Information-technology
Promotion Agency,
Japan
$BK\J8$X(B
IPA

TOP|Aplication|Contact us|Sitemap


Information-technology Promotion Agency, Japan
-japanese charactor-






IT Security Center

The Information-technology SEcurity Center (ISEC) is the center for promoting information security in Japan.









Japanese




Activities




Information Service Activities






Security Software Development Activities






CRYPTREC






IT SecurityAssurance







Organization







PGP key







RFCs







Mission Statement







Links







About IPA/ISEC







IPA TOP>IT Security Center Japanese TOP>IT Security Center English TOP>information




Computer Virus / Unauthorized Computer Access Incident Report [Summary]


December 21, 2004
IT Security Center
Information-technology Promotion Agency, Japan (IPA)


Fully Check for Security Countermeasures Toward End of the Year!!

This is a summary of Computer Virus / Unauthorized Computer Access Incident Reports for November 2004 compiled by IPA

I. Computer Virus Incident Reports

The reported number [1] in November was 5,308 for which increased 14.1% compared with 4,654 marked in October and again exceeded over 5,000. While virus detection number [2] was about 2,916,000 for which decreased 6.5% compared with about 3,120,000 marked in October.  

For W32/Netsky , 1,315 cases were reported for November which became the worst 1 reported number for the past 9-month' continuum. W32/Bagle for 654 and W32/Mydoom for 394 were subsequently followed.

[1]   Reported Number: Upon aggregation of virus counts, same kind and its variants reported in a same day are counted as 1 case even how many are found by a same filer in a same day.  

[2]   Detection Number: Upon reporting virus detection counts (cumulative) found by a filer. For November, the reported numbers resulted 5,308 upon aggregation of virus detection counts marked about 2,910,000.

1. The New Virus W32/Bofra Infects Instantly Upon Clicking Links

W32/Bofra virus newly emerged in November is the virus infecting instantly upon clicking links attached to mail body being sent out. In typical virus mail, it infects and expands by opening attachment to mail, but the W32/Bofra virus does not carry its attachment files.  

Do not feel ease yourself, however, even any files are not attached and prevent to click any links unnecessarily . In addition, do not fail to update your virus definition files within virus protection software to check your mails received.

 When infected, W32/Bofra virus collects addresses from address books, etc. and sends out virus mails to acquired addresses. Further, it creates backdoor to those computers infected for penetration from outside. In case infected, it is necessary to response with a removal tool.

Bofra Virus Mail

Example of W32/Bofra virus mail

2. W32/Netsky Tends to Decrease, but still Maintain High Level!

The detection number for W32/Netsky in November was about 2,280,000 that the tendency decreases in number comparing with about 2,710,000 in October and about 3,000,000 in September. However, detection number for W32/Bagle in November was about 340,000 which more than tripled comparing with the detection number of 100,000 in October. Such increase assumed to be emergence of new variant.

 Overall of virus detection number is being maintained approx. of 3,000,000 and the status of spreading retains; it is also assumable of new virus or another variant's emergence so that handling mails should be sufficiently taken care of.

Virus Detection Number

Virus Reported Number

(Both numbers in parenthesis are the reported numbers in the previous month and the %s are the ratio taking over for the whole viruses.)

II. Status for Reported Unauthorized Computer Access

Reported numbers for November was 28 for which decreased about 47.2% comparing with 53 marked in October. However, damage report was 8 for which increased from 3 marked in October. Breakdown for the damage report were 5 for intrusion, 1 for spoofing mail address, 2 for others (damage from downloading of malicious codes, etc.).

Case Example:

-   Fraudulently be logged in to computer from outside by exploiting security holes since security patches have not been applied and unnecessary services are in operation.

-   Penetrated into Web server and the pages are being modified because of insufficient setting of accessing right.

 You are to again confirm whether ID and/or password are adequately managed, security hole is solved, service is not unnecessarily in operation and accessing authorization appropriately be given as well.  

Open Ended Damages by Browsing Home Pages

Here in IPA, many of following consultation supposed to be damage from browsing Home Pages are received.

-   Bowser's starting page is being changed to suspicious page written in English and unable to return to the original page even changing its setting.

-   Upon conducting virus check, more than 10 kinds of virus and Trojan Horses, etc. are detected.

Of case examples similar to above, quite a few should go initialization process as there's no way to recovery. As previously mentioned, it is necessary to execute following countermeasures together with periodic virus check accordingly.

-   Applying security patches (modification program) such as basic OS, browser, etc.

-   Installation of anti-virus software

-   Change of settings in browser

Further, it is important to follow principles such as:

-   do not download and execute such programs unnecessarily which are published as convenient tool and/or program on unreliable site;

-   do not browse suspicious site;

-   do not click any Home Page Address (link) easily published on Home Page or mail;

as basic countermeasures.

(Reference)
“Increase Your Browsing and Security Safety” (in English)
http://www.microsoft.com/security/incident/settings.mspx

III. Reminder for This Month: “ Fully Check for Security Countermeasures Toward End of the Year

Be Ease with Full of Countermeasures on New Year's Eve

Toward New Year's Eve, exchanging mails such as e-Xmas cards and e-new year's greetings, etc. tends to increase and thus, it is likely to emerge virus/hoax mails spoofed to be such e-greetings.

Recent viruses' infection methodology is getting artfulness such as masquerading to be error mail, camouflaging to be icon, etc. Further, a new methodology called Phishing [3] is also emerged; it is not directly related to virus, though.

It is getting important to pay careful attention as well as to execute technical measures such as utilizing anti-virus software, fixing security holes to prevent such suffering by easily be fooled.

(Reference) Technical measures:

“7 points for virus countermeasures for computer users” (in Japanese)
http://www.ipa.go.jp/security/antivirus/7kajonew.html

“5 tips for handling attachment file to e-mail” (in Japanese)
http://www.ipa.go.jp/security/antivirus/attach5.html

“Windows Update”
http://windowsupdate.microsoft.com/

[3]Camouflage Fraud using Web.

What is Phishing?

An act by masquerading to be an e-mail from a banking corporation, etc. to have the recipient access to false Home Pages to have them input private financial information (credit card numbers, ID, password, etc.), etc. to acquire private information fraudulently.

Until this point, such fraudulent mails are mostly written in English, however, its Japanese version is also emerged from November for which likely cause newer damage. If you receive similar mails mentioned above, please do not fail to conduct countermeasures to confirm with already endorsed telephone numbers and/or Home Pages other than using contact address and/or URL written onto suspicious mail whether the mail is real or not since requiring your credit card number and/or expiration date in such form is unlikely to be happened.

To System Administrators: - Asking to Conduct Countermeasures Towards Holiday Season Between New Year's Eve and A New Year –

Between New Year's Eve and New Year, it is assumable that system administrators are out of office so that once damages such as virus/worm infection, Web alteration and/or unauthorized mail relay would be happened, it is likely to enlarge damaged area while you were out .

Please refer to countermeasures underneath to reconfirm routine security countermeasures and to take necessary countermeasures for formulating thoroughgoing measures.

“Practicing Information for Information Security Countermeasures” (in Japanese)
http://www.ipa.go.jp/security/awareness/administrator/administrator.html

The details are as follows;
- Computer virus Incident Report [Details]
- Unauthorized Computer Access Incident Report [Details]

   


Contact
IT Security Center, Information-technology Promotion Agency (IPA/ISEC)
Tel:+81- 3-5978-7527

Fax:+81- 3-5978-7518

E-mail:






Term of Use


Copyright(c) Information-technology Promotion Agency, Japan. All rights reserved 2005