Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Email bomb

From Wikipedia, the free encyclopedia
Malicious email abuse
This articleneeds additional citations forverification. Please helpimprove this article byadding citations to reliable sources. Unsourced material may be challenged and removed.
Find sources: "Email bomb" – news ·newspapers ·books ·scholar ·JSTOR
(August 2016) (Learn how and when to remove this message)
This article is about denial-of-service attacks. For spikes of "reply all" messages on an email distribution list, seeemail storm.

OnInternet usage, anemail bomb is a form of net abuse that sends large volumes ofemail to an address to overflow the mailbox,[1][2] overwhelm theserver where the email address is hosted in adenial-of-service attack[3] or as asmoke screen to distract the attention from important email messages indicating asecurity breach.[4]

Methods

[edit]

There are three methods of perpetrating an email bomb: mass mailing, list linking and zip bombing.[5]

Mass mailing

[edit]

Mass mailing consists of sending numerous duplicate emails to the sameemail address. These types of mail bombs are simple to design but their extreme simplicity means they can be easily detected byspam filters. Email-bombing using mass mailing is also commonly performed as adenial-of-service attack by employing the use of "zombies"botnets; hierarchical networks of computers compromised bymalware and under the attacker's control. Similar to their use inspamming, the attacker instructs the botnet to send out millions of emails, but unlike normal botnet spamming, the emails are all addressed to only one or a few addresses the attacker wishes to flood. This form of email bombing is similar to other denial-of-service flooding attacks. As the targets are frequently the dedicated hosts handling website and email accounts of a business, this type of attack can be devastating to both services of the host.

This type of attack is more difficult to defend against than a simple mass-mailing bomb because of the multiple source addresses and the possibility of eachzombie computer sending a different message or employing stealth techniques to defeat spam filters.[5]

List linking

[edit]

List linking, also known as "email cluster bomb", means signing a particular email address up to several email list subscriptions.[5][6] The victim then has to unsubscribe from these unwanted services manually. The attack can be carried out automatically with simple scripts: this is easy, almost impossible to trace back to the perpetrator, and potentially very destructive.[7] A massive attack of this kind targeting .gov email addresses was observed in August 2016.[8] The Email messages in the flood are not spoofed: these are typically confirmation emails for newsletters and subscriptions for legitimate Internet services. The attacker exploits web sites that allow Internet clients to register to some service with their Email address. The attacker registers the victim with its Email address to multiple such services, which as a result send Emails to the victim.[9]

In order to prevent this type of bombing, most email subscription services send a confirmation email to a person's inbox when that email is used to register for a subscription.[5] However, even the confirmation emails contribute to the attack. A better defense would prevent websites from being exploited without abandoning subscription forms.[7] After a subscription form is filled out, the website would dynamically create a mailto link to itself. A legitimate user would then send a message to validate the request without receiving any email from the website. While the sender's email could be spoofed, the sender's SMTP IP address cannot. The list manager can therefore verify that the email in the form request matches the originating SMTP server in the validation message.

A large number of confirmation emails initiated byregistration bots signing up a specific email address to a multitude of services can be used to distract the view from important emails indicating that a security breach has happened elsewhere. If, for example, an Amazon account has been hacked, the hacker may contrive to have a flood of confirmation emails sent to the email address associated with the account to mask the fact that the Amazon shipment address has been changed and purchases have been made by the hacker.[4]

Zip bombing

[edit]

AZIP bomb is a variant of mail-bombing. After most commercial mail servers began checking mail withanti-virus software and filtering certain malicious file types,EXE,RAR,Zip,7-Zip, mail server software was then configured to unpack archives and check their contents as well. A new idea to combat this solution was composing a "bomb" consisting of an enormous text file, containing, for example, only the letterz repeating millions of times. Such a file compresses into a relatively small archive, but its unpacking (especially by early versions of mail servers) would use a greater amount of processing, which could result in aDenial of Service.[5] A ZIP or.tar.gz file can even contain acopy of itself, causinginfinite recursion if the server checks nested archive files.[10]

Text message bomb

[edit]

A "text bomb" is a similar variant of sending a large number of text messages overSMS. The technique is a means ofcyberbullying or online harassment. Apps online on theAndroid operating system have since been banned as a means of sending text bombs. The text messages may also lead to high phone bill charges on some mobile plans. Additionally, certain phone apps have also been created to prevent text bombs on Android OS.[11]

References

[edit]
  1. ^Silverbug."10 Types Of Cyber Crimes... And Another 10 You've Never Heard Of".www.silverbug.it. Retrieved2019-04-25.
  2. ^"The Return of Email Flooding".Dark Reading. 29 November 2018. Retrieved2019-04-25.
  3. ^"Email Bombing and ways to protect yourself".The Windows Club. 2017-05-04. Retrieved2019-04-25.
  4. ^abDima Bekerman:How Registration Bots Concealed the Hacking of My Amazon Account, Application Security, Industry Perspective, December 1st 2016, In: amperva.com/blog
  5. ^abcde"Email bomb | Informatics Engineering | 2878 | p2k.unaki.ac.id".p2k.unaki.ac.id. Retrieved2023-04-30.
  6. ^Jakobsson, Markus; Menczer, Filippo (December 2003)."Untraceable Email Cluster Bombs".Login.28 (6). Retrieved23 August 2016.
  7. ^abJakobsson, Markus; Menczer, Filippo (2010-01-01). Huang, Scott C.-H.; MacCallum, David; Du, Ding-Zhu (eds.).Web Forms and Untraceable DDoS Attacks. Springer US. pp. 77–95.arXiv:cs/0305042.Bibcode:2010nese.book...77J.doi:10.1007/978-0-387-73821-5_4.ISBN 9780387738208.
  8. ^"Massive Email Bombs Target .Gov Addresses — Krebs on Security".krebsonsecurity.com. Retrieved2016-08-23.
  9. ^Schneider, Markus; Shulman, Haya; Sidis, Adi; Sidis, Ravid; Waidner, Michael (June 2020).Diving into Email Bomb Attack. 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. IEEE. pp. 286–293.doi:10.1109/DSN48063.2020.00045.ISBN 978-1-7281-5809-9.
  10. ^"research!rsc: Zip Files All The Way Down".research.swtch.com.
  11. ^Brenoff, Ann (2013-11-01)."Why Every Parent Needs To Know About Text Bombs".Huffington Post. Retrieved2017-12-30.

External links

[edit]
Retrieved from "https://en.wikipedia.org/w/index.php?title=Email_bomb&oldid=1237184857"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp