SlideShare a Scribd company logo
1 of 25
電子郵件社交工程
-手法
國家資通安全會報技術服務中心
2
手法概述:
 偽裝熟悉或可信任的寄件者
 郵件主旨與內文與收件者相關或吸引興趣
 附加 案都包裝有惡意程式檔
 郵件內的網路連結導向惡意網站
 攻擊主要利用使用者系統應用程式的弱點
偽裝熟悉或可信任的寄件者
4
假冒寄件者方式-顯示名稱假冒
王小英 真正的帳號應該是
wang@gov.tw
電子郵件地址
根本是錯的
5
假冒寄件者方式-郵件帳號假冒
wang@g0v.tw
用數字的零來假冒成英文的 O
wang@gov.tw vs
wang@g0v.tw
6
假冒寄件者方式-完全假冒
使用電子郵件協定的弱點,完全假冒寄件者的名稱以及電
子郵件位址;甚至透過入侵寄件者的電腦來寄發電子郵件
。
收件者
駭客
寄件者的電腦
1. 入侵要假冒者的電腦
2. 透過被入侵的電
腦寄發電子郵件
3. 寄發含有惡意程
式的電子郵件
1. 使用假造的電子郵件封包標頭來假冒寄件者
7
假冒寄件者範例 - 假冒主
管
8
假冒寄件者範例 - 假冒親朋好友
9
假冒寄件者範例 - 假冒主管機關
10
假冒寄件者範例 - 假冒業務相關人員
郵件主旨與 文內
與收件者相關或吸引興趣
12
使用讓人感興趣的主旨與 文內
 駭客會使用讓人感興趣的資料消息,來欺騙使
用者去開 這些附件或超連結,造成木馬程式啟
開始動作。
13
使用讓人感興趣的主旨與 文範例內 -
與生活有關的消息
14
使用讓人感興趣的主旨與 文範例內 -
與政治有關的消息
B1
下一頁
15
使用讓人感興趣的主旨與 文範例內 -
與工作有關的消息
B1
下一頁
16
使用讓人感興趣的主旨與 文範例內 -
與情色有關的消息
B1
下一頁
附加 案都包裝有惡意程式檔
18
含有惡意程式附件
 駭客在電子郵件附帶一個含有惡意程式的 案檔
,這個 案不一定是執行 ,可能是各種類型檔 檔
的應用程式,甚至是壓縮 。駭客會夾帶任何檔
在應用程式上存在可攻擊弱點的文件 案類型檔
,並誘使使用者開 附件,以 動木馬程式。啟 啟
19
含有惡意程式附件範例
B1
下一頁
20
利用零時差攻擊
 駭客利用尚未被發現的弱點來攻擊使用者,
弱點的對象可能是各種類型的應用程式,甚
至是收信軟體、網頁瀏覽器軟體。只要使用
者開 了這些含有弱點的程式,就會 動木啟 啟
馬程式。
21
軟體弱點與零時差攻擊
 只要是軟體即有可能存在弱點,若未能及時修補弱點,即可能讓駭客
入侵成功。
 軟體弱點在沒有任何修補方式之前,出現相對應的攻擊行為時,此類
攻擊稱為「零時差攻擊( Zero-day Attack ) 」
修補程式公告
弱點被發現
安全時期安全時期安全時期安全時期 危險時期危險時期
攻擊程式碼出現
22
社交工程─偽冒身 惡意電郵份
23
惡意電子郵件─ ( 假冒新聞局 )
24
惡意電子郵件─ ( 假冒陸委會 )
25
社交工程─偽冒身 惡意電郵份
 2006 年 4 月 10 日報載駭
客使用立委辦公室名義
,寄發軍事新聞題材之
惡意電郵給記者
 由於內容與寄件者的專
業屬性吻合,造成多位
記者受騙開 信件而遭啟
植入後門程式

More Related Content

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

資安分享包 電子郵件社交工程-手法

Editor's Notes

  1. 駭客修改 寄件者的顯示名稱為假冒的人 但是實際上卻是從完全不對的帳號寄來的 例如上圖的例子: 寄件者 王小英所使用的電子郵件地址應該是[email_address] 而檢視寄件者的電子郵件地址卻可以發現根本是錯誤的電子郵件地址寄來的
  2. 入侵者會使用相似的字體來假冒寄件者的電子郵件地址 例如上圖的例子: 寄件者 王小英所使用的電子郵件地址應該是[email_address] 結果駭客利用相似的字用數字的零來假冒成英文的O 申請了一個wang@g0v.tw的電子郵件地址來欺騙收信者
  3. 入侵者會使用完全正常的寄件者資料來欺騙使用者 使用的方式可以 1.利用電子郵件協定的弱點,假造電子郵件的封包標頭進而假冒寄件者的名稱以及電子郵件位址 2.駭客透過入侵寄件者的電腦,直接使用寄件者的電腦來寄發電子郵件
  4. 駭客會透過剛剛介紹的三種假冒方式來假冒成您的主管 例如假冒 1:總統 2.專案經理 3.董事長 欺騙您去開啟電子郵件
  5. 駭客會透過先前介紹的三種假冒方式來假冒成您的親朋好友 例如假冒 1:您的配偶 2.您的同學 3.您的同事 欺騙您去開啟電子郵件
  6. 駭客會透過先前介紹的三種假冒方式來假冒成您工作上的主管機關 例如假冒 1:研考會 2.資訊部門 3.行政院的某一個部會 欺騙您去開啟電子郵件
  7. 駭客會透過先前介紹的三種假冒方式來假冒成和您工作業務相關的人員 例如假冒 1:協力廠商 2.某某民意代表 3.技術服務中心 欺騙您去開啟電子郵件
  8. 駭客會在郵件的主旨使用收信者會有興趣的生活相關議題來吸引收信者開啟郵件 這些生活議題例如 1:與薪資有關的議題 2.與旅遊有關的議題 3.與住宅有關的議題 吸引您去開啟電子郵件
  9. 駭客會在郵件的主旨使用收信者會有興趣的政治相關議題來吸引收信者開啟郵件 這些政治議題例如 1:與政黨有關的議題 2.與政治人物有關的議題 3.與政治事件有關的議題 吸引您去開啟電子郵件
  10. 駭客會在郵件的主旨使用收信者會有興趣的工作相關議題來吸引收信者開啟郵件 這些工作議題例如 1:與行政公文有關的議題 2.與組織通告有關的議題 3.與跨部門有關的議題 吸引您去開啟電子郵件
  11. 駭客會在郵件的主旨使用收信者會有興趣的情色相關議題來吸引收信者開啟郵件 這些情色議題例如 1:與色情圖片有關的議題 2.與色情交易有關的議題 3.與明星八卦有關的議題 吸引您去開啟電子郵件
  12. 駭客會在郵件的附件中附上收信者會有興趣的檔案來吸引收信者開啟郵件 這些檔案例如 1含有惡意程式的影片檔。(wmv) 2含有惡意程式的Office文件。(doc) 3含有惡意程式的圖檔。(jpg) 4含有惡意程式的壓縮檔。(zip)