HOME >> IT Security >> information

Unauthorized Computer Access Report Status for 2006

January 31, 2007

  IT Security Center
Information-technology Promotion Agency , Japan (IPA)

This is a summary of unauthorized computer access report status from January to December, 2006 aggregated by IPA.

1. Reported Numbers

The annual reported number for unauthorized computer access for 2006 was 331 which decreased about 36% from 515 for the previous year. The following graph shows the shift in reported number accepted by IPA Security Center over the past 10 years.

Unauthorized Computer Access Over the Past 10 Years (1997-2006)

2. Reports Classified

For the 2006, the reported number for access probe was drastically decreased compared with the one in the 2005. The entire reported number was drastically decreased; however, the reported number for actual damage showed subtle decline (about 8%).

Reported Types for Unauthorized Computer Access for 2006

*1) “Access Probe (Attempt)” specifies that there are some attempts in relation to unauthorized computer access have been realized in server/firewall logs.
*2) Worm Probe refers there is not any of damage by infection even detected a certain access by worm(s).

Reported Type 2006 2005
Intrusion 94 98
Unauthorized Mail Relay 1 8
Worm Infection 16 8
DoS 12 21
Source Address Spoofing 7 6
Others (Damaged) 32 35
Access Probe (Attempt) 159 325
Worm Probe 5 7
Others (Not Damaged) 5 7
Total 331 (162) 515 (176)

3. Damage Contents

The following graph and chart are the types of damage contents for actually damaged in the entire reports. The number of damage contents showed subtle increase of about 11%. Number of damage reports relevant to alteration/modification of files (including embedding malicious codes) and homepages were reported.

Damage Contents Causeed by Unauthorized Computer Access for 2006

Damage Contents 2006 2005
Unauthorized Mail Relay 2 9
Server Downing 0 6
Creation of Unauthorized Accounts 1 4
Alteration of Home Pages 34 32
Password Theft 0 1
Service Lowering 16 16
Opened Proxy 0 1
Modification of Files 92 69
Others 84 68
Total 229 (*) 206 (*)

* Since actual reported number may contain multiple damage contents, the number of damage contents may not equal to the total of damage contents, accordingly.

4. Type of Reporter

As for the breakdown of reporters, the ratio from individual reporter was decreased , but was still taken over 58% among entire type of reporters. In contrary, the ratio from general corporation and education/research institution were increased: particularly, the number of reports from education/research institution was increasing. As for the entire tendency, it can be assumed that unauthorized computer accesses for attacks targeting corporations or individual users nondiscriminatory were unchangeably many.

Type of Reporters for Unauthorized Computrer Access

5. Damage Cause

Upon categorizing the reports for actually damaged by damage cause, insufficient ID/password management/configuration with 46 (cases) (28%), use of older version of patches/non-installation of patches with 31 (19%), insufficient configuration with 6 (4%) were the major causes of damage. There were 57 (35%) for which cause could not be identified: it can be assumed that there were number of instances for which causes were hardly identifiable and the methods for unauthorized computer accesses were getting sophisticated, as well.

Damage Cause for 2006

Damage Causes 2006 2005
Insufficient ID/Password Management / Setups 46 42
Use of Older Version/Patches are not Installed 31 28
Insufficient Setups 6 14
Unidentified 57 60
Others (DoS, etc.) 22 32
Total 162 176

6. Information of Countermeasures

As for the features of 2006, such damages intruding into system to attack the port used for SSH (the main cause was insufficient ID/password configuration) and exploiting vulnerability of Web and/or applications were outstandingly many. However, most of them were able to prevent if fundamental security measures were conducted. Accordingly, system administrators should confirm following items from the viewpoint of fundamental security to reconstruct comprehensive countermeasures.

  • Strict management/configuration of ID and password
  • Resolving security holes (preventive measures by operation is also included in case impossible to apply patches)
  • Configuration of routers/firewalls and/or configuration of access control
  • Frequently checking logs

In addition to the above mentioned, individual users should conduct following measures routinely.

  • Updating of OSs and application software such as Windows Update and/or Office Update
  • Configuration/management of your password (i.e., get it complexity, change it periodically, keep it secret from third person/party, etc.)
  • Confirming security configuration of wireless LAN and/or pc share
  • Activation of routers/firewalls

For System Administrators

For End Users/SOHO (Home) Users

Contact

IT Security Center, Information-technology Promotion Agency, Japan (IPA/ISEC)
Tel:+81-3-5978-7527
Fax:+81-3-5978-7518
E-mail: Please feel free to call at +81-3-5978-7517.