Security Boulevardã¯3æ14æ¥(çŸå°æé)ããPDF Phishing: How Cybercriminals Exploit PDF Documents in Modern Email Attacks - Security Boulevardãã«ãããŠãPDFãèµ·ç¹ãšããææ°ã®æ»æææ³ã«ã€ããŠè§£èª¬ãããªã³ã¯ãQRã³ãŒãããã©ãŒã ãªã©ãæªçšããå·§åŠãªèªå°ãåºãã£ãŠãããšææããã
PDFã¯âéããŠãå®å šâãšããæã蟌ã¿ãæ»æã®èµ·ç¹ã«ãªã£ãŠãããããããäŒæ¥ã«ãšã£ãŠã¯åŸæ¥ã®å¯Ÿçã ãã§ã¯é²ããããªããªã¹ã¯ãšãªã£ãŠãããæ€ç¥ãšæè²ãçµã¿åããã察å¿ãæ±ããããŠããã
PDFã«ä»èŸŒãŸããäž»ãªèªå°ææ³
PDFãæªçšããæ»æã§ã¯ãææžå ã«åã蟌ãŸãããªã³ã¯ããã¿ã³ãç»åããã©ãŒã ãQRã³ãŒããªã©ã䜿çšããŠèªå°ããäºäŸãå€ããèªå°å ã¯èªèšŒæ å ±ãå ¥åããããã£ãã·ã³ã°ãµã€ããäžå¿ã§ãå ¥åãããæ å ±ã¯æ»æè ã«éä¿¡ãããã
çªåãããæ å ±ã¯ã¢ã«ãŠã³ãã®ä¹ã£åããå éšæ å ±ã®é²èЧãééã®è©åãå人æ å ±ã®æªçšãªã©ã«æµçšãããå¯èœæ§ãããããŸããä¹ã£åãããã¢ã«ãŠã³ããå¥ã®åŸæ¥å¡ãååŒå ãžã®æ»æã«åå©çšãããäŸãå€ãã被害ã¯é£éããããã
ãªãPDFæ»æã¯æç«ããããã®ã
æ»æãæç«ããããèæ¯ã«ã¯ãPDFããæ¥åã§æ±ãæ£åŒãªææžããšããå°è±¡ãæãããããç¹ã«ãããæ»æè ã¯äŒæ¥ã®æžåŒãããŽãæš¡å£ããå®åšããååŒå ãè£ ã£ãææžãäœæãããè«æ±æžãæ¯æã確èªãå¥çŽé¢é£ã®æžé¡ã瀟å éç¥ãé éé¢é£ã®æ¡å ãªã©ãæ¥åžžæ¥åã§é »ç¹ã«åãåã圢åŒã«äŒŒããããšã§ãåä¿¡è ã®çããåé¿ããã
PDFã®æ§é ãæ»æã«æªçšããããããPDFã«ã¯ææžãéããéã«ç¹å®ã®åäœãå®è¡ã§ããä»çµã¿ããããæ»æè ã¯ãããèªå°ã®è£å©ã«äœ¿ããããã«ãææžå ã®ãªããžã§ã¯ãã«URLãå²ãåœãŠãä»çµã¿ããJavaScriptãåãèŸŒãæ©èœãæªçšãããããããã¯æ¬æ¥ããã©ãŒã å ¥åãææžæäœã䟿å©ã«ããããã®æ©èœã ããæ»æè ã¯èªå°ã®é èœãæ€ç¥åé¿ã«å©çšããŠããã
é»å眲åã®å€èŠ³ãæš¡ããåœè£ ãåºãã£ãŠãããPDFã«ã¯æ¹ããæ€ç¥ã眲åè ã®ç¢ºèªãè¡ãä»çµã¿ãããããæ»æè ã¯çœ²åã«äŒŒããç»åã貌ãä»ããããšã§åä¿¡è ãä¿¡çšãããããšãããå€ãã®å©çšè ã¯çœ²åã®çèŽãæ€èšŒããæé ã«æ £ããŠããããèŠãç®ã ãã§å€æããŠããŸãããšãå€ãã
ãªãäžæ£PDFã¯æ€ç¥ã§ããªãã®ã
äžæ£ãªPDFã®èªåæ€ç¥ãé£ããçç±ãšããŠã¯ãè§£æã«é«åºŠãªåŠçãå¿ èŠã§ããç¹ãæãããããåŸæ¥ã®ã¡ãŒã«å¯Ÿçã¯æ¬æã®åæã«éç¹ã眮ããŠãããæ·»ä»ãã¡ã€ã«å éšã®æ§é è§£æã¯ååã§ãªãå Žåãå€ããPDFå ã®ãªã³ã¯ãé£èªåãããŠããããQRã³ãŒãã®ããã«ç»åãšããŠURLãåã蟌ãŸãããããŠãããšãæ€ç¥ã¯ããã«é£ãããªãã
æ»æè ãèªå°å ã®ãµã€ããäžæçã«ç¡å®³ãªç¶æ ã«ããŠãããåŸããæªæããå 容ã«åãæ¿ããææ³ã確èªãããŠããã
äŒæ¥ãåãã¹ã察çïŒèªèšŒã»æ€ç¥ã»æè²
çµç¹ãåãã¹ã察çãšããŠãéä¿¡å ã®ãªãããŸããé²ãããã®èªèšŒæè¡ã®å°å ¥ãææ¡ãããŠãããéä¿¡å ã®æ£åœæ§ã確èªããä»çµã¿ãæŽããããšã§ãåœè£ ã¡ãŒã«ã®æµå ¥ãæžããããšããããŸããæ·»ä»ãã¡ã€ã«ãä»®æ³ç°å¢ã§éããå éšã®ãªã³ã¯ãåäœãè§£æããä»çµã¿ãéèŠãšãããç»åãšããŠåã蟌ãŸããèŠçŽ ãèªã¿åããèªå°ã®æå³ã倿ããæè¡ãå¿ èŠãšãããã
URLã®å®å šæ§ã確èªããä»çµã¿ãæ¬ ãããªããPDFå ã®ãªã³ã¯ãã¯ãªãã¯ããéã«ãèªå°å ã®å®å šæ§ã峿ã«ç¢ºèªããå±éºãªå Žåã¯æ¥ç¶ã鮿ããä»çµã¿ãå¿ èŠãšãªããæ»æè ã¯èªå°å ãé »ç¹ã«å€ãããããææ°ã®æ å ±ã«åºã¥ãå€å®ãæ±ããããã
åŸæ¥å¡æè²ãéèŠã ãæ»æãæš¡ããèšç·Žãè¡ããã©ã®ãããªææžãå±éºãªã®ããçµéšãããããšã广çã ãå ·äœçã«ã¯ãPDFå ã®ãªã³ã¯ã®ç¢ºèªæ¹æ³ããQRã³ãŒãã宿ã«èªã¿åããªãå§¿å¢ã身ã«ã€ããããšãæ±ãããããçµç¹äœå¶ãšããŠã¯ãçãããã¡ãŒã«ãè¿ éã«å ±åã§ããä»çµã¿ãæŽããããšãã被害æ¡å€§ã®é²æ¢ã«ã€ãªããã
ãŸãšãïŒPDFã¯âå®å šãªãã¡ã€ã«âã§ã¯ãªã
PDFã¯æ¥åã«äžå¯æ¬ ãªãã¡ã€ã«åœ¢åŒã§ããäžæ¹ã§ããã®ãä¿¡é Œæ§ã®é«ããèªäœãæ»æã«æªçšãããŠãããæ»æè ã¯å©çšè ã®ç¿æ £ãæ¥åãããŒãå·§ã¿ã«å©çšããéåæã®ãªã圢ã§èªå°ã仿ããã
äŒæ¥ã«æ±ããããã®ã¯ãåŸæ¥ã®ã¡ãŒã«å¯Ÿçã«äŸåããã®ã§ã¯ãªããæ·»ä»ãã¡ã€ã«ã®è§£æãURLã®ãªã¢ã«ã¿ã€ã å€å®ããããŠåŸæ¥å¡ã®å€æåãé«ããæè²ãçµã¿åãããå€å±€é²åŸ¡ã§ãããPDFããå®å šãªãã¡ã€ã«ããšåæããæèãæ¹ããããšãã被害ãé²ãç¬¬äžæ©ãšãªãã
