March 8, 2001
Information-technology Promotion Agency
Computer Virus Incident Reports
1. Computer Virus Incident Reports of February, 2001
This is a summary of Computer Virus Incident Reports of February 2001 compiled by IPA: Information-technology Promotion Agency (President:: Shigeo Muraoka).
Outline
After three consecutive months of over 2000 monthly reports, it finally dropped down to less than 2000, which was 1567 reports this month. Perhaps this is because users became to pay enough attention to email attachments. However, this number is 4 times more than that of last February, and we can't really say that the virus problem has been settled.
2. Release notes for February
(1) Careless click on email attachment is the most significant source of virus damage.
It is unsafe to click on email attachment without virus check. 92% of total reports shows that email is a source of virus. Users should pay enough attention to email attachments.
W32/Hybris |
W32/MTX |
W32/Navidad |
|
|
|||
|
randomly selected 8 alphabet letters + .EXE |
1 out of 31 different file names is selected by worm depending on the current date |
it can be "Navidad.exe |
|
Reference: The list of 5 instructions when opening attachment files
http://www.ipa.go.jp/security/english/virus/press/200007/E_attach52.html
(2) Careless click on websites may cause various troubles.
- You may get charged for international phone
calls that you didn't remember to make --
We receive many inquiries from troubled users who executed some programs they downloaded from dubious websites. The followings are the examples of problems that may happen by clicking messages on suspicious websites. Users must be very careful when doing so.
|
|
You should avoid visiting websites that only shows ID number, or URLs on direct order mail/spam.
Reference: Destruction Caused by Careless
Download
http://www.ipa.go.jp/security/english/virus/press/200007/E_malicious2.html
Measures against threat on web surfing and
email for end users
http://www.ipa.go.jp/security/ciadr/cm01.html#user (Japanese)
Warning for this month
"A virus victim could be a virus sender!!"
Once you get infected by virus, you might become virus distributor in the next minute. Some viruses automatically attach themselves to outgoing email as an attachment. You could become virus sender if you don't update your antivirus program properly.
You need to have proper security measures so that you don't become a victim or an attacker.
http://www.ipa.go.jp/security/virus/top-j.html (Japanese)
2000 Survey on corporate anti-virus status (IPA)
3. Prevalence Table - February 2001

(1) There were 46 kinds of viruses reported during February. Most common viruses were W32/Hybris (575 reports) and W32/MTX (405 reports). 2 kinds of new viruses, VBS/SST and W32/BleBla (marked with a "*" sign) were reported to IPA for the first time (Macro and Script viruses: 377 reports, Windows and DOS viruses: 1190 reports, Mac virus: 0 report).
|
Windows, DOS virus |
No. of report |
Script Virus |
No. of report |
|
W32/Hybris |
575 |
VBS/SST (*) |
89 |
|
W32/MTX |
405 |
VBS/LOVELETTER |
28 |
|
W32/Navidad |
88 |
Wscript/Kakworm |
24 |
|
W32/QAZ |
28 |
VBS/Stages |
4 |
|
W32/Ska |
20 |
VBS/Netlog |
2 |
|
W32/Funlove |
16 |
||
|
W32/Msinit |
12 |
||
|
W32/CIH |
11 |
Macro Virus |
|
|
W32/PrettyPark |
10 |
XM/Laroux |
72 |
|
AntiCMOS |
4 |
X97M/Divi |
48 |
|
Form |
4 |
W97M/Marker |
26 |
|
W32/BleBla(*) |
3 |
W97M/Myna |
18 |
|
AntiEXE |
2 |
W97M/X97M/P97M/Tristate |
16 |
|
W32/Kriz |
2 |
W97M/Ethan |
8 |
|
Burglar |
1 |
W97M/Thus |
8 |
|
Dir_II |
1 |
W97M/Class |
6 |
|
Jerusalem |
1 |
W97M/Vmpck1 |
6 |
|
One_Half |
1 |
W97M/Opey |
5 |
|
Stoned |
1 |
W97M/Story |
5 |
|
Vacsina |
1 |
W97M/Melissa |
4 |
|
W32/Fix2001 |
1 |
XM/VCX.A |
3 |
|
W32/Plage |
1 |
WM/Cap |
2 |
|
W32/Prolin |
1 |
W97M/Groov |
1 |
|
WYX |
1 |
W97M/Locale |
1 |
|
W97M/Nsi |
1 |
||
|
Macintosh Virus |
|||
|
none |
Note)
The abbreviation used in the "Name of Virus" are as follows:
|
WM |
MSWord95 (WordMacro) |
|
W97M |
MSWord97 (Word97Macro) |
|
XM, XF |
MSExcel95, 97 (ExcelMacro, ExcelFormula) |
|
X97M |
MSExcel97 (Excel97Macro) |
|
W97M/X97M/P97M |
MSWord97, MSExcel97, MSPowerpoint97(Word97Macro/Excel97Macro/PowerPoint97Macro) |
|
W32 |
works under Windows32 |
|
VBS |
written in VisualBasicScript |
|
Wscript |
works under Windows Scripting Host (WSH) excluding VBS |
(2) The following are brief descriptions of viruses that are reported to IPA for the first time in February:
VBS/SST
VBS/SST propagates via email attachment file. Once executed, the virus copies itself in Windows directory (usually in C:\windows\) as a file named "AnnaKournikova.jpg.vbs". Then the virus sends itself as an email attachment to all addresses on the address book. The email looks like below:
Subject: Here you have, ;o)
Body: Hi Check This!
Attachment: AnnaKournikova.jpg.vbs
W32/BleBla
W32/BleBla exploits InternetExplorer volenrability. This virus propagates via email in html form with 2 attachments named "xjuliet.chm" and "xromeo.exe". When an infected message is previewed by Outlook Express or opened by Outlook, the virus copies "xjuliet.chm" and "xromeo.exe" files into Windows\Temp folder (usually C:\Windows\Temp). Then it executes "xjuliet.chm" by using HTML help function. After this .chm file is executed, the main virus body, "xromeo.exe", is executed.
Then, the virus copies itself to C:\windows folder as the file named "sysrnj.exe". W32/BleBla also modifies registry so that the virus is executed when the files with .doc, .xls, .jpg, and .zip extention is opened. When these files are opened, the virus deletes the original file, and copies itself by adding ".exe" to the original file name.
For example:
abcd.doc -> deleted -> abcd.doc.exe
The exe file (application) is made unusable. The virus sends the following email to all addresses on the address book:
Subject: Romeo&Juliet (or others. It is chosen randomly from 18 different kinds of subject lines.)
Body: none (empty)
Attachment: xjuliet.chm, xromeo.exe
(3) The following table shows the number of reports sorted by reporting body. Most reports came from "general corporate uses" with about 69% of total reports.
|
Reporting Body |
Number of report |
|||||
|
2001/2 |
2001 total |
2000 total |
||||
|
General corporate user |
1075 |
68.6% |
2876 |
71.8% |
9975 |
89.8% |
|
Education/Research Institute |
95 |
6.1% |
190 |
4.7% |
214 |
1.9% |
|
Individual user |
397 |
25.3% |
941 |
23.5% |
920 |
8.3% |
(4) The following table shows the number of reports sorted by region. The largest number of reports was from Kanto region, followed by Kinki and Chubu region.
|
Region |
Number of report |
|||||
|
2001/2 |
2001 total |
2000 total |
||||
|
Hokkaido |
38 |
2.4% |
92 |
2.3% |
89 |
0.8% |
|
Tohoku |
56 |
3.6% |
108 |
2.7% |
121 |
1.1% |
|
Kanto |
1039 |
66.3% |
2978 |
74.3% |
9415 |
84.8% |
|
Chubu |
161 |
10.3% |
277 |
6.9% |
612 |
5.5% |
|
Kinki |
187 |
11.9% |
385 |
9.6% |
628 |
5.7% |
|
Chugoku |
27 |
1.7% |
53 |
1.3% |
80 |
0.7% |
|
Shikoku |
28 |
1.8% |
55 |
1.4% |
35 |
0.3% |
|
Kyusyu |
31 |
2.0% |
59 |
1.5% |
129 |
1.2% |
(5) The following table shows the source of virus. Approximately 92% of total reports said email (including oversea emails) was the most common source.
|
Source of Virus |
Number of report |
|||||
|
2001/2 |
2001 total |
2000 total |
||||
|
Via email |
1138 |
72.6% |
2809 |
70.1% |
6171 |
55.5% |
|
Via email from overseas |
301 |
19.2% |
939 |
23.4% |
3843 |
34.6% |
|
Download from network |
4 |
0.3% |
9 |
0.2% |
82 |
0.7% |
|
External medium |
46 |
2.96% |
86 |
2.1% |
424 |
3.8% |
|
External medium (overseas) |
0 |
0% |
1 |
0% |
4 |
0% |
|
unknown |
78 |
5.0% |
163 |
4.1% |
585 |
5.3% |
(6) The following table shows the number of PCs infected by viruses. 0 machine indicates that the virus was found either on floppy disks or in a document and was detected before infection occurred.
|
Number of PCs |
Number of report |
|||||
|
2001/2 |
2001 total |
2000 total |
||||
|
0 |
1218 |
77.7% |
3189 |
79.6% |
8927 |
80.4% |
|
1 |
292 |
18.6% |
704 |
17.6% |
1610 |
14.5% |
|
2-4 |
36 |
2.3% |
71 |
1.8% |
393 |
3.5% |
|
5-9 |
12 |
0.8% |
22 |
0.5% |
109 |
1.0% |
|
10-19 |
5 |
0.3% |
12 |
0.3% |
32 |
0.3% |
|
20-49 |
3 |
0.2% |
5 |
0.1% |
20 |
0.2% |
|
50 or more |
1 |
0.1% |
4 |
0.1% |
18 |
0.2% |
4. Virus Payload Dates
To prevent the spread of virus, please check the special notice on viruses that have payload dates between March 8 and April 30. For more information, please refer to the virus calendar at
http://www.ipa.go.jp/SECURITY/virus/viruscalendar.html (Japanese)You should detect and disinfect virus with the latest antivirus software before its payload is triggered, since the disinfection and recovery afterwards could be very difficult (such as losing data etc.)
W97M/CIH: April 26th
W32/CIH is a Win32 virus that infects PE exe files(*) of Windows95/98. When an infected file is run, the virus will stay resident in memory and will infect every program file that is run. After the system is infected, W32/CIH overwrites the start-up section of the hard disk with garbage data and makes the computer unable to access the hard disk.
If the machine uses the Intel 430TX chipset or its compatible chipsets, the virus overwrites the boot section of BIOS ROM with garbage data and destroys its content, making the computer unusable.
The variants of W32/CIH activate on April 26th, June 26th or 26th of every month.
((*) PE exe files: PE stands for Portable Executable. It is a new form of exe programs that offers less processing time and more extensibility.)
|
Computer Virus Incident Reporting Program The Ministry of International Trade and Industry announced "Computer Virus Prevention Guidelines" to prevent the spread of computer viruses in Japan. IPA was designated to receive the "Computer Virus Damage Report" directly from the infected users to investigate virus problem and to provide monthly statistics. This reporting system started in April 1990. Anyone who has encountered computer virus is supposed to send a virus report with necessary information to IPA to prevent further spread and damage of viruses. IPA deals with each reporter (user) on an individual basis as a consultant, and also works as a public research institute for antivirus measures by analyzing problems showed on the damage report. Taking reporters' privacy into full consideration, IPA periodically publishes the result of their research and analysis on computer virus incident. Computer Virus Prevention Guidelines: |
For questions, please contact:
Office of Computer Virus Countermeasures
(OCVC)
Information-technology Promotion Agency
TEL: (03) 5978-7508
FAX: (03) 5978-7518
E-mail: isec-info@ipa.go.jp
Virus Emergency Call: (03) 5978-7509
URL: http://www.ipa.go.jp/security/