図2:トロイの木馬に感染してから、認証情報が盗まれるまでの流れ(「Studying Malicious Websites and the Underground Economy on the Chinese Web」より)
Copyright (c) 2008 Impress Watch Corporation, an Impress Group company. All rights reserved.