December 7, 2000
Information-technology Promotion Agency

 Computer Virus Incident Reports

1. Computer Virus Incident Reports of November, 2000

This is a summary of Computer Virus Incident Reports of November 2000, compiled by IPA: Information-technology Promotion Agency (President:: Shigeo Muraoka).

2. Release notes for November

(1) This month's report (2203) increased twice as many as the previous record of 906 in October 2000!!
2203 became the worst record in the past, followed by 906 in October 2000. And the number of actual infection was also highest with 546 reports whereas the past record was 339 in March 1999. Users must follow the anti-virus guidelines and not to open the attachment file without caution.

(2) The drastic increase of "W32/MTX" is causing serious problem!!
The upsurge in number of W32/MTX reports is causing many troubles. 894 reports is the highest ever (previous record was VBS/LOVELETTER of 346 reports in May 2000) including 356 reports of the actual infection (almost 40% of the total). This virus is spreading internationally.

W32/MTX propagates by sending out a copy of itself to whoever the infected user sends an email to as the second mail (there is neither subject line nor text body). When the recipient sees this second mail from the same sender, they automatically open the infected attachment without a doubt because they are usually from their friends or someone they know. Once infected, you should format the hard disk and reinstall Windows to make sure the complete recovery and disinfection of this virus. Restoring the data requires considerable time and labor, therefore the damage caused by W32/MTX is very serious.

Information on troublesome "W32/MTX"
http://www.ipa.go.jp/security/topics/mtx.html (Japanese)

(3) Be careful about "W32/Navidad"
New virus "W32/Navidad" is rapidly spreading and there were 437 reports in November. This virus spreads as an email attachment, and the infected users can't use some application programs. "Navidad" means "Christmas" in Spanish. The users should be careful about those viruses that pretend to be wishing Merry Christmas and season's greetings.

Information on new virus "W32/Navidad"
http://www.ipa.go.jp/security/topics/navidad.html (Japanese) 

3. Warning for this month

"Wait a minute!!" before you open the attachment file...
Email is the most common source of virus infection with approximately 94% of total reports. It is too late once you open the infected file. The users will easily get virus infection if they have the habit of opening the attachment file without checking them. To prevent infection it is important to ask yourself whether that file is really safe to open or not.

The list of 5 instructions when opening attachment files
http://www.ipa.go.jp/security/english/virus/press/200007/E_attach52.html

For questions, please contact:
Office of Computer Virus Countermeasures (OCVC)
Information-technology Promotion Agency
TEL: (03) 5978-7508
FAX: (03) 5978-7518
E-mail:
isec-info@ipa.go.jp
Virus Emergency Call: (03) 5978-7509
URL: http://www.ipa.go.jp/security/

Prevalence Table - Novembr 2000

There were 47 kinds of viruses reported during November. Frequently reported viruses were W32/MTX (894 reports) and W32/Navidad (437 reports). 2 kinds of new viruses, W32/Navidad and WYX (marked with a "*" sign) were reported to IPA for the first time (Macro and Script viruses: 699 reports, Windows and DOS viruses: 1503 reports, Mac virus: 1 report).

Macro Virus

No. of report

Script Virus

No. of report

X97M/Divi

120

VBS/LOVELETTER

314

XM/Laroux

90

Wscript/Kakworm

43

W97M/Marker

22

VBS/Netlog

3

W97M/Ethan

15

VBS/Stages

2

W97M/X97M/P97M/Tristate

12

VBS/Freelink

1

W97M/Class

10

VBS/NewLove

1

W97M/Thus

10

   

W97M/Melissa

8

Windows, DOS virus

 

W97M/Opey

8

W32/MTX

894

WM/Cap

1

W32/Navidad (*)

437

X97M/Barisada.da

6

W32/QAZ

69

XM/VCX.A

4

W32/Ska

40

W97M/JulyKiller

3

W32/PrettyPark

19

W97M/Myna

3

W32/CIH

13

W97M/Smac

3

W32/Funlove

13

W97M/Bablas.A

2

W32/Kriz

7

W97M/Prilissa

2

AntiCMOS

3

W97M/Walker

2

Form

3

XF/Sic

2

Cascade

1

XM/Extras

2

Stealth_Boot.B

1

W97M/Locale

1

WYX (*)

1

W97M/Nsi

1

W32/Fix2001

1

W97M/Story

1

W32/Marburg

1

W97M/Titch

1

   

WM/Niceday

1

Macintosh Virus

 
   

MBDF

1

Note) The abbreviation used in the "Name of Virus" are as follows:

WM

MSWord95 (WordMacro)

W97M

MSWord97 (Word97Macro)

XM, XF

MSExcel95, 97 (ExcelMacro, ExcelFormula)

X97M

MSExcel97 (Excel97Macro)

W97M/X97M/P97M

MSWord97, MSExcel97, MSPowerpoint97

(Word97Macro/Excel97Macro/PowerPoint97Macro)

W32

works under Windows32

VBS

written in VisualBasicScript

Wscript

works under Windows Scripting Host (WSH) excluding VBS

The following table shows the name and developer/distributor of antivirus products that are used for detection and disinfection in November (in the order of reported date).

Antivirus Products used for detection and disinfection

Product

Developer/Distributor

InterScan

Trend Micro, Inc.

Virus Buster (PC-cillin)

Trend Micro, Inc.

VirusScan

Network Associates Japan Inc.

Norton AntiVirus

Symantec Japan, Inc.

F-SECURE (F-PROT)

Yamada Corporation

Server Protect

Trend Micro, Inc.

Sophos AntiVirus

C.S.E

Net (Group) Shield

Network Associates Japan Inc.

Inoculan (Cheyenne)

Computer Associates

4. Outline of November report

(1) The following are brief descriptions of viruses that are reported to IPA for the first time in November:

W32/Navidad

W32/Navidad propagates as an email attachment file. The virus finds emails with a single attachment in infected user's inbox. When such email is found, the virus replaces the existing attachment with an infected file and sends itself to the sender of the original email. The recipient notices the contents of the email and since it's from someone known (s)he opens the attachment without scanning. Once infected the user is not able to use the application programs.

WYX

Wyx is a memory resident, boot sector infecting virus. When the machine is booted from an infected floppy disk the virus becomes memory resident. Once the system is infected the virus tries to infect each floppy disk that is accessed. This virus works under IBM and compatible machines. There is no payload.

(2) The following table shows the number of reports sorted by reporting body. Most reports came from "general corporate uses" with about 84% of total reports.

Reporting Body

Number of report

2000/11

 

2000/1-11

 

'99 total

 

General corporate user

1853

84.1%

7551

90.6%

2859

78.4%

Information Technology Industry

9

0.4%

94

1.1%

203

5.6%

Education/Research Institute

48

2.2%

117

1.4%

227

6.2%

Individual user

293

13.3%

569

6.8%

356

9.8%

(3) The following table shows the number of reports sorted by region. The largest number of reports was from Kanto region, followed by Chubu and Kinki region.

Region

Number of report

2000/11

 

2000/1-11

 

'99 total

 

Hokkaido

25

1.1%

58

0.7%

34

0.9%

Tohoku

28

1.3%

80

1.0%

89

2.4%

Kanto

1788

81.2%

7041

84.5%

2476

67.9%

Chubu

166

7.5%

495

5.9%

293

8.0%

Kinki

132

6.0%

489

5.9%

547

15.0%

Chugoku

21

1.0%

55

0.7%

107

2.9%

Shikoku

6

0.3%

24

0.3%

25

0.7%

Kyusyu

37

1.7%

89

1.1%

74

2.0%

(4) The following table shows the source of virus. Approximately 94% of total reports said email (including oversea emails) was the most common source.

Source of Virus

Number of report

2000/11

 

2000/1-11

 

'99 total

 

Via email

1268

57.6%

4508

54.1%

2175

59.7%

Via email from overseas

803

36.5%

2912

35.0%

268

7.4%

Download from network

11

0.5%

73

0.9%

195

5.3%

External medium

20

0.9%

342

4.1%

589

16.2%

External medium (overseas)

2

0.1%

3

0%

22

0.6%

unknown

99

4.5%

493

5.9%

396

10.9%

(5) The following table shows the number of PCs infected by viruses. 0 machine indicates that the virus was found either on floppy disks or in a document and was detected before infection occurred.

Number of PCs

Number of report

2000/11

 

2000/1-11

 

'99 total

 

0

1657

75.2%

6677

80.1%

1692

46.4%

1

451

20.5%

1203

14.4%

1316

36.1%

2-4

67

3.0%

315

3.8%

401

11.0%

5-9

19

0.9%

82

1.0%

122

3.3%

10-19

5

0.2%

26

0.3%

64

1.8%

20-49

1

0%

13

0.2%

33

0.9%

50 or more

3

0.1%

15

0.2%

17

0.5%

5. Virus Payload Dates

To prevent the spread of virus, please check the special notice on viruses that have payload dates between December 7 and January 31. For more information, please refer to the virus calendar at

http://www.ipa.go.jp/SECURITY/virus/viruscalendar.html (Japanese)

You should detect and disinfect virus with the latest antivirus software before its payload is triggered, since the disinfection and recovery afterwards could be very difficult (such as losing data etc.)

W97M/Prilissa

W97M/Prilissa propagates under Microsoft Word (MSWord). This virus infects MSWord when an infected document is opened. Every document that is created or modified on infected MSWord thereafter becomes infected when the document is closed. If either the infected document is opened or document is closed on infected MSWord On December 25, the virus is activated and does the following:

1. modifies "Autoexec.bat" so that the message is displayed to format C drive on the next boot.

2. displays a dialogue box.

3. If the user click "OK", the virus writes various kinds of shapes in different color on the document.

This virus works under Japanese version of MSWord97/98/2000 and English version of MSWord97/2000.

W32/Kriz

W32/Kriz propagates under Win32 system. It infects Win32 executable exe files (PE exe files with the extension ".exe" or ".scr"). When an infected file is run, the virus creates the copy of "Kernel32.dll" in the Windows system directory and renames it to "Krized.tt6". Then it modifies "Wininit.ini" so that "Kernel32.dll" is overwritten with "Krized.tt6" on the next reboot. It becomes memory resident and infects to every file that is run or copied. The payload of this virus is activated on December 25th when an infected file is run while the virus stays in a memory. W32/Kriz damages CMOS memory and destroy all hard drives by overwriting them with garbage. It may destroy Flash BIOS depending of the machine types.

Computer Virus Incident Reporting Program

The Ministry of International Trade and Industry announced "Computer Virus Prevention Guidelines" to prevent the spread of computer viruses in Japan. IPA was designated to receive the "Computer Virus Damage Report" directly from the infected users to investigate virus problem and to provide monthly statistics. This reporting system started in April 1990. Anyone who has encountered computer virus is supposed to send a virus report with necessary information to IPA to prevent further spread and damage of viruses.

IPA deals with each reporter (user) on an individual basis as a consultant, and also works as a public research institute for antivirus measures by analyzing problems showed on the damage report. Taking reporters' privacy into full consideration, IPA periodically publishes the result of their research and analysis on computer virus incident.

Computer Virus Prevention Guidelines:
- Enactment on April 10, 1990 (release No.139)
- Amendment on July 7, 1995 (release No. 429)
- Amendment on September 24, 1997 (release No. 535)