Information-technology
Promotion Agency,
Japan
$BK\J8$X(B
IPA

TOP|Aplication|Contact us|Sitemap


Information-technology Promotion Agency, Japan
-japanese charactor-






IT Security Center

The Information-technology SEcurity Center (ISEC) is the center for promoting information security in Japan.









Japanese




Activities




Information Service Activities






Security Software Development Activities






CRYPTREC






IT SecurityAssurance







Organization







PGP key







RFCs







Mission Statement







Links







About IPA/ISEC







IPA TOP>IT Security Center Japanese TOP>IT Security Center English TOP>information



 

Unauthorized Computer Access Incident Report for 1st half of 2005 (January to June)


July 28, 2005
IT Security Center
Information-technology Promotion Agency, Japan (IPA)



 

This is a summary of Unauthorized Computer Access Report Status for the 1st half (January to June) of 2005 aggregated by IPA.

As for the current tendency summarized from the reporting status for the first-half of 2005:

-   a number of nondiscriminatory attacks to every computers including the computers for home use;

-   damages caused by intrusion by exploiting vulnerability of Web application tend to increase.

Please refer to the following sites for continual security countermeasures by conducting thorough security set ups for your computer and operations management on daily basis.

-   “Practical Information for Information Security Countermeasures” for end-users/home-users (in Japanese)

http://www.ipa.go.jp/security/awareness/end-users/end-users.html

 

-   “Practical Information for Information Security Countermeasures” for Administrators (in Japanese)

http://www.ipa.go.jp/security/awareness/administrator/administrator.html


1. Reported Number

The reported number for the first-half (January to June) 2005 totaled 319 ; the gross reported number was increased about 18% and the actual number of damage was about 2.5 times higher.

Shift in UCA reported number by half of year

*    The numbers in the parenthesis in the above graph show actual reported number against the gross reported number.

2. Classified by Type of Incident

Of 319, the gross reported number rushed to IPA, “ access probe (attempt) ” with 223 (previous: 231) reports constituted 69.9% against the whole. In addition, reports for actual damage was 89 (previous: 36) which constituted 27.9% against the whole. The total of the reports for actual damage include “intrusion”, “unauthorized mail relay”, “worm probe”, “DoS”, “source address spoofing” and “others (damaged).

Shift in UCA reported number by type by half of year

  Cause

First-half 2003

Last-half 2003

First-half 2004

Last-half 2004

First-half 2005

Intrusion

36

17.3%

28

14.1%

18

5.5%

25

9.3%

46

14.4%

Unauthorized Mail Relay

4

1.9%

5

2.5%

3

0.9%

0

0.0%

5

1.6%

Infection w/Worm

1

0.5%

4

2.0%

0

0.0%

0

0.0%

3

0.9%

DoS

4

1.9%

4

2.0%

4

1.2%

0

0.0%

14

4.4%

Source Address Spoofing

7

3.4%

11

5.5%

4

1.2%

7

2.6%

2

0.6%

Others (Damaged)

13

6.3%

9

4.5%

7

2.2%

4

1.5%

19

6.0%

Access Probe (Attempt)

123

59.1%

116

58.3%

284

87.4%

231

85.9%

223

69.6%

Worm Probe

18

8.7%

21

10.6%

5

1.5%

2

0.7%

2

0.6%

Others (Not Damaged)

2

1.0%

1

0.5%

0

0.0%

0

0.0%

5

1.6%

Total

208

 

199

 

325

 

269

 

319

 
Note:   the shaded parts are the incident types actually damaged.

%s shown above are rounded at the 2 nd place of arithmetic decimal points, the total may not be made 100%, accordingly.

3. Cause for Damage

With regard to the reported number for actual damage (89), the breakdown for the cause were: of 13 with insufficient ID/password management , of 16 with use of older version/not yet applied any patches and of 8 with insufficient settings , etc. .

Shift in UCA reported number by cause by half of year

*    As for the report that has multiple damage cause, the report is aggregated with its main cause filed as 1 case/report.

Damage Instances:

 

[Intrusion]

1.   Detected penetration to the Web server and a certain mechanism to download malicious codes upon a user simply browses the Web pages was being embedded. While conducting the study for the altered parts, probes of alteration on database have been detected and eventually, the sites should have been closed tentatively.

2.   Penetrated to the Web server by being deprived the privilege of administrator fraudulently to set up files maliciously and/or alter the Web pages. This was the cause of SQL Injection attack against the database system.

3.   Penetrated to the Web server by exploiting vulnerabilities of the software for the Web server and/or by insufficiently managed password, fake Web contents for phishing were set.

4.   Penetrated by exploiting vulnerability in “phpBB”, the e-bulletin program using PHP, the forum logs and the site templates were altered/deleted.

5.   Penetrated by conducting a dictionary attack against the ID and the password for SSH (Secure Shell) and/or an attack which exploits vulnerability in OS and administrator privileged password was changed and the files were altered as the steppingstone to conduct attacks outsides.


[DoS]

6.   The servers have been downed since unauthorized computer access to the ports used by SSH was repeatedly occurred.

7.   Study has been conducted in response to the communication failure; it is realized to encounter the SYN Flood Attack with more than 1M of packets per second at minimum. The router usage rate is reached to 100% and communication became unavailable. It could not be completely addressed although fully utilizes the router's countermeasures against DoS was fully utilized: in the event, by asking providers discard all the packets to the corresponding IP addresses: then the communication is recovered.

[Spoofing]

8.   Logged in a certain individual's Home Page by spoofing user ID and password hosted by service provider and its contents, images, etc. are tampered/deleted.

9.   Logged in auction site by masqueraded third person as duly user, altered contact address by strange mail address to put up product or placed a bid without asking.

10. Fraudulently logged in to on-line game service provided by the Internet and money and items used in the game were stolen.

[Others]

11. Accessed one of adult sites and easily clicked “yes” at the inquiry screen asking permission to download a certain code; then malicious code was installed and/or a billing screen for the usage fee for strange sites were displayed.

4. Classification by Reporter

As for the breakdown for classification by reporters, the report from individual user constitutes 80% which retains higher ratio.

Shift in UCA reported number by reporter by half of year

Note:   The %s shown above were rounded at the first place of the arithmetic point; it may not make 100% in total.



Contact
IT Security Center, Information-technology Promotion Agency (IPA/ISEC)
Tel:+81-3-5978-7527

Fax:+81-3-5978-7518

E-mail:






Term of Use


Copyright(c) Information-technology Promotion Agency, Japan. All rights reserved 2005