Information-technology
Promotion Agency,
Japan
$BK\J8$X(B
IPA

TOP|Aplication|Contact us|Sitemap


Information-technology Promotion Agency, Japan
-japanese charactor-






IT Security Center

The Information-technology SEcurity Center (ISEC) is the center for promoting information security in Japan.









Japanese




Activities




Information Service Activities






Security Software Development Activities






CRYPTREC






IT SecurityAssurance







Organization







PGP key







RFCs







Mission Statement







Links







About IPA/ISEC







IPA TOP>IT Security Center Japanese TOP>IT Security Center English TOP>information




Computer Virus / Unauthorized Computer Access Incident Report [Summary]


November 27, 2006
IT Security Center
Information-technology Promotion Agency, Japan (IPA)

This is a summary of computer virus/unauthorized computer access incident reports for October, 2006 compiled by IPA.

Reminder for the Month:

“Be sure to Discard (Delete) Unknown/Suspicious Mails Immediately!!”

- To prevent damages caused by virus appended on e-mail, simply discard them without opening it even it seems interested!! -

Currently, number of consultation filed with IPA is that user his/herself introduced virus, etc. This was initially caused receiving suspicious mail from unknown sender and the user was fooled by fabulous home page to import virus and malicious codes, etc. by clicking buttons in accordance with the guidance. (Please refer to the instance (i), consultation status on III. Accepting Status for Consultation )

Opening the files appended to e-mail curiously even knowing that there's no relevance and they are spams, it is riskier that you will face damage such as infected by virus, etc. In addition, their technology is getting more sophisticated to have user clicks buttons to introduce virus, spyware, etc. deceiving user as if they seem to be just advertisement mails.

Once infected, your computer will be high-jacked or your private information will be leaked etc. Thus, it is essential measure to immediately discard (delete) suspicious mails without even opening them.

Following are the variety of suspicious mails. In case you will receive it, be sure to discard (delete) them immediately without clicking its links and/or files appended in principal.

Congratulations! You won Prize!

The subjects actually used for spam mails are as follws.

- Privileges as a VIP membership

- Up-to-dated industrial news

- Looking for new monitors!

- We are urgently looking for new companies! Go for it to earn $20.000.00 a month!

- You successfully won prizes! You got a Coupon for $100.00…so on

Those spam mails you must pay attention to are commonly classified by 4 categories by its nature, etc. Following are the fundamental descriptions for the 4 categories. In addition, you are to be cautious that some of them include viruses, etc.

(1) Spam such as indiscriminant ads, etc.

Instance

-   Assuming from its subject, it may be an ad mail not interested in.

-   Such mails continuously send from same address.

Some spam mails include home page address in its mail body. Once you click it, you will be induced to home pages with no relevance and you may face damage such as virus infection, etc.

(2) Sender is differed each time, but the contents are same

Instance

-   Sender is differed, but the subject and its contents are always the

    same.

-   Sender and the subject are differed, but its contents are always

    the same.

These can be virus mails which spread infection by sending amount of mails: you are to be cautious as you will likely to be infected by virus if you open them unconsciously.

(3) Both sender and contents are unknown

Instance

-   Ad mails, etc. which you'd never signed up for subscription.

-   Such mails announcing you that you won a prize.

These mails fool user that they can obtain some prize free of charge. Accordingly, they require user to input private information so displays. Once the user input private information such as own mail address, name or address, etc. they might take private information fraudulently.

(4) Known sender, but its subject is strange or feel some difference in its contents

Instance

-   The sender with whom I exchange mails uses Japanese, but the

    latest one received was written in foreign language.

-   The sender never append file to his/her e-mail, but the latest mail

    I received was file appended.

These mails likely to be virus mail spoof to be source mail address , and thus you will get damaged if you open the file appended. Accordingly, if you receive such mail, make sender a phone call to confirm security before you open it.


In the instances above mentioned so called spam (advertisement) mails, you may find following message saying “if you wish to stop distribution, please contact us to the mail address below.” along with the contact address. Trusting such message and sending the mail back to stop for distribution allows spam sender know that your mail address is existed and actually used. Thus the sender will get another chance to use your mail address with malicious intents and spam mails, etc. increase. It is important that you should never try to send the mail back to spam sender and better to ignore them.

 

I. Reporting Status for Computer Virus for further details, please refer to the

   Attachment 1

The detection number [1] of virus was about 1.17M: decreased to 11.5% from 1.05M reported in September. In addition, the reported number [2] of virus in October was 3,696: increased from 4.1% from 3,551 reported in September.


[1]Detection number:

Reported virus counts (cumulative) found by a filer.

[2]Reported number:

Virus counts are aggregated: viruses of same type and variants reported on the same day are counted as one case number regardless how many viruses or the actual number of viruses is found by the same filer on the same day. In August, reported number was 3,435: aggregated virus detection number was about 1.1M.


The worst detection number was W32/Netsky with about 0.78M and W32/Stration with about 0.22M and W32/Mytob with about 0.04M were subsequently followed.

Detection Number of Virus about 1.17M (about 1.05M) +11.5%

Chart 1-1

Reported Number of Virus 3,696 (3,551) +4.1%

Chart 1-2

 

Be Cautious with the Spreading of W32/Stration:

It is necessary to be cautious that the W32/Stration which emerged in August 2006 is continually existing and spreading its variants in October following to September.

This virus spreads by files appended to e-mails. When you open the files appended to e-mails, you will be infected by virus and you will send similar virus mails to the mail addresses saved in your computer.

Additionally, some of the variants induce user to the site which may be prepared by virus author to have the user downloads his/her computer spyware, etc. and the user may face certain damage such as information leakage, etc.

Furthermore, rootkit (*1) is also installed to the computer simultaneously; it is hard to develop the virus after its infection. Since this virus (variants) does not show viewable symptoms, user tends to spread virus mails without knowing that he/she is being infected.

It enlarges damages and is hard to respond after being infected; be sure not to open file appended to e-mail easily.

Following are the subjects and the file names most frequently appended to e-mails by the variants of W32/Stration which is currently spreading.

 

Subject

File names Mostly Appended to e-mails

( 1 )

This is not shown on TV.

picture3135.zip

( 2 )

This is not shown on TV.

picture7484..gif.   exe

( 3 )

Liven War real pictures.

picture2812..bmp.   exe

( 4 )

This must be seen by everyone.

picture6720..jpg.   exe

( 5 )

Server Report

text.txt.exe

( 6 )

URGENT NEWS!

last.exe

( 7 )

ATTN

about me.exe

( 8 )

NEWS!

latest news.exe

( 9 )

READ AND RESEND ASAP!

truth.exe

In the examples (2), (3) and (4) above, the variant uses the file name that includes double extensions and additional spaces behind the file name for which the variant has the receiver not to realize the extension “.exe” in the end of the name and it seems as if it is an image file.

In the other examples use “News” to showcase subjects and their file names to collect receivers' attention.

<Reference>

“Reporting Status for Computer Virus/Unauthorized Computer Access for September and for the 3 rd Quarter”

http://http://www.ipa.go.jp/security/english/virus/press/200609/E_PR200609.html

 

II.   Reporting Status for Unauthorized Computer Access (includes consultation) – Please refer Attachment 2 –

Report for unauthorized computer access and Accepting Status of consultation

 

May

June

Jul.

Aug.

Sept.

Oct.

Total for Reported (a)

13

22

15

50

46

22

 

Damaged (b)

6

20

8

30

21

15

Not Damaged (c)

7

2

7

20

25

7

Total for Consultation (d)

23

32

31

24

35

53

 

Damaged (e)

11

19

18

13

26

37

Not Damaged (f)

12

13

13

11

9

16

Grand Total (a + d)

36

54

46

74

81

75

 

Damaged (b + e)

17

39

26

43

47

52

Not Damaged (c + f)

19

15

20

31

34

23

(1). Reporting Status of Unauthorized Computer Access

The reported number for October was 22: of 15 was the number actually damaged.

(2). Accepting Status of Consultations relevant to Unauthorized Computer Access, etc.

Consultation counts relevant to unauthorized computer access was 53: of 37 (of 11 was also counted as reported number) was the actual number that some sort of damage was reported.

(3). Status for Damage

Breakdown of the damage report includes: Intrusion with 8, Infection w/Worms with 1 and Dos Attack with 1, etc . Breakdown of the reported damages caused by intrusion included: alteration of Web pages with 3, being to be steppingstone to attack to the other site with 2 and malicious codes were embedded to exploit phishing with 1, etc. The cause of intrusion included such instances that the password was analyzed attacked by the password cracking (*4) attack to the ports (*3) used for SSH (*2) with 1.

As for the other damages, the instances that the accounts (*5) used for web mails, etc. was used by someone without asking and the user's private information was altered and/or his/her mails were deleted, etc. with 3.

Damage Instances:

[Intrusion]

(i) Attack to the port which is used by SSH

<Instance>

-   While configuring server's operational environment, our work was stopped by some extra factors.

-   Study was conducted and realized that the password cracking attack was conducted to analyze the password for SSH used upon logging in to the port and was intruded into the server.

-   Additionally, bot (*6) programs and port scan tools (*7) were also embedded in the server and they were being run. There developed some attempts to embed the tool for DoS attack (*8) to the outside servers as well. Moreover, some programs run within the server were infected by virus and the infection was spread to the other files in the server.

(ii) Account was used without asking

<Instance>

-   When trying to log in to the major portal site using my account, such message saying “your password is incorrect” was displayed and could not log in to that site.

-   Just to make it sure, tried to access to the other free mail address signed up as the secondary mail address when prepared the account for the portal site, the message saying “confirmation of alteration for your mail address signed up” was arrived.

-   In addition, realized that some items which I do not know were being listed on the auction service provided by that site using my account.

 

III. Accepting Status of Consultation

The gross number for the consultation for October was 1,002. Of the consultation relevant to “ One-click Billing Fraud ” was for 236 (September: 223), the consultation relevant to “ High-pressured selling of software for security measures ” with 41 (August: 23) and the consultation relevant to “ Winny ” with 12 (March: 196, April: 83, May: 28, June: 15, July: 12, August 14, September: 9), etc.

Movement in entire number of consultation accepted by IPA

 

May

June

July

August

Sept.

Oct.

Total

846

773

767

793

933

1,002

 

Automatic Response System

484

423

444

460

575

580

Telephone

295

283

257

280

302

326

e-mail

63

64

66

48

51

93

Fax, Others

4

3

0

5

5

3

*IPA consults/advises for computer viruses/unauthorized computer accesses as well as the other information concerning overall security issues

Mail: ?????????? for virus issues, ????????????for crack issues.

Tel.: +81-3-5978-7509 (24-hour automatic response)

Fax: +81-3-5978-7518 (24-hour automatic response)

*The Total case number includes the number in Consultation (d) column of the Chart in the “III. Reported Status for Unauthorized Computer Access” and “IV. Accepting Status of Consultation”.

*”Automatic Response System”:   Accepted numbers by automatic response
*“Telephone”:                           Accepted numbers by the Security Center personnel

 

[Reference] Shift in the consultation number of one-click billing fraud

Monthly Consultation Number for One-click Billing Fraud

As for the measures about one-click billing fraud, please refer to the following sites.

Reminder for the month (for the month of January) “Malicious Codes may be Installed if you Ignore Alert!!”

http://www.ipa.go.jp/security/english/virus/press/200601/E_PR200601.html

Reporting Status of Computer Virus and Unauthorized Computer Access for September and the 3 rd Quarter

2. One-click Billing Fraud

http://www.ipa.go.jp/security/english/virus/press/200609/E_PR200609.html

Reporting Status of Computer Virus and Unauthorized Computer Access for August

2. Consultation Number for the Damages by One-click Billing Fraud is Unchangeably Many!!

http://www.ipa.go.jp/security/english/virus/press/200608/E_PR200608.html

[Reference] High-pressured Selling of Software for Security Measures-Movement in Consultation Number

Number of Consultation for High-pressured Selling of Software for Security Measures

As for the high-pressured selling of software for security measures, please refer to the following site.

Reminder for the month (for the month of April)

“Be Cautious with the High-pressured Selling Activities of Software for Security Measures!!”

http://www.ipa.go.jp/security/english/virus/press/200604/E_PR200604.html

The major consultations for the month are as follows.

(i) File is Appended to a Suspicious Mail in Japanese...

Consultation:

Following mail was come. Since the consulter has no personal acquaintance with the sender, he/she is still leaving it without opening it. To make it sure, he/she conducted virus check, nothing special was detected.

From: admin@ *. *.jp

To: * @ *.co.jp

Subject: Your computer may be infected by virus

Hello,

I am (Mr.) *** of **Co., Ltd., **Department.

When we were checking logs for our server computer, we have realized some dozen times of unauthorized computer access per second which maybe sent from your IP address of your computer.

In fact, our server cannot be operated properly and we think that this is the attack by the virus programs embedded to your computer.

Accordingly, we will be highly appreciated if you delete the virus immediately by using the delete_virus.exe file appended to this e-mail.

For your further reminders, if you leave your computer as it is now without taking certain measures, we are considering to send this case to the lawsuit as the Prohibition and Punishment of Unauthorized (Computer) Access and Forcible Obstruction of Business.

We will again, highly be appreciated your further consideration on this matter.

Sincerely,

How to remove virus:

1.Copy delete_virus.exe to an arbitrary folder in a computer.

2. Double click on the delete_virus.exe.

 

\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\

*** (Mr.)

** Co., Ltd., ¦¦ Department

Tel: XXX-XXX-XXXX (Main)

admin@ *.*.jp

\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\

Response:

When rechecked the file appended, Trojan Horse Type of virus was detected. In this case, it is possible that someone attempted to trap by virus targeting specific addressees with malicious intents. Be cautious with the mails sent from unknown sender. More specific, if some file is appended to suspicious mail, be sure not to open it and delete the mail itself immediately. In many cases, sophisticated wording technique is used in that mail to have the receiver open the appended file, be cautious not to believe everything in there.

(ii) Is it Possible to Check Whether Certain Information is Leaked by Winny…?

Consultation:

The consulter had quit using Winny as he/she realized that his/her computer was infected by Antinny virus when he/she previously used Winny. The virus itself was already removed: however the consulter is seeking the method to check if his/her private information is being leaked or not.

Response:

As for general users, it is very hard to check with or without of information leakage. There is an option to use professional service, it probably be very much costly to pay by individual. Accordingly, the best measure to be taken is to report the facts to the involved personnel within your organization and/or relevant parties outside to review for subsequent measures.

Data collection once deviated on file sharing network is impossible. You are to realize that you are the next neighbor to the risk each time you use the file sharing network.

 

(Reference)

IPA – To Prevent from Information Deviation by Winny (in Japanese)

http://www.ipa.go.jp/security/topics/20060310_winny.html

IPA – The 7 Anti-Virus Requirements for PC Users (in Japanese)

http://www.ipa.go.jp/security/antivirus/7kajonew.html

 

IV. Accessing Status Captured by the Internet Monitoring (TALOT2”) in October

According to the Internet Monitoring (TALOT2), the total of unwanted (one-sided) number of access in October 2006 was 416,676 for 10 monitoring points. The number of access was 1,437 from 305 source addresses/monitoring point/day.

Each monitoring environment for the TALOT2 is nearly equal to the general connection environment used for the Internet; it can be considered that the same amount of unwanted (one-sided) access can be monitored for the general Internet users' connection environment. In another word, your computer is being accessed from 305 unknown source addresses in average/day or you are being accessed from 5 times from one source address which considered unauthorized.

Number of Access and Source Number of Access in Average/Monitoring Point/Day

Chart 1: Number of Access and Source Number of Access in Average/Monitoring Point/Day

The Chart 1 shows the number of access and the source number of access in average for 1 monitoring point per day from April to October, 2006. According to this chart, unwanted (one-sided) accesses were tending to increase since July . The entire number of access was, however, being stabled.

In October, there were number of accesses which might have been considered to be file exchange related: otherwise the accessing status in October was almost the same with the one in September. Upon comparing with the Chart 4.2 and the 4.3, it is realized that the number of access relevant to file exchange was outstandingly many. As for the accesses to the ports which may considered to be file exchange related were eliminated from the statistic information, we have described the status of these accesses underneath as the topics for this month.

First, here describes about file exchange. File exchange refers to directly exchange files (data) in between specific computers using file exchange software. There are number of methods to exchange files, but two major methods are mainly used: one way is to establish a file exchange network in which the server controlling information for file exchange functions as its hub and the other is to establish a file exchange network by number of computers via file exchange software.

Such computer exchanging files is generally identified by the IP address that the computer uses. Exchangeable file information and information for the IP address, etc. are exchanged back and forth on the file exchange network.

However, such computer for general internet user is allocated an IP address available on the network dynamically via the provider where the user signed up with. Accordingly, such IP address used by the computer for file exchange is differed each time it is connected to the network. Consequently, even the computer exchanging files is disconnected from the network; it is likely that the information for previous IP address is remained on the file exchange network. This remained IP address is allocated to the other user's computer via the same provider; and the other computer for file exchange requests connection (access) to that computer. It can be considered that the most of accesses in the following graph may indicate such access in the above mentioned conditions.

Accesses which Considered to be File Exchange Related

Chart 2: Transition in Number of Access which Considered to be File Exchange Related in October 2006

Source areas for these accesses are as follows:

-   Most of source area for the accesses to the port 4662 (TCP) is accessed from Spain area

-   Most of source area for the accesses to the port 6346 (TCP/UDP) is accessed from domestic (within Japan )

-   Most of source area for the accesses to the port 11418 (TCP/UDP) is accessed from Taiwan

-   Most of source area for the accesses to the port 40007 (TCP) is accessed from domestic (within Japan )

-   Most of source area for the accesses to the port 6881 (TCP) is accessed from domestic (within Japan )

Since there are some malicious users who exchange data with copyright illegally, some file exchange network in which server functions as its kernel was driven to close, those users who illegally exchanged data were arrested, etc. In addition, it causes information leakage via file exchange; the activity of file exchange itself tends to be a problem.

The port 4662 (TCP) with highest number of access in the Chart 2 seemed to be the access using the file exchange software called eDonkey. Since the server for the eDonkey is closed or its software is stopped for distribution mainly in Europe ; it seems that the accesses to the port is drastically increased to download the file in haste.

(Reference)

International Federation of the Phonographic Industry Sent 8,000 Cases of Illegal File Exchanges to Lawsuit in the 17 Nations (October 18, 2006) (in Japanese)

http://internet.watch.impress.co.jp/cda/news/2006/10/18/13661.html

Ratio for the Number of Access Classified by Source Area which Considered to be eDonkey

Chart 3: Ratio for the Number of Access Classified by Source Area which Considered Accessed by eDonkey

Upon concentrating such accesses to specific IP address, it can be considered that the port is conducted by DoS attack. These accesses mainly cause when file exchange is automatically conducted: file exchange users should understand such condition in advance and check the destination for the file exchange upon accessing.

Furthermore, there causes number of problems relevant to information leakage via file exchange; users should understand the mechanism of file exchange and pay further attention upon using.

For the additional information, please refer to the following site.

Attachment 3_Observation Status Captured by the Internet Monitoring (TALOT2)

http://www.ipa.go.jp/security/english/virus/press/200610/TALOT200610.html

 


“Various Statistics Information Provided by Other Organizations/Vendors are Publicized in the Following Sites”


@police:      http://www.cyberpolice.go.jp/english/
Trendmicro: http://www.trendmicro.com/en/home/us/home.htm
McAfee:      http://www.mcafee.com/us/


“Interpretation for Glossaries”

(*1) Root-kit :

Set of software package which is used by attacker after he/she intrudes a computer fraudulently. Generally, the package includes log alteration tool, backdoor tool, group of system commands being altered.

(*2) SSH (Secure Shell) :

A protocol or a program used for log-in to another computer via the network, execute commands by a computer remotly and transfer files to another computer. Since data via the network is encrypted, a series of operations through the Internet can be conducted safely.

(*3) Port :

A window interfaces each service within a computer used for exchanging information with outsides. Numbers from 0 to 65535 are used for the ports so that they are also called Port Number.

(*4) Password Cracking :

The approach to identify anyone else's password by analyzing, etc. Approaches include brute-force attack, dictionary attack, etc. and there is the code for exclusively crack as well.

(*5) Account :

Privilege which allowing legitimate user to use resources on computers and/or on the Internet.

(*6) Bot :

A kind of computer virus. It was created to manipulate an infected computer from outside through a network (the Internet).

(*7) Port Scan Tool :

The tool seeks security holes (vulnerabilities) from the information for applications, OSs , etc. running in a server and is frequently used for preparatory activities for intrusion.

(*8) DoS Attack (Denial of Services Attack) :

The attack which sends quantity of data to have the server excessive load to lower its performance significantly or to have the server disables its function.

The details are as follows:
- Attachment 1 Computer virus Incident Report [Details]
- Attachment 2 Unauthorized Computer Access Incident Report [Details]

- Attachment 3 Observation Status by Internet Monitoring System (TALOT2)

   


Contact
IT Security Center, Information-technology Promotion Agency, Japan (IPA/ISEC)
Tel:+81-3-5978-7527

Fax:+81-3-5978-7518

E-mail:






Term of Use


Copyright(c) Information-technology Promotion Agency, Japan. All rights reserved 2005