨ã«ããã ãã®URLã¯ï¼ã¡ãã·ã³ã®é»è©±ä¼ç¤¾ã¯ã©ãã®ããã¢ã¼ã·ã§ã³ï¼èªåè»ãå½ããæ¸è³ï¼ãæ¡å ããï¼ã¹ãã¤ã³èªã®ã¹ãã ã»ã¡ã¼
ã¤ã³ã¿ã¼ãããç¯ç½ªå¯¾çããã¼ãã«éå¬ãããå½éã«ã³ãã¡ã¬ã³ã¹ãCeCOS II æ±äº¬ï¼Counter-eCrime Operations Summitãã§27æ¥ãJPãã¡ã¤ã³ã®ã¬ã¸ã¹ããªã§ããæ¥æ¬ã¬ã¸ã¹ããªãµã¼ãã¹ï¼JPRSï¼ã®å ç°åææ°ããccTLDã¬ã¸ã¹ããªããè¦ããã£ãã·ã³ã°å¯¾çãã¨é¡ãã¦ãã¬ã¸ã¹ããªãå®éã«è¡ãªã£ã¦ãããã£ãã·ã³ã°å¯¾çãç´¹ä»ããã ä»åç´¹ä»ãããã®ã¯ãJPRSãè¡ãªã£ã¦ãããã£ãã·ã³ã°å¯¾çã ããä¸çä¸ã®ã¬ã¸ã¹ããªã®å¤ããã»ã¨ãã©åããããªãã£ãã·ã³ã°å¯¾çãè¡ãªã£ã¦ããã¨ããã å ç°æ°ã¯ã¾ãããã£ãã·ã³ã°ã«é¢é£ããçµ±è¨ãã¼ã¿ãç´¹ä»ããä¸ã§ãJPRSãå®éã«åãåã£ã¦ãããã£ãã·ã³ã°å ±åã®ä»¶æ°ã®æ¨ç§»ã°ã©ãã示ãããããã¯ãJPãã¡ã¤ã³ã使ã£ããã£ãã·ã³ã°ãµã¤ãã«é¢ããåãåãï¼å®è³ªçã«ã¯ãã£ãã·ã³ã°ãµã¤ãã®åæ¢ä¾é ¼ï¼ã®ä»¶æ°ã ãã2007年以éãæ°ãæ¿æ¸ãã¦ãããæ£ç¢ºãªå
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}