Information-technology
Promotion Agency,
Japan
$BK\J8$X(B
IPA

TOP|Aplication|Contact us|Sitemap


Information-technology Promotion Agency, Japan
-japanese charactor-






IT Security Center

The Information-technology SEcurity Center (ISEC) is the center for promoting information security in Japan.









Japanese




Activities




Information Service Activities






Security Software Development Activities






CRYPTREC






IT SecurityAssurance







Organization







PGP key







RFCs







Mission Statement







Links







About IPA/ISEC







IPA TOP>IT Security Center Japanese TOP>IT Security Center English TOP>information




Computer Virus / Unauthorized Computer Access Incident Report [Summary]


February 20, 2006
IT Security Center
Information-technology Promotion Agency, Japan (IPA)

This is a summary of computer virus/unauthorized computer access incident reports for January, 2006 compiled by IPA.

 

Reminder for the Month: “ Malicious Codes may be Installed if Ignores Alert!!

- Don't you Neglect an Alert, do you? -

Current tendency mostly can be seen is frequent consultations about such damages: malicious codes were installed automatically and/or infected by virus upon opening attachment files to e-mails by clicking links and/or images written on blogs/e-bulletin board while browsing home pages. In addition, even installed anti-virus software or software for personal firewalls, such damages caused by virus infection, information leakage, etc. are being happened almost open-ended.

There was an instance about “One-click billing fraud”, listed as the top of consultations to IPA; the outcome obtained from the instance analyzed, it is realized that a certain “alert” is displayed on the process that a damage is generated. That is, it is assumed that a user is faced damage because he/she may be neglect the “alert”.

<The Alert when Virus or Spyware is Embedded>

Please be cautious if following alert is displayed when you try to open files thinking that the file is for image or for animated image. The “Security Alert” is the message from OS (Windows XP) to protect its system. If you feel suspicious, be sure to check the information for file type ” and the “ source ” of the file and do not click “ execution ” or “ execute unless enough security is ensured .

The Alert when Virus or Spyware is Embedded

<Alert relevant to

Unauthorized Access>

Please be cautious if such alert in the right hand side is displayed under the situation where you are not in communication. This alert is the message from personal firewall software. It is likely that certain virus or spyware already invaded attempt to leak information outside. If such inquiry screen is displayed, you are to check the name of program or file name and do not click “Allowing Connection” unless enough security is ensured.

Alert relevant to Unauthorized Access

<Reference>

IPA – “How to Respond if Bill is Charged Simply Clicked Sites” (in Japanese)

http://www.ipa.go.jp/security/ciadr/oneclick.html

IPA – “7 Items of Anti-Virus Measures for PC Users” (in Japanese)

http://www.ipa.go.jp/security/antivirus/7kajonew.html

IPA – “5 Items of Anti-Spyware Measures for PC Users” (in Japanese)

http://www.ipa.go.jp/security/antivirus/spyware5kajyou.html

 

I. Reporting Status for Computer Virus – Please refer to Attachment 1 for further details –

The detection number [1] of virus was about 4.13M : about 70% decreased from 13.44M counted in December. This was caused by W32/Sober's specific variant which increased entire detection number of virus by sending massive virus mails in December. Since the variant stopped its mail sending activities , the entire detection number was drastically decreased. (The detection number of W32/Sober in December was 10.75M and about 85% of decrease with 1.63M in January.) In addition, the reported number [2] in January was 4,499 : 4.8% increased from 4,293 in December.


[1]Detection number:

Reported virus counts (cumulative) found by a filer. For January, the reported number resulted in 4,499 upon aggregation of virus detection counts reported about 4.13M.

[2]Reported number:

Virus counts are aggregated: viruses of same type and variants reported on the same day are counted as one case number regardless how many viruses or the actual number of viruses are found by the same filer on the same day. In January, reported number was 4,499: aggregated virus detection number of about 4.13M.

The worst detection number was for W32/Netsky with about 2.04M, and W32/Sober with about 1.63M and W32/Mytob with about 0.29M were subsequently followed .

Detection Number of Virus

Reported Number of Virus

(Note: Numbers in parenthesis are the figures for the previous month)

 

II. About Spyware

spyware (*1) is automatically installed simply clicked to an image of an adult site and user's mailing address is stolen – such consultation is increased from last year. In the event that the mailing address was stolen, such damage that suspicious billing statement through by e-mails is being generated. Be sure not to encounter damage to conduct following countermeasures and be cautious do not download suspicious files easily.

1. Utilize anti-spyware software to update definition files and check with

    or without of spyware.

2. Retain your computer always up-to-dated by applying modification

    programs frequently.

3. Be cautious with suspicious sites and/or questionable mails.

4. Enhance your computer's security.

5. Back up necessary files for further security.

Brochure for Anti-Spyware Measures (in Japanese)

http://www.ipa.go.jp/security/antivirus/shiori.html

 

III.   Reporting Status for Unauthorized Computer Access (includes consultation) – Please refer Attachment 2 for further details –

Report for unauthorized computer access and Accepting Status of consultation

 

Aug.

Sep.

Oct.

Nov.

Dec.

Jan. ‘06

Total for Reported (a)

41

31

22

24

25

50

 

Damaged (b)

12

16

15

15

19

13

Not Damaged (c)

29

15

7

9

6

37

Total for Consultation (d)

43

30

35

30

25

43

 

Damaged (e)

23

16

25

18

15

23

Not Damaged (f)

20

14

10

12

10

20

Grand Total (a + d)

84

61

57

54

50

93

 

Damaged (b + e)

35

32

40

33

34

36

Not Damaged (c + f)

49

29

17

21

16

57

1. Reporting Status of Unauthorized Computer Access

The reported number for January was 50 : of 13 was the number actually damaged .

2. Accepting Status of Consultations for Unauthorized Computer Access, etc.

Consultation counts relevant to unauthorized computer access was 43: of 23 (of 6 was also counted as reported number) was the actual number that some sort of damage was reported.

3. Status for Damage

Breakdown of the damage report included: intrusion with 11 and others (damaged) with 2 . The reports relevant to intrusion after attacked to the ports (*2) used by SSH (*3) was reported 3 cases, intruded into Web server and Web contents were automatically set which would be exploited by phishing was reported 2 cases and vulnerability in PHP (*4) implemented library for XML-RPC (*5) was attacked and intruded was reported 2 cases.

Damage Instances:

<Intrusion>

(i) Attacks to the port used for SSH

<Instance>

-   Network monitoring device detected frequent SSH access attempts from internal

     server to the servers outside.

-   It is realized that the server attempted unauthorized SSH connection to the

     servers outside when confirmed its logs (*6) (the server was exploited as

     steppingstone to conduct site attack outside.).

-   The testing account (*7) that has not been used was remained. Since the

     password for the account was vulnerable, it was attacked and intruded.

(ii) Setting up of contents used for phishing fraud and leakage of private

       information

<Instance>

-   When accessing to the Web site of own organization, confirmed that a forged

     site that masquerades to be a famous shopping site was displayed (so reported

     from outside).

-   The contents for the fake page (it can be considered that the page was exploited

     for phishing fraud) were located on our Web server. In addition, its password was

     automatically changed so that the server administrator could not be logged into

     the server.

-   Neither firewall had been set nor the software had been updated may be the

     cause.

-   Since the server intruded maintained private information, the information may be

     leaked outside.

(iii) Intrusion exploited vulnerability in XML-RPC

<Instance>

-   Intruded in a Web server and its home page was altered (so reported

     from outside).

-   “Vulnerability in XML-RPC” in the PHP library incorporated in the Web server

     being exploited was the cause.

-   The troubled library had not been in use.

 

VI. Accepting Status of Consultation

The number of consultations in January was 748. Of 173 was the consultation so called “One-click billing fraud” such as receiving “billing fraud” mails after browsing an adult site were unchangeably many. In addition, nearly 90% of the consultation relevant to one-click billing fraud was for the cases that some malicious codes such as spyware, etc. were embedded. <movement in one-click billing fraud… July: 28, August: 83, September: 80, October: 108, November: 165 and December: 138>


Movement in entire number of consultation accepted by IPA

 

Aug.

Sep.

Oct.

Nov.

Dec.

Jan. ‘06

Total

629

554

606

673

653

748

 

Automatic Response System

376

337

357

379

391

425

Telephone

179

144

165

220

194

228

e-mail

67

72

82

66

66

87

Fax, Others

7

1

2

8

2

8

*IPA consults/advises for computer viruses/unauthorized computer accesses as well as the other information concerning overall security issues

Mail: ?????????? for virus issues, ????????????for crack issues.

Tel.: +81-3-5978-7509 (24-hour automatic response)

Fax: +81-3-5978-7518 (24-hour automatic response)

*The Total case number includes the number in Consultation (d) column of the Chart in the “III. Status for Reported Unauthorized Computer Access”.

*”Automatic Response System”:   Accepted numbers by automatic response
*“Telephone”:                           Accepted numbers by the Security Center personnel


The instances for the main consultations were as follows:

(i) What if an Award was Won so Informed by e-mail…?

Consultation:

Received an e-mail saying “You won \1,000,000” without any of warning. The system was that if I send a blank e-mail then I will be remitted \1,000,000 if I send back an e-mail again by filling out necessary information to the designated addressee. I have, therefore, sent back the e-mail including my banking account: \1,000,000 has not yet been remitted, but the same winning mail still arrives almost everyday.

Response:

This may be a simple winning mail for fake prize and is may be a phishing fraud to exploit user's name, banking account, etc . Do not believe suspicious mail which you do not know easily and you are to always doubt that “this may be a trap” . Particularly be cautious if you have to input your private information.

(ii) What if Private Information was Leaked because of Virus Infection…?

Consultation:

Infected by virus while using Winny. Private information was leaked such as my name and address, etc. by virus. What should I do?

Response:

Actually, it is impossible to collect such data deviated to file exchange network . When you use file exchange network, be sure to recognize such risky status and to conduct thorough security measures such as implementing anti-virus software, etc .

<Reference>

IPA – “Dos and Don'ts when using file exchange software” (in Japanese)

http://www.ipa.go.jp/security/topics/20050623_exchange.html

In addition, please also refer to the following site for additional information in relation to one-click billing fraud which still constitutes large number of consultation.

IPA – “Countermeasures in case billed when you simply clicked” (in Japanese)

http://www.ipa.go.jp/security/ciadr/oneclick.html

 

V. Accessing Status Captured by the Internet Monitoring (TALOT2”) in January

In the Internet Monitoring (TALOT2), unwanted (one-sided) access in January totaled 415,438 cases using 10 monitoring points: unwanted (one-sided) access captured at one monitoring point was about 1,340 cases of accesses from about 357 sources per day.

The environment for each monitoring point in TALOT2 is nearly equal to general users' Internet connection; it can be considered that the same amount of unwanted (one-sided) access may be received by the general internet users. In another words, your computer is being accessed by 4 cases of access which are considered to be unauthorized from 357 unknown people (source) everyday in average .

Number of Access and Source Number of Access in Average/Monitoring Point/Day

Chart 5.1: Unwanted (One-sided) Number of Access and Source Number of Access/Monitoring Point/Day

Chart 5.1 shows the number of access and the source number of access in average/monitoring point/day from June, 2004 to January, 2006. The chart indicates that unwanted (one-sided) access including source number of access tend to decrease moderately.

Accessing status in January shows that there are number of unauthorized computer access which may target vulnerability in Windows unchangeably many. Accessing to the ports 135 (TCP) and 445 (TCP) that have exclusively large number of access target vulnerability in Windows. In addition, there are number of pop-up message which prompt anti-virus measures and/or unauthorized computer access measures and pop-up ads by add-ware while net surfing, you are to be cautious not to be fooled by these contents easily.

Please refer to the following sites for the details in relation to the above mentioned information. (in Japanese)

“Attachment 3_Accessing Status Captured by the Internet Monitoring (TALOT2)”

http://www.ipa.go.jp/security/txt/2006/documents/TALOT2-0602.pdf

 

“Various Statistics Information Provided by Other Organizations/Vendors are Publicized in the Following Sites”

@police:      http://www.cyberpolice.go.jp/ (in Japanese)

Trendmicro: http://www.trendmicro.com/jp/ (in Japanese)

McAfee:      http://www.mcafee.com/jp/default.asp (in Japanese)

“Interpretation for Glossaries”

(*1) Spyware:

One of software which acquires information by fraud such as user's individual information, access archives, etc. to sends them out automatically to third person, third party, etc.

(*2) Port:

A window interfaces each service within a computer used for exchanging information with outsides. Numbers from 0 to 65535 are used for the ports so that they are also called Port Number.

(*3) SSH(Secure Shell):

A protocol or a program used for log-in to another computer via the network, execute commands by a computer in remote and transfer files to another computer. Since data via thenetwork is encrypted, a series of operations through the Internet can be done safely.

(*4) XML-RPC (eXtensible Markup Language – Remote Procedure Call) :

A protocol executes RPC on the Internet using XML. RPC is the procedure to process programs utilizing computer which connected to network.


(*5) PHP (PHP: Hypertext Preprocessor) :

A universal script language suits to dynamic Web page generation. PHP can be embedded in the HTML description.

(*6) log:

Record of the use of a computer or data communication. Generally, operator's ID, time and date for the operation, contents of operation, etc. are recorded.

(*7) Account:

The privilege which allow a user to use resources on a computer or the network; it also implies the ID necessary upon use.

- Attachment 3 Observation Status by Internet Monitoring System (TALOT2)

   


Contact
IT Security Center, Information-technology Promotion Agency, Japan (IPA/ISEC)
Tel:+81-3-5978-7527

Fax:+81-3-5978-7518

E-mail:






Term of Use


Copyright(c) Information-technology Promotion Agency, Japan. All rights reserved 2005