Information-technology
Promotion Agency,
Japan
$BK\J8$X(B
IPA

TOP|Aplication|Contact us|Sitemap


Information-technology Promotion Agency, Japan
-japanese charactor-






IT Security Center

The Information-technology SEcurity Center (ISEC) is the center for promoting information security in Japan.









Japanese




Activities




Information Service Activities






Security Software Development Activities






CRYPTREC






IT SecurityAssurance







Organization







PGP key







RFCs







Mission Statement







Links







About IPA/ISEC







IPA TOP>IT Security Center Japanese TOP>IT Security Center English TOP>information




Computer Virus / Unauthorized Computer Access Incident Report [Summary]


April 16, 2004
Information-technology Promotion Agency, Japan (IPA)
IT Security Center



W32/Netsky Virus's Variants Have being Spread All Over!

This is a summary of Computer Virus / Unauthorized Computer Access Incident Reports for March 2004 compiled by IPA

1. Computer Virus Incident Reports

In March, 4,012 reports were submitted to IPA, which resulted 2 times higher rate* compared with the one submitted in February (1,733).   Of 1,795 cases are for W32/Netsky (Reported more than 1,000 cases is the first time since when 1,062 cases for W32/Klez emerged in August, 2002.), 479 cases for W32/Mydoom and 346 cases for W32/Klez follow.

W32/Netsky Virus's Variants Have being Spread All Over!

In March, many cases were reported and most of them are related to W32/Netsky Variants (Netsky.D, Netsky.P, Netsky.Q).   Particularly, damages by Netsky.Q, the newly emerged virus, are significantly enlarged upon its appearance (See following graph with regard to the status for detection by IPA.).

Be Cautious not being a Part Who Performs DoS(Denial of Service) Attack by Netsky.Q

If you start those machines infected by Netsky.Q within the periods from April 8 to 11, 2004, a DoS Attack would be performed against some Web sites.   It is, therefore, strongly recommended to confirm whether your machine is being infected or not before you start your machine to ensure not being the source of DoS attack (s).

Netsky viruses received by IPA

*    IPA receives the computer virus detection/damage reports based on the Computer Virus Prevention Guidelines. To reflect such data to be instantiated, the reporting format has partially been changed to fill easier and IPA asked companies and home users widely to file the reports, which resulted in the increase of the number of reports.

Please note that the reported numbers are counted as 1 case per virus per day, regardless how many viruses are detected a day; the reported number 4,012 for this month is the consequence of summarizing the detected virus numbers of about 294,000.

Netsky.Q will expand its infection through attachment file.   When you open files attached to the mails which masqueraded as error messages (see the figure underneath.), the virus mainly performs the following actions;  

-     Spread over virus mails to the existed addresses within your PC (address book, etc.)

-     DoS attack (Denial of Service) will be performed to some Web sites from the periods of April 8 – 11

-     Generate Beeping sound on and off periodically which is the very rare phenomenon

Netsky.Q mail

2. Unauthorized Computer Access Incident Report

57 reports were submitted to IPA, which resulted 1.5 times higher rate compared with those reported in February (37).   In addition, the number of damaged reports was 8 , which 2 times higher compared with the one reported in February (4).   Among them, 7cases were intrusion and 1 case was unauthorized mail relay.

Of cases with regard to damage, followings are the significantly be noted.
Due to the use of easily assumable account name and password, some of program files within application servers were deleted and such programs were no longer available.

As the patch needed for Windows 2000 Server has not been applied and Windows Update has not been conducted, application servers were used for publication/distribution of unauthorized files.

Due to allow relaying to any domains other than their own domains, mail servers were used as stepping-stones sending advertising mails.

The Key Principles are “Multiple Protections” and “Least Authorization”!

The key principles to protect against unauthorized access are multiple protections and least authorization .   With regard to ID/password setting and its administration, removal of security holes, adequate access limitation, if there are any of security flaws, you might confront to unauthorized access/damage incidentally.   In addition, it is important to provide least authorization only to the limited person on need to know basis.

It is suggested that system administrators should re-confirm that such countermeasures are properly being provided.

“Home Pages designed for System Administrators with regard to Actual Countermeasures for IT Security” (in Japanese)
http://www.ipa.go.jp/security/awareness/administrator/administrator.html

3. Reminder for April: “Does your anti-virus software sufficiently counter to unidentified viruses?”

-- It works, but do not overly confide! –

To use an anti-virus software is effective to countermeasure against viruses.   However, it is apparent that an anti-virus software has a limitation to counter every virus instantly, as one example of consultation to IPA such as “Viruses have not been detected even the anti-virus software is always updated to the latest version, but infected upon opening of attached files of e-mail” shows. There might be a time range that an   anti-virus software cannot detect newly emerged viruses, even virus detection data is being updated to the latest version.

It is recommended to follow the tips underneath that will work out to avoid damage from virus infections as supplement to anti-virus software.

-     Do not open suspicious e-mails even any virus is not detected; an anti-virus software might be unable to detect any virus newly emerged.

-     If the body of e-mail is uncertain, do not open its attached files; it is danger to open such files to confirm.

-     Do not open and delete immediately any e-mails that cannot be identified; it is unnecessary to open them.

In addition to the above mentioned, such countermeasures as utilization of your anti-virus software effectively (by updating virus detection data, setting of real time protection), and elimination of security holes by Windows Update, etc. can ensure higher security. We recommend that you conduct the integrated countermeasures for viruses.

Information with regard to anti-virus softwares (in Japanese)
http://www.ipa.go.jp/security/antivirus/vacc-info.html

Windows Update (Microsoft)
http://windowsupdate.microsoft.com/

The details are as follows;
- Computer virus Incident Report [Details]
- Unauthorized Computer Access Incident Report [Details]



Contact
Information-technology Promotion Agency IT Security Center (IPA/ISEC)
Tel:+81- 3-5978-7508

Fax:+81- 3-5978-7518

E-mail:






Term of Use


Copyright(c) Information-technology Promotion Agency, Japan. All rights reserved 2005