攻撃者がイタリアを拠点とする銀行のクライアントを標的とした認証情報フィッシング サイトを立ち上げます。標的とされたクライアントが、架空のログインページへのリンクを含む不正なテキスト メッセージを攻撃者から受信し始めます。銀行はテキスト メッセージを受信したクライアントからの報告を受け取り、調査を開始し、認証情報をフィッシングのためのサイトであることを確認します。銀行は、クライアントを保護するために、次のリクエスト本文を使用してフィッシング サイトを Web Risk に送信します。
{"submission":{"uri":"http://example.com/login.html"},"threatDiscovery":{"platform":"ANDROID","regionCodes":"IT"},"threatInfo":{"abuseType":"SOCIAL_ENGINEERING","threatJustification":{"labels":["USER_REPORT","MANUAL_VERIFICATION"],"comments":"Site is impersonating a bank and phishing for login credentials"},"threatConfidence":{"level":"HIGH"}}}
銀行が Submission API から返されたオペレーション名で送信のステータスを確認すると、ステータスは SUCCEEDED となり、送信された URL がセーフ ブラウジング ブロックリストに追加されたことが示されます。
次のステップ
ThreatInfo と ThreatDiscovery(RPC、Rest)の API リファレンスを表示する
[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["わかりにくい","hardToUnderstand","thumb-down"],["情報またはサンプルコードが不正確","incorrectInformationOrSampleCode","thumb-down"],["必要な情報 / サンプルがない","missingTheInformationSamplesINeed","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-09-04 UTC。"],[],[],null,["# Best practices for using the Submission API\n===========================================\n\nThis document describes the recommended implementation for the Submission API.\n\nImprove detection with `ThreatInfo` and `ThreatDiscovery`\n---------------------------------------------------------\n\nWe recommend using [`ThreatInfo`](/web-risk/docs/reference/rest/v1/projects.uris/submit#threatinfo) and [`ThreatDiscovery`](/web-risk/docs/reference/rest/v1/projects.uris/submit#threatdiscovery) fields to provide additional information about submissions, which has the potential to improve detection and increase the chances of a submission being blocked.\n\n- Use `ThreatInfo` fields to provide more information about why the URI is being submitted.\n- Use `ThreatDiscovery` fields to provide more information about how the threat was found.\n\n### Example\n\nAn attacker launches a credential phishing site targeting clients of a bank based in Italy. Targeted clients begin receiving deceptive text messages from that attacker with a link to a fake login page. The bank receives reports from clients that received the texts, launches an investigation, and confirms that the site is phishing for credentials. To protect their clients, the bank submits the phishing site to Web Risk with the following request body: \n\n {\n \"submission\": {\n \"uri\": \"http://example.com/login.html\"\n },\n \"threatDiscovery\": {\n \"platform\": \"ANDROID\",\n \"regionCodes\": \"IT\"\n },\n \"threatInfo\": {\n \"abuseType\": \"SOCIAL_ENGINEERING\",\n \"threatJustification\": {\n \"labels\": [\"USER_REPORT\", \"MANUAL_VERIFICATION\"],\n \"comments\": \"Site is impersonating a bank and phishing for login credentials\"\n },\n \"threatConfidence\": {\n \"level\": \"HIGH\"\n }\n }\n }\n\nWhen the bank checks the status of the submission with the operation name returned by the Submission API, the status is `SUCCEEDED`, indicating that the submitted URL was added to the Safe Browsing blocklist.\n\nWhat's next\n-----------\n\n- View the API reference for `ThreatInfo` and `ThreatDiscovery` ([RPC](/web-risk/docs/reference/rpc/google.cloud.webrisk.v1#submiturirequest), [Rest](/web-risk/docs/reference/rest/v1/projects.uris/submit))"]]