Information-technology
Promotion Agency,
Japan
$BK\J8$X(B
IPA

TOP|Aplication|Contact us|Sitemap


Information-technology Promotion Agency, Japan
-japanese charactor-






IT Security Center

The Information-technology SEcurity Center (ISEC) is the center for promoting information security in Japan.









Japanese




Activities




Information Service Activities






Security Software Development Activities






CRYPTREC






IT SecurityAssurance







Organization







PGP key







RFCs







Mission Statement







Links







About IPA/ISEC







IPA TOP>IT Security Center Japanese TOP>IT Security Center English TOP>information




Computer Virus / Unauthorized Computer Access Incident Report [Summary]


October 1, 2006
IT Security Center
Information-technology Promotion Agency, Japan (IPA)

This is a summary of computer virus/unauthorized computer access incident reports for August, 2006 compiled by IPA.

        Reminder for the Month:

“Update Immediately when Weakness (Vulnerability*) of Security is Publicized”

- Frequently check the information for vulnerability and/or modification program -

 

In August 2006, such instance that there developed number of cases exploiting codes against vulnerability shortly after the vulnerability (security holes) was publicized by Microsoft: some of them broke out virus which exploited the security holes 4 days later from the publication.

Typically, when security holes are publicized, modification program which resolves the security holes are also publicized. Microsoft is providing their modification programs available on their website.

    Microsoft Update

    http://update.microsoft.com/

It is risky if security holes are not resolved; your computer tends to be left in unsecured state in where virus may be penetrated. As you can see the chart below, currently, the period for breaking out of virus which follows to the information for the publication of security holes is getting shortened*. To prevent any of damages by virus, etc., be sure to resolve it immediately when information of security holes is publicized.

 

     The period for breaking out of virus was several weeks or several months in 2003

     and 2004; the period is drastically shortened to several days since when 2005.

Virus Detection Period after Modification Program for Vulnerability is Provided

The instances shown here are broken out of virus after the information of security holes publicized and they are announced in the emergency information column on the IPA's Web pages.

bar

* Vulnerability is the weakness causing unexpected events that loose security from their

   existing system, application, etc. It also refers as security holes.

As for the computers furnished in corporations/organizations, be sure to conduct vulnerability measures in accordance with their system administrators. It may cause, however, it may presents failure in their daily system such as groupware, etc. upon applying modification programs; be sure to confirm the information relevant to the vendors in advance. In case it is difficult to apply the modification programs, you can flexibly apply preventive measures, etc. as substitution.

Utilization of OSs for which supporting periods being expired.

Since the product supporting period for Windows 98/Me is already expired, any of modification programs will not be provided in case their vulnerability may be found. However, it is risky that you may face certain damage when connecting to the Internet or communicating by mails if vulnerability is still retained in your computer. Please refer to the following site for your further security.

Information from Microsoft

Announcement for the end of support for Windows 98 and Windows Me

http://www.microsoft.com/windows/support/endofsupport.mspx#EZ

Information

(4) Brochure How to Prevent from Unauthorized Computer Access and (5) Brochure How to Prevent from Information Leakage are currently added to IPA's “Measures against variety of fraudulent activities” series of brochures and they are available on our homepages as well. Please be sure to activate them to protect corporative/organizational security as well as to protect your private security.

“Measures against variety of fraudulent activities” series of brochures:

(1) Anti-virus Measures, (2) Anti-spyware Measures, (3) Anti-bots Measures, (4) How to Prevent from Unauthorized Computer Access and (5) How to Prevent from Information Leakage

http://www.ipa.go.jp/security/antivirus/shiori.html (in Japanese)

 

I. Reporting Status for Computer Virus for further details, please refer to the

   Attachment 1

The detection number [1] of virus was about 1.1M and was decreased 28.4% from 1.54M in July. In addition, the reported number [2] of virus was 3,434 and was decreased 0.6% from 3,455 in July.


[1]Detection number:

Reported virus counts (cumulative) found by a filer.

[2]Reported number:

Virus counts are aggregated: viruses of same type and variants reported on the same day are counted as one case number regardless how many viruses or the actual number of viruses is found by the same filer on the same day. In August, reported number was 3,435: aggregated virus detection number was about 1.1M.

The worst detection number was W32/Netsky with about 0.92M; W32/Mytob with about 0.06M and W32/Bagle with about 0.05M were subsequently followed.

Detection Number of Virus about 1.1M (about 1.54M) -28.4%

Reported Number of Virus 3,434 (3,455) -0.6%

(Note: Numbers in the parenthesis are the data based on previous month' figures.)

 

II. Consultation Number for the Damages by One-click Billing Fraud is Unchangeably Many!!

Unchangeably many consultations relevant to “ One-click Billing Fraud ” are being filed by IPA up to current. Some consultation for actual damage includes that user is billed simply he/she clicked an image displayed, billing screen is displayed each time user starts up his/her computer or is displayed on and off continually with certain intervals, etc.

As for similar approach charging bill realizes as “High-pressured On-line Selling”. In August 2006, newer approaches of “High-pressured On-line Selling” were also realized.

[The Newer Approaches of High-pressured On-line Selling]

Have user to download the (exclusive) player software which is necessary to browse moving images. Once the user downloaded the software, billing screen is automatically appeared on and off with certain intervals.

The Newer Approaches of High-pressured On-line Selling

To prevent such damages, be sure to keep downloading away easily if you are uncertain with the site. In case you encountered any of damages, be sure to contact with us for its countermeasures as we can provide you free consultations. (Please also refer to the page 7 for consultation accepting status.)

<Reference>

Brochure for Anti-Spyware Measures (in Japanese)

http://www.ipa.go.jp/security/antivirus/shiori.html

 

III.   Reporting Status for Unauthorized Computer Access (includes consultation) – Please refer Attachment 2 –

Report for unauthorized computer access and Accepting Status of consultation

 

Mar.

Apr.

May

June

Jul.

Aug.

Total for Reported (a)

38

15

13

22

15

50

 

Damaged (b)

10

7

6

20

8

30

Not Damaged (c)

28

8

7

2

7

20

Total for Consultation (d)

24

27

23

32

31

24

 

Damaged (e)

12

15

11

19

18

13

Not Damaged (f)

12

12

12

13

13

11

Grand Total (a + d)

62

42

36

54

46

74

 

Damaged (b + e)

22

22

17

39

26

43

Not Damaged (c + f)

40

20

19

15

20

31

1. Reporting Status of Unauthorized Computer Access

The reported number for August was 50 : of 30 was the number actually damaged.

2. Accepting Status of Consultations relevant to Unauthorized Computer Access, etc.

Consultation counts relevant to unauthorized computer access was 24: of 13 (of 3 was also counted as reported number) was the actual number that some sort of damage was reported.

3. Status for Damage

Breakdown of the damage report included: intrusion with 17, DoS Attack (*1) with 2

and Source Address Spoofing with 1, etc . Breakdown of the reported damages caused by intrusion includes: alteration of Web pages with 9, being to be steppingstone to attack to the other site or to send spam (*2) mails with 6. The cause of intrusion includes such instances that the password was analyzed for which was attacked by the password cracking (*5) attack to the ports (*4) used for SSH (*3) with 5.

Damage Instances:

[Intrusion]

(i) Exploited as a Steppingstone…?

<Instance>

-   Developed the connecting records from the IP addresses that are not allowed to connect to the secondary DNS (*7) servers operated by an organization while checking communication logs (*6) .

-   When the study was conducted to the servers, it is realized that the IRC (*9) server environment was configured by placing such file which considered to be rootkit (*8) file.

-   The cause for the intrusion likely to be insufficient filtering for IP addresses which allow/refuse connection configured upon updating server machines were directly attacked from outside; in addition, it also caused that its log-in passwords were easily assumable.

(ii) Alteration of Home Pages…?

<Instance>

-   Web site had been operated by using certain hosting services; however, the homepages on the site was altered unexpectedly.

-   The hosting services (*9) company communicated saying that the vulnerability of the Web applications stored in the common server along with the other users' Web sites were exploited and the some files on the servers were being operated from outside fraudulently.

(iii) Number of Mails was Returned as Error Mails that I'd Never Sent…?

<Instance>

-   Number of error mails as “unknown addressee” was returned.

-   The error mails seemed to be spam mails including unnecessary ads and/or flyers. Though the source address was designated as my mail address, I'd never sent these mails.

-   Because too many error mails are returned, it causes that the mail server performs slower in responding.

 

VI. Accepting Status of Consultation

The gross number of consultation for August was 793. Of the consultation relevant to “Online one click billing fraud” was for 204 (July: 159) the consultation relevant to “ High-pressured selling of software for security measures ” with 33 (July: 43) and the consultation relevant to “ Winny ” with 14 (March: 196, April: 83, May: 28, June: 15, July: 12), etc.

Movement in entire number of consultation accepted by IPA

 

Mar.

Apr.

May

June

July

August

Total

1,056

904

846

773

767

793

 

Automatic Response System

659

510

484

423

444

460

Telephone

296

206

295

283

257

280

e-mail

99

86

63

64

66

48

Fax, Others

2

2

4

3

0

5

*IPA consults/advises for computer viruses/unauthorized computer accesses as well as the other information concerning overall security issues

Mail: ?????????? for virus issues, ????????????for crack issues.

Tel.: +81-3-5978-7509 (24-hour automatic response)

Fax: +81-3-5978-7518 (24-hour automatic response)

*The Total case number includes the number in Consultation (d) column of the Chart in the “III. Reported Status for Unauthorized Computer Access” and “IV. Accepting Status of Consultation”.

*”Automatic Response System”:   Accepted numbers by automatic response
*“Telephone”:                           Accepted numbers by the Security Center personnel

 

Consultation Number for One Click Billing Fraud

Number of Consultation for One-click Billing Fraud

Number of Consultation for High-pressured Selling of Software for Security Measures

The major consultations for the month are as follows.

(i) This may be a newer one-click billing fraud…?

Consultation:

When I clicked a link, the link took me to an adult site. I was eventually billed as I went forward to click without checking. Though I restarted up my computer, the billing screen is still appeared with several minutes of intervals. I am not willing to pay as I do not intend to register with the site and I want to delete the billing screen itself.

Response:

Upon accessed to the site we'd communicated, we are realized that the “site is pay site”; in addition, it leads user to register with the site by clicking several checking sessions. If you are not willing to pay, you should not go ahead beyond its top pages. In such cases, the user may not excuse even he/she'd never intended to register with the site.

 

(ii) The security software which was forcibly sold may have been deleted…?

Consultation:

Since my computer alerted that “my computer is infected by virus”, I downloaded and installed the anti-virus software urged in that site as indicated. However, one TV news focused on the anti-virus software and now I know that the software was not enough reliable. I, then, tried to uninstall the software from “addition/deletion of programs” option in the control panel, there still remains the software icon and the screen prompting me to purchase the software still appears constantly.

*10 cases of similar consultation were filed with IPA for August.

Response:

Even if you'd tried to uninstall the software from the “addition/deletion of programs” option, the name of the software would be disappeared from the program listing, but it seems that the software itself would still be remained in your computer. However, if the software was installed to the folder in where uninstaller program is also existed, you may be uninstall the software by executing the program file directly. Please contact IPA's consultation window with the issue.

 

V. Accessing Status Captured by the Internet Monitoring (TALOT2”) in August

In the Internet Monitoring (TALOT2), unwanted (one-sided) access in August totaled 387,534 cases using 10 monitoring points: unwanted (one-sided) access captured at one monitoring point was about 1,250 accesses from about 321 sources per day.

The environment for each monitoring point in TALOT2 is nearly equal to general users' Internet connection; it can be considered that the same amount of unwanted (one-sided) access may be received by the general internet users. In another words, your computer is being accessed 4 times which considered unauthorized accesses from 321 unknown people (source) everyday in average.

Number of Access and Source Number of Access/Monitoring Point/Day in Average

Chart 5.1: Unwanted (One-sided) Number of Access and Source Number of Access/ Monitoring Point/Day

The Chart 5.1 shows the number of access and the source number of access in average/monitoring point/day from January to August 2006. According to this chart, unwanted (one-sided) accesses were increased from the previous month . As for the entire contents of accesses were stabled; please be cautious as another accesses which seemed to target Windows newer vulnerability were emerged.

Accessing status in August was almost the same in July; newer accesses to the port 139 (TCP) which seemed to target Windows newer vulnerability were emerged . Those unauthorized accesses to Windows existed vulnerabilities were unchangeably many and most of them seemed to send from those computers infected by bots. In addition, the tendency in number of access increase continued from the end of July: those accesses to the port 22 (TCP) which targeted to intrude to computers by conducting password cracking attack were also increased.

The accesses to the port 139 (TCP) were considered to target Windows newer vulnerability (MS06-040). Since the exploiting (validation) code against the vulnerability was already publicized; it is likely that such bots in where newer worms and/or exploiting code embedded may be promulgated.

The Chart 5.2 and the Chart 5.3 show the transition in the number of access and the source number of access to the port 139 (TCP) classified by source area. According to these charts, source accesses from domestic were increased on or after August 18; source accesses from Korea were also increased from August 23. Since none of damages or inquiries was reported to IPA, we could not realize how bad the actual damages in domestic were; however, those source computers in domestic seemed to be infected either by worm or bots. It is risky that the number of access in domestic was tending to increase. From the viewpoint of the source number of access, the source accesses from Korea were tending to terminate. According to the accessing tendency (number of access against identical monitoring point), the source accesses from domestic and the source accesses from Korea were slightly differed; it seemed that they may have been different exploiting code (either worm or bots (*10) ).

There would be no problem if those corporations (organizations) who are explicitly preventing unauthorized computer accesses from outside, those who are using Windows computers directly connecting with the Internet via modem, etc. should apply patches to resolve Windows vulnerability publicized by Microsoft on August 10 and to utilize firewall functions as well to prevent from having any of damages.

Those individual computer users should conduct unauthorized computer access measures by referring materials available from the following site.

- Brochure for the Measures against Unauthorized Computer Access (in Japanese)

http://www.ipa.go.jp/security/antivirus/shiori.html

Transition in the Number of Access to the Port 139 (TCP) Classified by Source Area

Chart 5.2: Transition in the Number of Access to the Port 139 (TCP) Classified by Source Area in August 2006

Transition in the Source Number of Access to the Port 139 (TCP) Classified by Source Area

Chart 5.3: Transition in the Source Number of Access to the Port 139 (TCP) Classified by Source Area in August 2006

Relevant to the information above, details are available from the following site.

Attachment_3 Observation Status Captured by the Internet Monitoring (TALOT2).

http://www.ipa.go.jp/security/english/virus/press/200607/TALOT200608.html

 


“Various Statistics Information Provided by Other Organizations/Vendors are Publicized in the Following Sites”


@police:      http://www.cyberpolice.go.jp/english/
Trendmicro: http://www.trendmicro.com/en/home/us/home.htm
McAfee:      http://www.mcafee.com/us/


“Interpretation for Glossaries”

(*1) DoS Attack (Denial of Services Attack) :

The attack which sends quantity of data to have the server excessive load to lower its performance significantly or to have the server disables its function.

(*2) Spam :

Junk mail and/or bulk mail or simply referred as “Unwanted (One-sided) mail”. No matter it is commercial intent or not, spam is referred as such mail sending to unspecified majority purposing advertisement and/or harassment.

(*3) SSH (Secure Shell) :

A protocol or a program used for log-in to another computer via the network, execute commands by a computer remotly and transfer files to another computer. Since data via the network is encrypted, a series of operations through the Internet can be conducted safely.

(*4) Port :

A window interfaces each service within a computer used for exchanging information with outsides. Numbers from 0 to 65535 are used for the ports so that they are also called Port Number.

(*5) Password Cracking :

The approach to identify anyone else's password by analyzing, etc. Approaches include brute-force attack, dictionary attack, etc. and there is the code for exclusively crack as well.

(*6) Log :

Records for serving status of a computer or the status of data communication. Generally, operator's ID, time and date for the operation, contents of operation, etc. are recorded.

(*7) DNS (Domain Name System) :

The system which maps host names on the Internet and IP addresses. This is the hierarchical and distributed type of database system for which DNS servers on the Internet all over the globe work in coordination.

(*8) Root-kit :

Set of software package which is used by attacker after he/she intrudes a computer fraudulently. Generally, the package includes log alteration tool, backdoor tool, group of system commands being altered.

(*9) Hosting Service :

A service that a partial disk contents in the Web server being connected to the Internet and publicized which is loaned to a client by business. It also refers to be a rental server.

(*10) bot :

A kind of computer virus. It was created to manipulate an infected computer from outside through a network (the Internet).

 

The details are as follows:
- Attachment 1 Computer virus Incident Report [Details]
- Attachment 2 Unauthorized Computer Access Incident Report [Details]

- Attachment 3 Observation Status by Internet Monitoring System (TALOT2)

   


Contact
IT Security Center, Information-technology Promotion Agency, Japan (IPA/ISEC)
Tel:+81-3-5978-7527

Fax:+81-3-5978-7518

E-mail:






Term of Use


Copyright(c) Information-technology Promotion Agency, Japan. All rights reserved 2005