March 8, 2001
Information-technology Promotion Agency

 Computer Virus Incident Reports

1. Computer Virus Incident Reports of February, 2001

This is a summary of Computer Virus Incident Reports of February 2001 compiled by IPA: Information-technology Promotion Agency (President:: Shigeo Muraoka).

2. Release notes for February

(1) Careless click on email attachment is the most significant source of virus damage.

It is unsafe to click on email attachment without virus check. 92% of total reports shows that email is a source of virus. Users should pay enough attention to email attachments.

W32/Hybris

W32/MTX

W32/Navidad

randomly selected 8 alphabet letters + .EXE

1 out of 31 different file names is selected by worm depending on the current date

it can be "Navidad.exe

Reference: The list of 5 instructions when opening attachment files
http://www.ipa.go.jp/security/english/virus/press/200007/E_attach52.html

(2) Careless click on websites may cause various troubles.
- You may get charged for international phone calls that you didn't remember to make --

We receive many inquiries from troubled users who executed some programs they downloaded from dubious websites. The followings are the examples of problems that may happen by clicking messages on suspicious websites. Users must be very careful when doing so.

You should avoid visiting websites that only shows ID number, or URLs on direct order mail/spam.

Reference: Destruction Caused by Careless Download
http://www.ipa.go.jp/security/english/virus/press/200007/E_malicious2.html
Measures against threat on web surfing and email for end users
http://www.ipa.go.jp/security/ciadr/cm01.html#user (Japanese)

 

Warning for this month
"A virus victim could be a virus sender!!"

Once you get infected by virus, you might become virus distributor in the next minute. Some viruses automatically attach themselves to outgoing email as an attachment. You could become virus sender if you don't update your antivirus program properly.

You need to have proper security measures so that you don't become a victim or an attacker.

http://www.ipa.go.jp/security/virus/top-j.html (Japanese)

2000 Survey on corporate anti-virus status IPA


3. Prevalence Table - February 2001

 

(1) There were 46 kinds of viruses reported during February. Most common viruses were W32/Hybris (575 reports) and W32/MTX (405 reports). 2 kinds of new viruses, VBS/SST and W32/BleBla (marked with a "*" sign) were reported to IPA for the first time (Macro and Script viruses: 377 reports, Windows and DOS viruses: 1190 reports, Mac virus: 0 report).

Windows, DOS virus

No. of report

Script Virus

No. of report

W32/Hybris

575

VBS/SST (*)

89

W32/MTX

405

VBS/LOVELETTER

28

W32/Navidad

88

Wscript/Kakworm

24

W32/QAZ

28

VBS/Stages

4

W32/Ska

20

VBS/Netlog

2

W32/Funlove

16

   

W32/Msinit

12

   

W32/CIH

11

Macro Virus

 

W32/PrettyPark

10

XM/Laroux

72

AntiCMOS

4

X97M/Divi

48

Form

4

W97M/Marker

26

W32/BleBla(*)

3

W97M/Myna

18

AntiEXE

2

W97M/X97M/P97M/Tristate

16

W32/Kriz

2

W97M/Ethan

8

Burglar

1

W97M/Thus

8

Dir_II

1

W97M/Class

6

Jerusalem

1

W97M/Vmpck1

6

One_Half

1

W97M/Opey

5

Stoned

1

W97M/Story

5

Vacsina

1

W97M/Melissa

4

W32/Fix2001

1

XM/VCX.A

3

W32/Plage

1

WM/Cap

2

W32/Prolin

1

W97M/Groov

1

WYX

1

W97M/Locale

1

   

W97M/Nsi

1

   

Macintosh Virus

 
   

none

 

Note)

The abbreviation used in the "Name of Virus" are as follows:

WM

MSWord95 (WordMacro)

W97M

MSWord97 (Word97Macro)

XM, XF

MSExcel95, 97 (ExcelMacro, ExcelFormula)

X97M

MSExcel97 (Excel97Macro)

W97M/X97M/P97M

MSWord97, MSExcel97, MSPowerpoint97(Word97Macro/Excel97Macro/PowerPoint97Macro)

W32

works under Windows32

VBS

written in VisualBasicScript

Wscript

works under Windows Scripting Host (WSH) excluding VBS

(2) The following are brief descriptions of viruses that are reported to IPA for the first time in February:

VBS/SST

VBS/SST propagates via email attachment file. Once executed, the virus copies itself in Windows directory (usually in C:\windows\) as a file named "AnnaKournikova.jpg.vbs". Then the virus sends itself as an email attachment to all addresses on the address book. The email looks like below:

Subject: Here you have, ;o)
Body: Hi Check This!
Attachment: AnnaKournikova.jpg.vbs

W32/BleBla

W32/BleBla exploits InternetExplorer volenrability. This virus propagates via email in html form with 2 attachments named "xjuliet.chm" and "xromeo.exe". When an infected message is previewed by Outlook Express or opened by Outlook, the virus copies "xjuliet.chm" and "xromeo.exe" files into Windows\Temp folder (usually C:\Windows\Temp). Then it executes "xjuliet.chm" by using HTML help function. After this .chm file is executed, the main virus body, "xromeo.exe", is executed.

Then, the virus copies itself to C:\windows folder as the file named "sysrnj.exe". W32/BleBla also modifies registry so that the virus is executed when the files with .doc, .xls, .jpg, and .zip extention is opened. When these files are opened, the virus deletes the original file, and copies itself by adding ".exe" to the original file name.

For example:
abcd.doc -> deleted -> abcd.doc.exe

The exe file (application) is made unusable. The virus sends the following email to all addresses on the address book:

Subject: Romeo&Juliet (or others. It is chosen randomly from 18 different kinds of subject lines.)
Body: none (empty)
Attachment: xjuliet.chm, xromeo.exe

(3) The following table shows the number of reports sorted by reporting body. Most reports came from "general corporate uses" with about 69% of total reports.

Reporting Body

Number of report

2001/2

 

2001 total

 

2000 total

 

General corporate user

1075

68.6%

2876

71.8%

9975

89.8%

Education/Research Institute

95

6.1%

190

4.7%

214

1.9%

Individual user

397

25.3%

941

23.5%

920

8.3%

(4) The following table shows the number of reports sorted by region. The largest number of reports was from Kanto region, followed by Kinki and Chubu region.

Region

Number of report

2001/2

 

2001 total

 

2000 total

 

Hokkaido

38

2.4%

92

2.3%

89

0.8%

Tohoku

56

3.6%

108

2.7%

121

1.1%

Kanto

1039

66.3%

2978

74.3%

9415

84.8%

Chubu

161

10.3%

277

6.9%

612

5.5%

Kinki

187

11.9%

385

9.6%

628

5.7%

Chugoku

27

1.7%

53

1.3%

80

0.7%

Shikoku

28

1.8%

55

1.4%

35

0.3%

Kyusyu

31

2.0%

59

1.5%

129

1.2%

(5) The following table shows the source of virus. Approximately 92% of total reports said email (including oversea emails) was the most common source.

Source of Virus

Number of report

2001/2

 

2001 total

 

2000 total

 

Via email

1138

72.6%

2809

70.1%

6171

55.5%

Via email from overseas

301

19.2%

939

23.4%

3843

34.6%

Download from network

4

0.3%

9

0.2%

82

0.7%

External medium

46

2.96%

86

2.1%

424

3.8%

External medium (overseas)

0

0%

1

0%

4

0%

unknown

78

5.0%

163

4.1%

585

5.3%

(6) The following table shows the number of PCs infected by viruses. 0 machine indicates that the virus was found either on floppy disks or in a document and was detected before infection occurred.

Number of PCs

Number of report

2001/2

 

2001 total

 

2000 total

 

0

1218

77.7%

3189

79.6%

8927

80.4%

1

292

18.6%

704

17.6%

1610

14.5%

2-4

36

2.3%

71

1.8%

393

3.5%

5-9

12

0.8%

22

0.5%

109

1.0%

10-19

5

0.3%

12

0.3%

32

0.3%

20-49

3

0.2%

5

0.1%

20

0.2%

50 or more

1

0.1%

4

0.1%

18

0.2%

4. Virus Payload Dates

To prevent the spread of virus, please check the special notice on viruses that have payload dates between March 8 and April 30. For more information, please refer to the virus calendar at

http://www.ipa.go.jp/SECURITY/virus/viruscalendar.html (Japanese)

You should detect and disinfect virus with the latest antivirus software before its payload is triggered, since the disinfection and recovery afterwards could be very difficult (such as losing data etc.)

W97M/CIH: April 26th

W32/CIH is a Win32 virus that infects PE exe files(*) of Windows95/98. When an infected file is run, the virus will stay resident in memory and will infect every program file that is run. After the system is infected, W32/CIH overwrites the start-up section of the hard disk with garbage data and makes the computer unable to access the hard disk.

If the machine uses the Intel 430TX chipset or its compatible chipsets, the virus overwrites the boot section of BIOS ROM with garbage data and destroys its content, making the computer unusable.

The variants of W32/CIH activate on April 26th, June 26th or 26th of every month.

((*) PE exe files: PE stands for Portable Executable. It is a new form of exe programs that offers less processing time and more extensibility.)

Computer Virus Incident Reporting Program

The Ministry of International Trade and Industry announced "Computer Virus Prevention Guidelines" to prevent the spread of computer viruses in Japan. IPA was designated to receive the "Computer Virus Damage Report" directly from the infected users to investigate virus problem and to provide monthly statistics. This reporting system started in April 1990. Anyone who has encountered computer virus is supposed to send a virus report with necessary information to IPA to prevent further spread and damage of viruses.

IPA deals with each reporter (user) on an individual basis as a consultant, and also works as a public research institute for antivirus measures by analyzing problems showed on the damage report. Taking reporters' privacy into full consideration, IPA periodically publishes the result of their research and analysis on computer virus incident.

Computer Virus Prevention Guidelines:
- Enactment on April 10, 1990 (release No.139)
- Amendment on July 7, 1995 (release No. 429)
- Amendment on September 24, 1997 (release No. 535)
- Amendment on December 28, 2000 (release No. 952)

For questions, please contact:
Office of Computer Virus Countermeasures (OCVC)
Information-technology Promotion Agency
TEL: (03) 5978-7508
FAX: (03) 5978-7518
E-mail: isec-info@ipa.go.jp
Virus Emergency Call: (03) 5978-7509
URL: http://www.ipa.go.jp/security/