请输入您要查询的百科知识:

 

词条 Email bomb
释义

  1. Methods

     Mass mailing  List linking  Zip bombing 

  2. Text message bomb

  3. References

  4. External links

{{Refimprove|date=August 2016}}

In Internet usage, an email bomb is a form of net abuse consisting of sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted in a denial-of-service attack (DoS attack).

Methods

There are three methods of perpetrating an email bomb: mass mailing, list linking and zip bombing.

Mass mailing

Mass mailing consists of sending numerous duplicate mails to the same email address. These types of mail bombs are simple to design but their extreme simplicity means they can be easily detected by spam filters. Email-bombing using mass mailing is also commonly performed as a DDoS attack by employing the use of "zombie" botnets; hierarchical networks of computers compromised by malware and under the attacker's control. Similar to their use in spamming, the attacker instructs the botnet to send out millions or even billions of emails, but unlike normal botnet spamming, the emails are all addressed to only one or a few addresses the attacker wishes to flood. This form of email bombing is similar in purpose to other DDoS flooding attacks. As the targets are frequently the dedicated hosts handling website and email accounts of a business, this type of attack can be just as devastating to both services of the host.

This type of attack is more difficult to defend against than a simple mass-mailing bomb because of the multiple source addresses and the possibility of each zombie computer sending a different message or employing stealth techniques to defeat spam filters.

List linking

List linking, also known as "email cluster bomb", means signing a particular email address up to several email list subscriptions.[1] The victim then has to unsubscribe from these unwanted services manually. The attack can be carried out automatically with simple scripts: this is easy, almost impossible to trace back to the perpetrator, and potentially very destructive.[2] A massive attack of this kind targeting .gov email addresses was observed in August 2016.[3]

In order to prevent this type of bombing, most email subscription services send a confirmation email to a person's inbox when that email is used to register for a subscription. However, even the confirmation emails contribute to the attack. A better defense would prevent Web sites from being exploited without abandoning subscription forms.[2] After a subscription form is filled out, the Web site would dynamically create a mailto link to itself. A legitimate user would then send a message to validate the request without receiving any email from the Web site. While the sender's email could be spoofed, the sender's SMTP IP address cannot. The list manager can therefore verify that the email in the form request matches the originating SMTP server in the validation message.

Zip bombing

A ZIP bomb is a variant of mail-bombing. After most commercial mail servers began checking mail with anti-virus software and filtering certain malicious file types, EXE, RAR, Zip, 7-Zip, mail server software was then configured to unpack archives and check their contents as well. A new idea to combat this solution was composing a "bomb" consisting of an enormous text file, containing, for example, only the letter z repeating millions of times. Such a file compresses into a relatively small archive, but its unpacking (especially by early versions of mail servers) would use a greater amount of processing, which could result in a Denial of Service. A ZIP or .tar.gz file can even contain a copy of itself, causing infinite recursion if the server checks nested archive files.[4]

Text message bomb

A "text bomb" is a similar variant of sending a large number of text messages over SMS. The technique is a means of cyberbullying or online harassment. Apps online on the Android operating system have since been banned as a means of sending text bombs. The text messages may also lead to high phone bill charges on some mobile plans. Additionally, certain phone apps have also been created to prevent text bombs on Android OS.[5]

References

1. ^{{Cite journal|last=Jakobsson|first=Markus|last2=Menczer|first2=Filippo|date=December 2003|title=Untraceable Email Cluster Bombs|url=https://www.usenix.org/publications/login/december-2003-volume-28-number-6/untraceable-email-cluster-bombs|journal=;login:|volume=28|issue=6|doi=|pmid=|access-date=23 August 2016|via=}}
2. ^{{Cite book|title=Web Forms and Untraceable DDoS Attacks|last=Jakobsson|first=Markus|last2=Menczer|first2=Filippo|date=2010-01-01|publisher=Springer US|isbn=9780387738208|editor-last=Huang|editor-first=Scott C.-H.|location=|pages=77–95|language=en|arxiv=cs/0305042|doi=10.1007/978-0-387-73821-5_4|editor-last2=MacCallum|editor-first2=David|editor-last3=Du|editor-first3=Ding-Zhu}}
3. ^{{Cite web|url=http://krebsonsecurity.com/2016/08/massive-email-bombs-target-gov-addresses/|title=Massive Email Bombs Target .Gov Addresses — Krebs on Security|website=krebsonsecurity.com|access-date=2016-08-23}}
4. ^{{cite web|url=https://research.swtch.com/zip|title=research!rsc: Zip Files All The Way Down|website=research.swtch.com}}
5. ^{{Cite news|url=https://www.huffingtonpost.com/2013/11/01/text-bombing_n_4170171.html|title=Why Every Parent Needs To Know About Text Bombs|last=Brenoff|first=Ann|date=2013-11-01|work=Huffington Post|access-date=2017-12-30|language=en-US}}

External links

  • CERT - Email Bombing and Spamming
  • Email Cluster Bomb Research

2 : Email|Denial-of-service attacks

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/10 16:52:13