Information-technology
Promotion Agency,
Japan
$BK\J8$X(B
IPA

TOP|Aplication|Contact us|Sitemap


Information-technology Promotion Agency, Japan
-japanese charactor-






IT Security Center

The Information-technology SEcurity Center (ISEC) is the center for promoting information security in Japan.









Japanese




Activities




Information Service Activities






Security Software Development Activities






CRYPTREC






IT SecurityAssurance







Organization







PGP key







RFCs







Mission Statement







Links







About IPA/ISEC







IPA TOP>IT Security Center Japanese TOP>IT Security Center English TOP>information




Computer Virus / Unauthorized Computer Access Incident Report [Summary]


October 31, 2006
IT Security Center
Information-technology Promotion Agency, Japan (IPA)

This is a summary of computer virus/unauthorized computer access incident reports for September, 2006 and 3rd Half of 2006 (July to September) compiled by IPA.

        Reminder for the Month:

“Be Cautious with the Virus Mails Masquerading

Distribution of Modification Program!!”

- Eliminate security holes by downloading the modification

program from legitimate sites -

Currently, there can be detected number of such mails so it claims distribution of modification program to eliminate the security holes (vulnerable parts on security) exclusively for Microsoft products (please refer to the Chart below) . However, the file attached to that mail was actually a virus mail ( W32/Stration ). When you click that file by mistake, you will be infected by virus. Be sure not to click on it.

It is the typical procedure that a user initially accesses to the vendor's site where provides security software to download the modification program which suits to the user's specification. Any of modification programs will never be provided by the vendor as the attachment file to an e-mail . It seems to be thoughtfulness, please be cautious not to be fooled with such mails.

Be sure to download modification program from legitimate site - if you are a Windows user, be sure to access to the “Microsoft Update” (http://update.microsoft.com/ ); if you are a Macintosh user, be sure to access to the “Software Update” ( http://www.apple.com/support/downloads/ ) respectively.

The Mail Example Sent by W32/Stration Variant

Chart: The Mail Example Sent by W32/Stration Variant

Interpretation for W32/Stration

You are to be cautious with the W32/Stration emerged in August 2006 and number of its variants emerged in September that are now being spread. This virus spreads itself sending mails by appending itself. You will be infected if you open the appended file and your computer gets to send the similar virus mails to the addresses stored in the address book in your computer.

Some of variants, in addition, function to have you access to the sites provided by the virus author to have infected computers download spyware, etc. automatically: you may face damage of information leakage.

The variants identified by IPA are provided such patterns as if the virus mail body and the name of appended file seemed to be certain patches provided by Microsoft which modify security holes. Once the appended file is opened, it displays successful message like “Update successfully installed.” which make it harder to realize that your computer is infected.

In addition, rootkit (*1) installs itself to the computer secretly; it is harder to develop infection after being infected. In addition, it does not show explicit symptoms, you will be likely to spreading virus mails without knowing that you are infected.

It is harder to address infection after being infected as it is likely to enlarge damages; be sure not to open the files appended to mails easily.

 

I. Reporting Status for Computer Virus for further details, please refer to the

   Attachment 1

The detection number [1] of virus was about 1.05M: decreased from 4.6% from 1.1M reported in August. In addition, the reported number [2] of virus in September was 3,551: increased from 3.4% from the 3,434 reported in August.


[1]Detection number:

Reported virus counts (cumulative) found by a filer.

[2]Reported number:

Virus counts are aggregated: viruses of same type and variants reported on the same day are counted as one case number regardless how many viruses or the actual number of viruses is found by the same filer on the same day. In August, reported number was 3,435: aggregated virus detection number was about 1.1M.

The worst detection number was W32/Netsky with about 0.84M and W32/Stration with about 0.06M and W32/Mytob with about 0.05M were subsequently followed.

Detection Number of Virus about 1.05M (about 1.1M) -4.6%

Reported Number of Virus 3,551 (3,434) +3.4%

(Note: Numbers in the parenthesis are the data based on previous month' figures.)

 

II. One-click Billing Fraud

In September 2006, 223 consultations , the largest number ever we had , about “one-click billing fraud” were filed with IPA (April: 161, May: 210, June: 211, July: 159, August: 204).

- Risky sites are abundant; adult site is not single suspicious site -

Such damages resulted by one-click billing fraud is mainly caused at adult sites. However, recently, almost the same methodology is identified not only in adult sites but also in investment-relevant sites as well. Such site urges to enroll the membership to attempt providing the member only stock information which you can earn some profits with. In case you click the membership button on the screen, it is being configured to download certain malicious programs such as virus, etc.

Example of the site which letting you to download malicious codes

There were some consultation instances filed by IPA in which the consulter faced certain damage in relation to one-click billing fraud while he/she was searching moving pictures or images of certain talents. Even you do not want to browse adult sites, you too, be cautious and do not forget that you are always facing certain risks.

Try not to access to the suspicious sites or even accessed, try not to easily download to prevent damages. When the security alert screen by Windows function is displayed, be sure to click the “ cancel ” button not to go forward and never click the “execution” button.

 

III.   Reporting Status for Unauthorized Computer Access (includes consultation) – Please refer Attachment 2 –

Report for unauthorized computer access and Accepting Status of consultation

 

Apr.

May

June

Jul.

Aug.

Sept.

Total for Reported (a)

15

13

22

15

50

46

 

Damaged (b)

7

6

20

8

30

21

Not Damaged (c)

8

7

2

7

20

25

Total for Consultation (d)

27

23

32

31

24

35

 

Damaged (e)

15

11

19

18

13

26

Not Damaged (f)

12

12

13

13

11

9

Grand Total (a + d)

42

36

54

46

74

81

 

Damaged (b + e)

22

17

39

26

43

47

Not Damaged (c + f)

20

19

15

20

31

34

1. Reporting Status of Unauthorized Computer Access

The reported number for September was 46: of 21 was the number actually damaged.

2. Accepting Status of Consultations relevant to Unauthorized Computer Access, etc.

Consultation counts relevant to unauthorized computer access was 35: of 26 (of 5 was also counted as reported number) was the actual number that some sort of damage was reported.

3. Status for Damage

Breakdown of the damage report includes: Intrusion with 7, Infection w/Worms with 8 and Source Address Spoofing with 1, etc . Breakdown of the reported damages caused by intrusion includes: alteration of Web pages/data stored in server with 2, being to be steppingstone to attack to the other site or to send spam (*2) mails with 3. The cause of intrusion includes such instances that the password was analyzed for which was attacked by the password cracking (*5) attack to the ports (*4) used for SSH (*3) with 1.

 

Damage Instances:

[Intrusion]

(i) Exploited as a Steppingstone to attack to the other sites…?

<Instance>

-   The computer for which IP address is managed by an organization is fraudulently logging in to SSH in the servers outsides so informed by the provider contracted with the organization.

-   Study was conducted and realized that the password was analyzed by dictionary attack (*6) through SSH and the servers were intruded. In addition, dictionary attack tool for SSH was embedded in the servers to be the steppingstone to attack the other sites. Since the log files (*7) were already deleted and details could not be realized.

(ii) Alteration of Home Pages…?

<Instance>

-   “Your Home Pages may have been altered…?”so informed from outside of the organization. Study was conducted and realized and there placed some political assertion written by English on their Home Pages.

-   They used to use the updated DNN (Dot Net Nuke) as the CMS (Contents Management System) (*9) on OSS (Open Source Software) (*8) for their sites. In addition, they also added third-party (*10) modules for DNN on their servers.

-   It seemed that the vulnerability on the third party modules for DNN was exploited. Since the vulnerability was immediately addressed as its modification program was already released.

Others

(iii) Accounts (*11) were automatically used…?

<Instance>

-   My own account prepared in one of large portal sites was automatically used by someone.

-   Some goods were listed on a net auction automatically and my own blog and my registration information were also being altered.

-   The cause was that my password was analyzed.

 

VI. Accepting Status of Consultation

The gross number for the consultation for September was 933 . Of the consultation relevant to “ One-click Billing Fraud ” was for 223 (August: 204), the consultation relevant to “ High-pressured selling of software for security measures ” with 23 (August: 33) and the consultation relevant to “ Winny ” with 9 (March: 196, April: 83, May: 28, June: 15, July: 12, August 14), etc.

Movement in entire number of consultation accepted by IPA

 

Apr.

May

June

July

August

Sept.

Total

904

846

773

767

793

933

 

Automatic Response System

510

484

423

444

460

575

Telephone

206

295

283

257

280

302

e-mail

86

63

64

66

48

51

Fax, Others

2

4

3

0

5

5

*IPA consults/advises for computer viruses/unauthorized computer accesses as well as the other information concerning overall security issues

Mail: ?????????? for virus issues, ????????????for crack issues.

Tel.: +81-3-5978-7509 (24-hour automatic response)

Fax: +81-3-5978-7518 (24-hour automatic response)

*The Total case number includes the number in Consultation (d) column of the Chart in the “III. Reported Status for Unauthorized Computer Access” and “IV. Accepting Status of Consultation”.

*”Automatic Response System”:   Accepted numbers by automatic response
*“Telephone”:                           Accepted numbers by the Security Center personnel

 

[Reference] Shift in the consultation number of one-click billing fraud

Monthly Consultation Number for One-click Billing Fraud

[Reference] Shift in the consultation number of on-line high-pressured selling of security software

Monthly Conslutation Number for On-line High-pressured Selling of Mimic Security Software

The major consultations for the month are as follows.

(i) Anti-virus Software Detects “cookie (*12)”…?

Consultation:

Getting unavailable to connect to the Internet. When scanned my computer by anti-virus software, number of so called “cookies” were detected. Are there some information being deviated?

Response:

Cookie is not virus . Since cookie is not program either: cookie does not fraudulently command for execution nor does high-jack your computer.

There may be other reasons that you cannot connect to the Internet. Be sure to confirm if your anti-virus software is not locking to connect to the Internet as well as to review your configuration to the Internet .

(ii) Information will not be Leaked if Using File Sharing Software Other than Winny…?

Consultation:

I believed that the other file sharing software other than Winny are not risky to use as I misunderstood that the Winny is infected by virus to leak information. I do not use the Winny now, but wish to know if the concept is true?

Response:

Number of viruses which cause information deviation initially infect to computers to exploit Winny's function. While the other viruses also leak information by exploiting file sharing software's function . Accordingly, it cannot be said that the other file sharing software other than Winny is safe either.

It is almost impossible to restore the data once deviated on the file sharing network . You are to identify that using file sharing software is enough risky activity.

In addition, there emerged some viruses which do not use the mechanisms of file sharing software upon information deviation. That is, security is not ensured even you are not using file sharing software. The most important thing is to prevent from infection by virus and thus, it is the fundamental measure not to download suspicious file easily or not open it .

(Reference)

IPA – To Prevent from Information Deviation by Winny (in Japanese)

http://www.ipa.go.jp/security/topics/20060310_winny.html

IPA – The 7 Anti-Virus Requirements for PC Users (in Japanese)

http://www.ipa.go.jp/security/antivirus/7kajonew.html

 

V. Accessing Status Captured by the Internet Monitoring (TALOT2”) in September

Accesses to the port 139 (TCP) began in the middle of August 2006 can be seemed to target vulnerability in Windows (MS06-040). Such access increase seemed to be terminated on or about September 15 (please refer to the Charts 5.1 and 5.2.).

Number of Access to the Port 139(TCP) Classified by Source Area

Chart 5.1: Number of Access to the Port 139 (TCP) Classified by Source Area

from August to September 2006

Source Number of Access to the Port 139(TCP) Classified by Soruce Area

Chart 5.2: Source Number of Access to the Port 139 (TCP) Classified by Source

Area from August to September 2006

To analyze the accesses to the port 139 (TCP) based on the accesses from domestic as its source area, there existed 2 types of accessing patterns: a) Accesses only to the port 139 (TCP); and b) Combined accesses which target to multiple ports.

As for a), there is high potentiality that specific vulnerability was targeted by worms. As for b), it is probable that accesses can be conducted by such bots which contains several exploiting codes.

In addition, when studied source area (source IP address) for these accesses, it is realized that there are number of IP addresses provided to individual users from each ISP. This can be considered that these individual users infect bots; be sure to conduct certain anti-bots measures if you are uncertain with the symptoms that your computer's performance is getting lowered, etc.

-   Anti-bots Measures: (in Japanese)

     http://www.ipa.go.jp/security/antivirus/shiori.html

As it can be seen from the Chart 5.3, the averaged number of access for August and September were increasing: it seemed that the cause can be considered by these accesses.

Number of Access and Source Number of Access in Average/Monitoring Point/Day

Chart 5.3: Unwanted (One-sided) Number of Access and Source Number of Access/ Monitoring Point/Day

According from the Internet Monitoring (TALOT2), unwanted (one-sided) number of access for September 2006 was totaled 402, 772 for 10 monitoring points. This means that 1,366 accesses were observed at the single monitoring point from 291 source areas within single day.

It won't lead damages if those corporations (organizations) who explicitly prevent unauthorized computer accesses from outsides; those individual users who use Windows computers by connecting to the Internet directly through a modem, etc., be sure to resolve any of vulnerabilities on your computer and to use firewalls, etc. to prevent damages.

Those Individual users should refer to the following sites and be sure to conduct appropriate unauthorized computer measures.

-   Brochure for Unauthorized Computer Access Measures (in Japanese)

     http://www.ipa.go.jp/security/antivirus/shiori.html

 

For further details for the information above, please refer to the following sites.

Attachment 3_Observation Status Captured by the Internet Monitoring (TALOT2) (in Japanese)

http://www.ipa.go.jp/security/english/virus/press/200609/TALOT200609.html

 


“Various Statistics Information Provided by Other Organizations/Vendors are Publicized in the Following Sites”


@police:      http://www.cyberpolice.go.jp/english/
Trendmicro: http://www.trendmicro.com/en/home/us/home.htm
McAfee:      http://www.mcafee.com/us/


“Interpretation for Glossaries”

(*1) Root-kit :

Set of software package which is used by attacker after he/she intrudes a computer fraudulently. Generally, the package includes log alteration tool, backdoor tool, group of system commands being altered.

(*2) Spam :

Junk mail and/or bulk mail or simply referred as “Unwanted (One-sided) mail”. No matter it is commercial intent or not, spam is referred as such mail sending to unspecified majority purposing advertisement and/or harassment.

(*3) SSH (Secure Shell) :

A protocol or a program used for log-in to another computer via the network, execute commands by a computer remotly and transfer files to another computer. Since data via the network is encrypted, a series of operations through the Internet can be conducted safely.

(*4) Port :

A window interfaces each service within a computer used for exchanging information with outsides. Numbers from 0 to 65535 are used for the ports so that they are also called Port Number.

(*5) Password Cracking :

The approach to identify anyone else's password by analyzing, etc. Approaches include brute-force attack, dictionary attack, etc. and there is the code for exclusively crack as well.

(*6) Dictionary Attack :

Attacking method attempting to look for specific word in a dictionary to analyze given password.

(*7) Log :

Records for serving status of a computer or the status of data communication. Generally, operator's ID, time and date for the operation, contents of operation, etc. are recorded.

(*8) OSS (Open Source Software) :

Freely re-distributable software as its source codes is already publicized.

(*9) CMS (Contents Management System) :

One of site configuration supporting tool which enables user to send/receive information on the web that does not require technical knowledge if the user can prepare the contents (texts, images, etc.) that he/she wishes to publicize. CMS is able to manage contents information such as texts, images and layouts, etc. centrally. In a broad sense, CMS can also be referred as the software that can be used for digital contents management, generic name of system, etc.

(*10) Third Party (3rd Party) :

Manufacturer who produces products compatible with the other manufacturers' software/hardware.

(*11) Account :

Privilege which allowing legitimate user to use resources on computers and/or on the Internet.

(*12) Cookie:

Mechanism which enables user to send/receive user information and/or accessing information in between web servers and browsers.

The details are as follows:
- Attachment 1 Computer virus Incident Report [Details]
- Attachment 2 Unauthorized Computer Access Incident Report [Details]

- Attachment 3 Observation Status by Internet Monitoring System (TALOT2)

- Attachment 4 Computer virus Incident Report for the 3rd Quarter (July to September)

- Attachment 5 Unauthorized Computer Access Incident Report for the 3rd Quarter (July to September)

   


Contact
IT Security Center, Information-technology Promotion Agency, Japan (IPA/ISEC)
Tel:+81-3-5978-7527

Fax:+81-3-5978-7518

E-mail:






Term of Use


Copyright(c) Information-technology Promotion Agency, Japan. All rights reserved 2005