Information-technology
Promotion Agency,
Japan
本文へ
IPA

TOP|Aplication|Contact us|Sitemap


Information-technology Promotion Agency, Japan
-japanese charactor-






IT Security Center

The Information-technology SEcurity Center (ISEC) is the center for promoting information security in Japan.









Japanese




Activities




Information Service Activities






Security Software Development Activities






CRYPTREC






IT SecurityAssurance







Organization







PGP key







RFCs







Mission Statement







Links







About IPA/ISEC







IPA TOP>IT Security Center Japanese TOP>IT Security Center English TOP>information




Computer Virus / Unauthorized Computer Access Incident Report [Summary]


November 24, 2005
IT Security Center
Information-technology Promotion Agency, Japan (IPA)

This is a summary of computer virus/unauthorized computer access incident reports for October 2005 compiled by IPA.

I. Computer Virus Incident Reports

  - (For further details, please refer to the attachment 1)

The detection number[1]  for virus was about 3.19M; 1.4%-decrease from about 3.23M compared with the detection number reported in September. In addition, the reported number[2] in October was 4,071; 13.8%-decrease from 4,723 compared with the reported number in September.

[1] Detection Number: Reporting virus counts (cumulative) found by a filer: For October, the reported number resulted in 4,071 upon aggregation of virus detection counts marked about 3.19M.

[2] Reported Number: Virus counts are aggregated: viruses of same type and variant reported on the same day are counted as one case number regardless of how many viruses or the actual numbers of viruses are found by the same filer on the same day.

The worst 1 detection number was W32/Netsky that reached at about 2.46M that constituted about 80% against the whole detection number for October; W32/Mytob, subsequently followed to W32/Netsky that reached at about 0.59M and W32/Bagle reached at about 0.04M.

(1) Be Careful with the Virus that Exploits Security Holes!!

Those W32/Licum and W32/Fambot that were initially reported to IPA in October exploit security holes in Windows to enlarge their infection. It is likely to infect if those computers that have security holes are simply connected to a network.

Virus Infects To Another Computer

An image that virus infects to another computer exploiting security holes


In addition, W32/Fanbot also functions as bots(*1): when infected, the computer will be directed from outside and is likely to be exploited as the source of spam(*2) or as a steppingstone to attack specific sites.

IPA has revised the leaflet for the countermeasures against bots that is already been publicized – please utilize it for your further references of your bots countermeasures.

The leaflet for the countermeasures against bots
http://www.ipa.go.jp/security/antivirus/shiori.html (in Japanese)

Number of security holes in Windows is being publicized in October: it is likely that those attacks and/or viruses emerge that exploit the security holes. As for the preventive measures to keep away infection damages, be sure to solve security holes.

Information for the emergent countermeasures publicized by IPA

Cumulative security update for Internet Explorer (MS05-052)
http://www.ipa.go.jp/security/ciadr/vul/20051012-ms05-052.html (in Japanese)

Vulnerability in DirectShow could allow remote code execution (MS-5-050)
http://www.ipa.go.jp/security/ciadr/vul/20051012-ms05-050.html (in Japanese)

Microsoft: Windows Update
http://update.microsoft.com/

(2) Detection Number of W32/Netsky Constitutes 80% Agaisnt the Whole Detection Number!

The detection number of W32/Netsky was about 2.46M: 3.9%-decrease from the detection number of about 2.56M reported in September; however, it still constitutes about 80% against the whole detection number. As for the detection number of W32/Mytob was being decreased awhile; however it turned to be increased about 16.2% from about 0.51M reported in September to about 0.59M reported in October.

Detection Number Of Virus

Reported Number Of Virus(Numbers in the parenthesis are the reported number and the %s for the constitution ratio against the whole reported number obtained from previous month.)



II. About Spyware

There has been spreading various types of spywares(*3); i.e. one can be downloaded to a computer when simply clicking to an image on an adult site, one can collect mailing addresses or can steal IDs and/or passwords for on-line games, etc.

About Spyware

Generally in most of cases, virus infection or spyware intrusion are not easily recognizable as they do not show clearly viewable symptoms. To prevent from such damages by spywares, be sure to conduct following countermeasures.

1. Utilize anti-spyware software to update definition files and check with or without of spyware.
2. Retain your computer always up-to-dated by applying modification programs frequently.
3. Be cautious with suspicious sites and/or questionable mails.
4. Enhance your computer’s security.
5. Back up necessary files for further security.

IPA has revised the leaflet for the countermeasures against spyware that is already been publicized where above mentioned measures are specifically interpreted – please utilize it for your further references of your spyware countermeasures.

The leaflet for the countermeasures against spywares
http://www.ipa.go.jp/security/antivirus/shiori.html (in Japanese)


III. Status for Reported Unauthorized Computer Access (incl. consultation)

  - (for further details, please refer to the Attachment 2)

Status for Reported/Accepted Unauthorized Computer Access

 

May

Jun.

Jul.

Aug.

Sept.

Oct.

Total for Reported (a)

94

24

53

41

31

22

 

Damaged (b)

11

22

10

12

16

15

 

Not Damaged (c)

83

2

43

29

15

7

Total for Consultation (d)

47

37

43

43

30

35

 

Damaged (e)

25

22

24

23

16

25

 

Not Damaged (f)

22

15

19

20

14

10

Grand Total (a + d)

141

61

96

84

61

57

 

Damaged (b + e)

36

44

34

35

32

40

 

Not Damaged (c + f)

105

17

62

49

29

17

(1) Status for Reported/Accepted Unauthorized Computer Access

The reported number for unauthorized computer access for October was 22; of 15 were the number for actually be damaged.


(2) Status for Acceptance of Consultation Relevant to Unauthorized Computer Access

The number of consultation relevant to unauthorized computer access was 35 (of 5 were also counted as the reported number); of 25 were the number for actually be damaged.

(3) Status for damage

The breakdown for the damage report were intrusion with 10, unauthorized mail relay with 1 and others (damaged) with 4. Although any of damages have not been realized this time, it should be cautious as there counted 4 cases of attacks and/or intrusion attempt to the port(*4) used for SSH(*5).

Damage Instances:

<Intrusion>
(i) Account exploitation by an unauthorized user

Detected one code seemed to be a backdoor when checking the fact of intrusion in the account(*6) for the UPS (uninterruptible power supply system) management. Further, existence of rootkit(*7) was likely to be considered, but the details were unknown as the logs(*8) were tactfully manipulated and the proofs were deleted. It is realized, however, that the administrative privilege was being available for the intruder as the account and the password for the UPS management have not yet been modified from the one initially be set as its default.

(ii) Intrusion by exploiting known vulnerabilities
When tracking logs, detected suspicious processes that connect to own servers. With subsequent study, it is realized that Perl script was being set by exploiting the vulnerabilities in XML-RPC libraries (PHP implementation) in the blog system being operated on the own web servers. Responded by upgrading the versions automatically prevent from such vulnerabilities.

(iii) Attacks to the port used for SSH (intrusion attempt)
Being conducted number of password cracking(*9) attacks to the port used for SSH from both domestic and from overseas; however, intrusion have never been allowed as the log-in for SSH is being obliged to the public key authentication(*10) system.

(iv) Unable to send mails as own mailing address is listed on the black list for unauthorized mail relay
Communicated that own mails have not been received by the other party. Study conducted and realized that the other party’s mailing server rejects all the mails since own mailing server had been allowing unauthorized mail relay.


IV. Status for Acceptance of Consultation

As with the October, there had been number of consultation relevant to receiving of billing fraud mails rightly after browsing an adult site so called “One-click billing-fraud” were subsequently followed from September. The consultation/reporting number is drastically increased in recent months <July: 28, August: 83, September: 80, October: 108>.

All the consultation number accepted by IPA

 

May

Jun.

Jul.

Aug.

Sept.

Oct.

Total

461

511

554

629

554

606

 

Automatic Response System

242

289

337

376

337

357

 

Telephone

118

143

128

179

144

165

 

e-mail

92

67

84

67

72

82

 

Fax, Others

9

12

5

7

1

2

* IPA consults/advises for computer viruses/unauthorized computer accesses as well as the other information concerning overall security issues
Mail: ?????????? for virus issues, ????????????for crack issues.
Tel.: +81-3-5978-7509 (24-hour automatic response)
Fax: +81-3-5978-7518 (24-hour automatic response)
*"Total": Includes "Total for Consultation(d)" of the Chart in the “III. Status for Reported Unauthorized Computer Access”.

* “Automatic Response System” : Accepted numbers by automatic response
* “Telephone” : Accepted numbers by the Security Center personnel

The instances for the main consultations were as follows:


(i) What if clicked at an adult site by mistake…? - Part1
Consultation:
Message saying “Thank you for your registration with us” is displayed when clicked an image on an adult site, and the “billing statement” icon was appended on the desktop screen. Since when the screen that prompts payment appears on and off with several minutes of intervals that interrupting the other operations. Is this the symptom of virus?
Response:
It can be considered that sort of malicious codes such as virus and/or spyware, etc. are embedded. Check with or without of virus to scan your computer by updating definition files of anti-virus software or by free-on-line-scan. If something unusual/suspicious is detected, be sure to delete it.

(ii) What if clicked at an adult site by mistake…? - Part2
Consultation:
While netsurfing, message saying “Thank you for your registration with us” is displayed when clicked an image on an adult site: did not pay attention to that as I have not registered. After that, a mail urges to pay came to my mailing address. Is my private information stolen by fraudulently be accessed as I have never communicated my mailing address to the party?
Response:
It can be considered that sort of malicious codes such as virus and/or spyware that steal mailing address information that is being set to your computer. This is not an unauthorized computer access activity. Conduct virus check and/or spyware check as its first step.

(iii) Unable to delete virus…?
Consultation:
Virus is detected while utilizing anti-virus software. Unable to delete the files which may be infected by virus and an error message saying “unable to delete as the file you’d designated are in use.” is displayed. How should I address with this situation?
Response:
Reason that you cannot delete the files is that the virus is currently in operation. Shut off the virus operation by utilizing the task manager, etc. first or restart the computer with safer mode; then try to delete it one more time.

(iv) Although virus has not yet been detected…?
Consultation:
My computer behaves obviously anomaly as each time I start my computer, it displays an alerting window written in English which I have never known and there is a tool bar on the Web browser I have never installed. Investigated with up-to-dated anti-virus software, but nothing is being detected. How should I address with this situation?
Response:
If your computer is one of Windows XP or Me types of computers, you may set back the status before that the computer behaves differently by utilizing “Restore System” functions. In case of Windows XP, you can conduct following processes: “Start” – “All the Programs” – “Accessories” – “System Tools” – “Restore System”.


V. Accessing Status Captured by the Internet Monitoring in October
  - (for further details, please refer to the Attachment 3)


In the Internet Monitoring System (TALOT2), unwanted (one-sided) access in October totaled 544,645 cases using 10 monitoring points: unwanted (one-sided) access captured at one monitoring point was about 1,757 cases of accesses from about 402 sources per day.

Since the environment for each monitoring point in TALOT2 is nearly equal to general users’ Internet connection; it can be considered that the same amount of unwanted (one-sided) access may be received by the general internet users. In another words, your computer is being accessed by 4 to 5 cases of accesses which are considered to be unauthorized from 402 unknown people everyday in average.

Compared with the statistics resulted in September, the graph shows increase in number of access and decrease in source number of access as below.
Number Of Access

Notes for this Month

- Those unauthorized accesses which may target vulnerability in Windows are unchangeably many. Most of those accesses may be considered to be accessed by computers infected by bots. Accesses to port 135 (TCP) and port 445 (TCP) that have significantly large number in access target to vulnerabilities in Windows.

- System administrator should confirm if there are any of vulnerabilities or not and always ensure the system to be up-to-dated.

- As for general computer users, we encourage you to utilize anti-virus software, etc. to prevent from bots infection and to maintain your computer always up-to-dated.

- Those accesses that forcibly display spam-like pop-up messages to the computer screen are increasing; it is considered it may not be caused of actual damages, however. They can be prevented by router set ups and/or firewalls (personal firewalls), be sure to review your network connection environment one more time if such messages are displayed.


VI. Reminder for This Month: “Methodology for One-Click Billing Fraud is Getting Sophisticated!!”

- Are you sure you can count on your click?! -

You will be billed when you simply clicked an image at an adult site so called “One-click billing fraud” damages are drastically been increasing in the past months. Consultations relevant to such “One-click billing fraud” rushed to IPA are eventually exceeded 100 cases per month. <July: 28, August: 83, September: 80, October: 108>

The methodologies are approximately separated into two types:

A: One case which simply displays threat wordings on the screen such as “Thank you for your registration with us. The charge for the site is XXjpy. Your IP address is X.X.X.X. and your provider is XX.”, etc.

B: Another case is displaying a billing statement on the desktop screen on and off with the several minutes of intervals caused by malicious codes being embedded.

Currently, such sophisticated methodologies described in B above are very much remarkable for which are not able to be detected by anti-virus software and/or anti-spyware. In that case, it is probably be difficult to explore and delete the malicious codes: in the worst case, therefore, the last resort is to thoroughly initialize your computer. Then, is there any way that we can protect invasion of such codes? To tell you the truth, in many cases, those malicious codes are allowed by you to download.

Do not easily click “OK” or “Execute” to the inquiry screen. If you do, a “Billing Statement” screen may be appended on your screen rightly after you clicked. Be sure to read what the message says before you will be trapped; if you had “suspicious feel” even a bit, it is wise not to go forward. Click an “X” at the upper right hand side corner and close the window.


Reference:
IPA - Response in case you are billed for your simple click
http://www.ipa.go.jp/security/ciadr/oneclick.html (in Japanese)

IPA - 7 tips for virus countermeasures for PC users
http://www.ipa.go.jp/security/antivirus/7kajonew.html (in Japanese)

IPA - 5 tips for spyware countermeasures for PC users
http://www.ipa.go.jp/security/antivirus/spyware5kajyou.html (in Japanese)

“Various Statistics Information Provided by Other Organizations/Vendors are Publicized in the Following Sites”
@police: http://www.cyberpolice.go.jp/ (in Japanese)
Trendmicro: http://www.trendmicro.com/jp/ (in Japanese)
McAfee: http://www.mcafee.com/jp/default.asp (in Japanese)

Interpretation for Glossaries

(*1) bot :
A kind of computer virus. It was created to manipulate an infected computer from outside through a network (the Internet).

(*2) spam :
It is called junk mail, bulk mail or is simply called “unsolicited mail”. It refers to mass mails including personal or religious issues to be sent unspecified majority for advertising and/or harassing purposes irrespective of commercial intent.

(*3) spyware :
One of software which acquires information by fraud such as user’s individual information, access archives, etc. to sends them out automatically to third person, third party, etc.

(*4) Port :
A window interfaces each service within a computer used for exchanging information with outsides. Numbers from 0 to 65535 are used for the ports so that they are also called Port Number.


(*5) SSH(Secure Shell) :
A protocol or a program used for log-in to another computer via the network, execute commands by a computer in remote and transfer files to another computer. Since data via the network is encrypted, a series of operations through the Internet can be done safely.

(*6) Account :
The privilege which allow a user to use resources on a computer or the network; it also implies the ID necessary upon use.

(*7) rootkit :
It refers to a software package used by an attacker after he/she had penetrated to a computer. Generally, a log alteration tool, a backdoor tool and an altered system command group are included.

(*8) log :
Record of the use of a computer or data communication. Generally, operator’s ID, time and date for the operation, contents of operation, etc. are recorded.

(*9) Password Cracking :
Searching of anyone else’s password by conducting observational study, etc. The methods include exhaustive search attack, dictionary attack and there exist certain codes for cracking as well.

(*10) Public Key Authentication :
Methodology to authenticate individual user by a pair of public key and secret key. The public key is managed by a server side and the secret key is managed individually to authenticate user’s legitimacy.

- Attachment 3 Observation Status by Internet Monitoring System (TALOT2)

   


Contact
IT Security Center, Information-technology Promotion Agency (IPA/ISEC)
Tel:+81-3-5978-7527

Fax:+81-3-5978-7518

E-mail:






Term of Use


Copyright(c) Information-technology Promotion Agency, Japan. All rights reserved 2005