Information-technology
Promotion Agency,
Japan
$BK\J8$X(B
IPA

TOP|Aplication|Contact us|Sitemap


Information-technology Promotion Agency, Japan
-japanese charactor-






IT Security Center

The Information-technology SEcurity Center (ISEC) is the center for promoting information security in Japan.









Japanese




Activities




Information Service Activities






Security Software Development Activities






CRYPTREC






IT SecurityAssurance







Organization







PGP key







RFCs







Mission Statement







Links







About IPA/ISEC







IPA TOP>IT Security Center Japanese TOP>IT Security Center English TOP>information




Computer Virus / Unauthorized Computer Access Incident Report [Summary]


September 22, 2005
IT Security Center
Information-technology Promotion Agency, Japan (IPA)

Your Computer May be Infected by BOT while You are not Realized!

 

This is a summary of computer Virus/Unauthorized Computer Access Incident Reports for August 2005 compiled by IPA.

I. Reporting Status of the Computer Virus – (for further details, please refer to Attachment 1)

The detection number [1] for virus was about 3.37M ; an 11.0% decrease from about 3.79M compared with the detection number in July. In addition, the reported number [2] in August was 4,470 ; a 1.5% decrease from 4,536 compared with the reported number in July.

The detection number of W32/Netsky reached about 2.67M (Reported number = 999 ) which constituted about 80% against the whole detection number for August and became the worst 1 virus for continuum of 18 months. W32/Mytob with about 0.57M ( 536 ), W32/Bagle with about 0.03M (303) and W32/Mydoom with about 0.03M (352) subsequently followed.

Additionally, in response to the emergence of multiple types of worms which exploit vulnerabilities (security holes) in Windows, IPA emergently announced “Information of Security Alert” on its home page in August .

1. Multiple Types of Worms which Exploit Vulnerabilities in Windows Emerged!

Those worms ( W32/Zotob , W32/IRCbot , W32/Bobax ) exploiting vulnerabilities in Windows which publicized by Microsoft on August 10 emerged on after another. These worms may infect if you simply connect to the Internet; some of W32/Zotob and W32/Bobax variants may also infect through attachment files to e-mails. In addition, these worms also function as bots (*1) : when infected, your computer conducts attack against specific sites by commands from remote, being used as the source of spams or may be used as a steppingstone to attack the other computers .

[1] Detection Number:   Reporting virus counts (cumulative) found by a filer: For August, the reported number resulted in 4,470 upon aggregation of virus detection counts marked about 3.37M.

[2] Reported Number:    Virus counts are aggregated: viruses of same type and variant reported on the same day are counted as one case number regardless of how many viruses or the actual numbers of viruses are found by the same filer on the same day.

Bot network

Mechanism of Bots (Example)

Source: “Computer Security – The Tendency in 2004 and the Countermeasures in Future”

http://www.ipa.go.jp/security/vuln/20050331_trend2004.html (in Japanese)

References:

Multiple Types Worms Exploiting Vulnerability (MS05-039) in Windows of Microsoft Emerge!!

http://www.ipa.go.jp/security/ciadr/vul/20050817.html (in Japanese)

Information of Bot Countermeasures

http://www.ipa.go.jp/security/antivirus/bot.html (in Japanese)

The history of emergence of worms that exploit vulnerabilities after announcement of the vulnerabilities in Windows is as follows:

Time and Date

History

August 10, 2005

Announcement of security modification program (MS05-039) for Windows.

on or after

August 12, 2005 -

Began publicizing exploiting codes that exploit vulnerability of MS05-039 on mailing lists and on the Internet.

on or after

August 15, 2005

The worm which exploits vulnerability of MS05-039 emerged.

As shown, the term for the emergence of worms exploiting vulnerabilities after publication of the vulnerabilities is getting significantly shortened. If the vulnerabilities are being modified, however, the likelihood of facing damage can be lowered. It is important to solve the vulnerabilities by conducting Microsoft Update, etc. as earlier as possible.

In addition, be sure to prevent infection from outside by activating virus countermeasure software and to confirm with or without of virus infection by checking within your computer on once a week basis.

Reference Information:

Microsoft: Microsoft Update    http://update.microsoft.com/

Symantec:    http://www.symantec.com/

Trendmicro:    http://www.trendmicro.com/vinfo/

McAfee:    http://vil.nai.com/VIL/newly-discovered-viruses.asp

2. The Detection Number of W32/Netsky Constitutes about 80% Against the Whole Detection Number!

The detection number of W32/Netsky was counted about 2.67M : a 5.8% decrease from about 2.84M reported in July. In addition, the detection number of W32/Mytob was counted about 0.57M : a 28.8% decrease from about 0.8M reported in July.

Virus detection numberVirus reported number

(Both numbers in parenthesis are the reported number for previous month; the %s are the ratio taking over for the all viruses reported in this month.)

II. About Spyware

Not only viruses, but also quite a few spyware (*2) (keylogger (*3) , etc.) or the other malicious codes (backdoor, etc.) are being distributed: you are to be careful by taking following tips not to introduce them from attachment files to e-mails or from Home Pages by mistake.

1)   Utilize anti-spyware software (available from most of PC stores)

2)   Avoid accessing suspicious Web sites

3)   Setup higher security level on your browser

Damage Instances (Example)

Malicious Codes Applied, etc.

Collects login IDs, passwords and/or mail addresses for online games and send them outside.

Trojan/Lineage

Trojan/Myftu

Changes browser start page to malicious Web site or connects to a different site with the one tries to access.

Trojan/StartPage

Trojan/Websearch

Downloads malicious codes from a certain Web site and hijacks target computer (s) by installing the codes.

Trojan/Downloader

Trojan/Dropper

Steals system information and/or password from a penetrated computer to send them outside.

Trojan/PWSteal

Trojan/IRC

As for Trojan/Myftu , if you click certain images on one adult site, etc. it will be automatically downloaded to your computer and your mail address will be collected. When infected, it sends bill (s) to the addresses collected. Such case is confirmed that it is being used for billing fraud purpose.

Reference:

5 Points to Fight Against Spyware for PC Users

http://www.ipa.go.jp/security/antivirus/spyware5kajyou.html (in Japanese)

III. Status for Reported Unauthorized Computer Access (incl. consultation) (for further details, please refer to the Attachment 2)

 

Status for Reported/Accepted Unauthorized Computer Access

 

April

May

June

July

August

Total for Reported (a)

48

94

24

53

41

 

Damaged (b)

24

11

22

10

12

 

Not Damaged (c)

24

83

2

43

29

Total for Consultation (d)

28

47

37

43

43

 

Damaged (e)

13

25

22

24

23

 

Not Damaged (f)

15

22

15

19

20

Grand Total (a + d)

76

141

61

96

84

 

Damaged (b + e)

37

36

44

34

35

 

Not Damaged (c + f)

39

105

17

62

49

Shift in Consultation Number Accepted by IPA

 

April

May

June

July

August

Total

553

461

511

554

629

 

Automatic Response System

374

242

289

337

376

 

Telephone

115

118

143

128

179

 

e-mail

61

92

67

84

67

 

Fax, Others

3

9

12

5

7

*   IPA consults/advises for computer viruses/unauthorized computer accesses as well as the other information concerning overall security issues (Tel. # 03-5978-7509 (24-hour automatic response))

*   ”Automatic Response System”: Accepted numbers by automatic response

“Telephone”: Accepted numbers by operators

 

1. Status for Reported Unauthorized Computer Access

Number of reported for August was 41: of 12 was the number for actually damaged.

2. Status for Acceptance of Consultation Relevant to Unauthorized Computer Access

The number for consultation relevant to unauthorized computer access was 43 (of 5 was also counted as reported number): of 23 was the number for actually damaged.

3. Status for Damage

The breakdown for damage report were intrusion with 8 , DoS Attack with 2 and other (damaged) with 2 . In addition, the consultation includes a number of such instances that “billing fraud” e-mail was sent after browsed an adult site which followed by previous month <please refer to the damage instance (v)>.

Damage Instances:

<Intrusion>

i) Intrusion into network devices

Password was being changed without asking and/or log (*4) recording function was being disabled by intrusion into several network devices includes router, etc. Not only from internal network, but also from outside telnet (*5) connection to a router from outside was available: moreover, the password was used not only for login, but also was used as administrator privilege, it can be assumed to allow intrusion by password attack conducted to the telnet connection from outside and the router's initial setup might have been changed by the administrator privilege.

ii) Intrusion to servers rented for a certain period of time

A Web site was being in operation by renting a lot within a commercial rental server. One foreign site which was operated by a strange user was attacked by exploiting vulnerability of cgi (*6) and the administrator privilege for the rental server itself was stolen. As the result, those Web contents of all users on that Web server were tampered. About a month later, an IRC (*7) program was started using that server's system administrator privilege. An investigation conducted and realized that the server had been intruded several times. It is likely that the users' administrative information was stolen when initially intruded into that server and subsequently penetrated by using a user's account from which relatively easily assumable password was set. Such events were detected by alerts of the full-time monitoring system for that server.

<DoS>

iii) Password attack from both internal and outside networks

Being attacked by Password attacks of several hundreds to several thousands of accesses for some minutes from both internal and outside networks. Although intrusion was prevented, a server was overloaded so that its performance was tentatively, but significantly lowered.

<Others>

iv) Intrusion of spyware

Although installed an anti-virus software, but sometimes encountered troubles in sending/receiving e-mails or the anti-virus software was anomaly behaved. An investigation conducted by using a packet monitoring software, it is realized that some packets were sent out unnaturally from such computer nothing in operation. Installed an anti-spyware software to scan and several types of malicious codes were detected.

vi) Downloading of malicious codes at an adult site

Visited a dating site or an adult site by chance. When clicked an image on the screen, it displayed age-confirmation asking if the reporter is 18 or over. He/she clicked “yes”, again the display changed to the similar one shown when some data is being downloaded. Further, it displayed his/her mail address along with the message saying “thank you for your sign up with us”. After that, a billing screen for the site usage appeared several minutes of intervals and collection mail for the bill came. Nothing was detected when scanned using anti-virus software.

 

IV. Accessing Status Captured by the Internet Monitoring in August

In the Internet Monitoring (TALOT2), unwanted (one-sided) access in August totaled 497,340 cases using 10 monitoring points: unwanted (one-sided) access captured at one monitoring point was about 1,604 cases of accesses from about 439 sources per day.

The environment for each monitoring point in TALOT2 is nearly equal to general users' Internet connection; it can be considered that the same amount of unwanted (one-sided) access may be received by the general internet users. In another words, your computer is being accessed by 3 - 4 cases of accesses which are considered to be unauthorized from 440 unknown people everyday in average .


Internet monitoring

Notes for this Month

-   Those unauthorized accesses which may target vulnerability in Windows are unchangeably many. Most of those accesses may consider to be accessed by computers infected by certain worms. Considering that current status indicating that the worm called bot is disseminated, it is probable that those worms conducting such access should be bot.

 

-   Those accesses to 135 (TCP) and 445 (TCP) that especially have a number of accesses may target legacy vulnerabilities in Windows: most of those accesses are sent out from domestic; it is, therefore, assumed that bot infection within domestic is getting enlarged.

 

-   System administrators should confirm with or without of vulnerability in servers and be sure to maintain them always up-to-dated.

 

-   General computer users should maintain their own computers always up-to-dated to prevent from bot infection. We also encourage them to effectively use anti-virus software, etc.

 

For further details relevant to the above mentioned information, please refer to the following site.

Attachment 3 – The Internet Monitoring Captured by TALOT2

 

V. Reminder for this Month: “Threat by BOT!!”

- Have Your Computer Already been Penetrated While You are not Realized? -

Bot is a kind of computer virus (code) created to infect a computer to manipulate a targeted computer from outside through network (the Internet).

When infected, the bot virus itself communicates with controlling server outside through the network and sends spam mails and/or conducts DoS attacks by commands from outside. Further, it upgrades itself and it even changes the controlling server.

Those multiple numbers (it may become several thousands, several tens of thousands) of bots under the same controlling server organize a network by centering that controlling server, they are called a bot network.

If such bot network is used to send massive spam mails purposing for phishing or to conduct DDoS attacks to specific sites, it will become an enormous threat.

To prevent from infection of viruses such as bot and to avoid being from a casualty to victimizer, be sure to conduct following countermeasures:

 

1)   Install anti-virus/anti-spyware software, update definition files, etc. and conduct virus checks regularly

2)   Do not easily open the attachment files to unknown mails

3)   Refrain from browsing suspicious Web sites

4)   Effective use of the internet options such as brower, etc.

5)   Do not click tempting links such as spam mails

6)   Use of routers/installation of personal firewalls for the internet connection and their adequate setups/operations

7)   Always updates OSs and applications on a computer by conducting Windows Update, etc.

 

For further details, please refer to the following sites.

Information of Bot Countermeasures

http://www.ipa.go.jp/security/antivirus/bot.html (in Japanese)

5 Points to Fight Against Spyware for PC Users

http://www.ipa.go.jp/security/antivirus/spyware5kajyou.html (in Japanese)

“Various Statistics Information Provided by Other Organizations/Vendors are Publicized in the Following Sites”

@police:    http://www.cyberpolice.go.jp/ (in Japanese)

Trendmicro:    http://www.trendmicro.com/jp/ (in Japanese)

McAfee:    http://www.mcafee.com/jp/default.asp (in Japanese)

 

Glossary Interpretation

(*1) bot

A kind of computer virus. It was created to manipulate an infected computer from outside through a network (the Internet).

(*2) spyware

One of software which acquires information by fraud such as user's individual information, access archives, etc. to sends them out automatically to third person, third party, etc.

(*3) key logger

A program which records information input from a keyboard.

(*4) log

Record of the use of a computer or data communication. Generally, operator's ID, time and date for the operation, contents of operation, etc. are recorded.

(*5) telnet

On a networking environment such as the Internet, a program or a communication protocol which is used to remotely manipulate a computer connected to a network from a terminal at hand.

(*6) cgi (Common Gateway Interface):

The mechanism that the Web server operates outside programs on the server upon client's request and sends back the client its outcome.

(*7) IRC (Internet Relay Chat):

It refers to a chat system, a real-time conversation session on-line between/among the Internet users. By accessing to the IRC servers using exclusive software, the users can be provided such services that exchange messages among a number of the Internet users. It can also be used as file communication.

- Attachment 3 “ Observation Status by Internet Monitoring System (TALOT2) ”

   


Contact
IT Security Center, Information-technology Promotion Agency (IPA/ISEC)
Tel:+81-3-5978-7527

Fax:+81-3-5978-7518

E-mail:






Term of Use


Copyright(c) Information-technology Promotion Agency, Japan. All rights reserved 2005