May 23, 2005
IT Security Center
Information-technology Promotion Agency, Japan (IPA)
A Large Number of W32/Mytob Virus' Variants Emerge!!
This is a summary of computer Virus/Unauthorized Computer Access Incident Reports for April 2005 compiled by IPA.
The reported number [1] in April was 4,440 , a decrease of 8.4%, compared with 4,846 reported in March. The virus detection number [2] was about 3.38M , an increase of 29.0%, compared with about 2.62M reported in March.
The reported number for the W32/Netsky was 1,009 : in each of the past 14 months running, the virus became the worst one. W32/Bagle with 330, W32/Mytob with 302 subsequently followed.
The W32/Mytob virus, initially reported virus in March, a large number of its variants emerged in a short period of time: the number of variants can count more than 70 kinds now (as of May 10.). It can be said that one variant emerges/day in simple calculation: however, most of all the variants had emerged in April; about 50 kinds (a larger number of W32/Mytob variants emerged in a short period of time than the initial emergence of the W32/Netsky which constitutes a large reported number.). Among a large number of the W32/Mytob variants, IPA detected the largest number of detection for Mytob.X variant which initially emerged in the beginning of April.

Detection Number
Classified by each Mytob Variant per Day
When variants emerge in short period of time, the potentiality to receive a new virus' variants becomes higher before a virus definition file (pattern file) responds in advance . Although a virus is not detected by anti-virus software, a virus infects if you open the attachment file to e-mail. Please be sure to conduct prevention measures continually such as update your anti-virus software frequently, do not open the attachment file to e-mail, etc.

In addition to such function which enlarges infection through the attachment files to e-mail, the W32/Mytob virus exploits security holes in Windows ; the virus infects if you simply connect to the network . The virus conducts following activities. Specifically, if the virus penetrates from a backdoor, there is likely to be such risks that cause various damages ; deletion of files , embedding malicious codes , etc.
Please be sure to conduct the following precautionary measures:
to prevent from infection of W32/Mytob virus .
In case an infection is discovered while checking by anti-virus software, be sure to remove the virus: Free removal tools online are being provided at the following sites. In case you are unavailable to access the sites mentioned above because of the W32/Mytob virus , we encourage you to take the following procedures: downloads removal tool utilizing uninfected computer, copy it on FD or to USB memory, then execute it on the infected computer.
The checking/removal method using free removal tools:
(Available for check-ups with or without W32/Mytob virus infection and for removal in case of infection)
The detection number of W32/Netsky reported was about 3.08M , an increase of 33.9%, from the detection number of 2.3M reported in March. Further, the whole detection number reported was about 3.38M, an increase of 29%, compared with the whole detection number of 2.6M reported in March.


(Both numbers in parenthesis are the reported number for previous month; the %s are the ratio taking over for the all viruses reported in this month.)
The total reported number in April was 48 , a decrease of about 19%, compared with 59 reported in March. Of actual damaged number was 24 , an increase of about 71%, compared with 14 reported in March.
The breakdown of the reported number for damage were intrusion with 8 , DoS with 8 , spoofing of mail address with 1 and others with 7 (masquerading with 1, embedding malicious codes (attempt) with 4 and suspicion of unauthorized network monitoring with 2.)
Of intrusion (8), there were 3 actual damage instances that altering the Web contents by penetrating the Web server. Of one could be assumed a cyber attack in relation to the Japan-China condition.
The fundamental cause of damage instance which alters Web pages by taking away administrative authority by an SQL injection attack against database system was following vulnerability: incompleteness of sanitizing inquiry data (query) from users. This might be assumed that the attacker intentionally mixed up malicious SQL statement into the inquiry data which alters the password of the user ID for the administrator. Not apply only to this instance, in such Web applications which require inputs from users upon sign-up, be sure to reconfirm legitimacy of sanitizing users' inputs.
In the damage instance that an ID and a password fraudulently used for an Internet auction , it might be assumed that individual information such as user's address, name and online payment information, etc. were also acquired: further damage enlargement might be occurred. Other than the reasons such as insufficient installation/management of user's ID/password; nowadays, it might be caused that a user's key operation can be read out by malicious codes. To prevent from such risks as far as possible, it should be refrained to input private information and/or browse such Home Pages which require you to input ID and/or password in advance by using such computers you do not use routinely . Using such computers that are furnished in public place; specifically, an Internet café is an example; it is better to refrain browsing the Home Pages which require you to sign-up in advance .
Damages by penetrating the Web servers to alter the contents and/or to embed malicious codes are repeatedly reported. It is likely to derive subsequent damages by installing fake contents to exploit phishing. Specifically nowadays, potentiality to receive indiscriminate cyber attacks is escalating because of political causes.
However, most of the damages introduced here can be blocked by fundamental countermeasures such as adequate ID/password management by an administrator, application of security patches for OSs and Web applications . Be sure to reconfirm server management to prevent from damage enlargement.
In the Internet Monitoring (TALOT2), unwanted (one-sided) access in April totaled 476,320 cases using 10 monitoring points: Unwanted (one-sided) access captured at one monitoring point was about 1,600 cases of accesses per day.
The environment for each monitoring point in TALOT2 is nearly equal to general users' Internet connection; it can be considered that the same amount of unwanted (one-sided) access may be received by the general internet users.
Followings are the countermeasures effective for general internet users' environment.
Current tendency shows that the developmental period for vicious methods which exploit security holes are getting shortened since when security holes (defects in security) are disclosed. The developmental periods taken were 6 months to several years around 2001, 10 days to several weeks around 2003.
Actually, vicious methods exploiting security holes of Windows (vulnerability of TCP/IP (MS05-019): publicized on April 13) have already appeared on April 28: in case you do not place certain countermeasures such as applying modification program, etc., you may suffer damage anytime.
Immediate application of modification programs and/or taking adequate preventive measures are the key countermeasures to prevent from damages before something happens when security holes are publicized. Please refer to the following sites to maintain your computer in up-to-date condition.
IT Security Center, Information-technology Promotion Agency
(IPA/ISEC)
Tel:+81-3-5978-7527
Fax:+81-3-5978-7518
E-mail: ![]()