Information-technology
Promotion Agency,
Japan
$BK\J8$X(B
IPA

TOP|Aplication|Contact us|Sitemap


Information-technology Promotion Agency, Japan
-japanese charactor-






IT Security Center

The Information-technology SEcurity Center (ISEC) is the center for promoting information security in Japan.









Japanese




Activities




Information Service Activities






Security Software Development Activities






CRYPTREC






IT SecurityAssurance







Organization







PGP key







RFCs







Mission Statement







Links







About IPA/ISEC







IPA TOP>IT Security Center Japanese TOP>IT Security Center English TOP>information




Computer Virus / Unauthorized Computer Access Incident Report [Summary]


February 26, 2007
IT Security Center
Information-technology Promotion Agency, Japan (IPA)

This is a summary of computer virus/unauthorized computer access incident reports for January, 2007 compiled by IPA.

Reminder for the Month:

“Be Sure not to Forget to Update!”

- Update your Windows and Anti-virus Software Routinely! -

W32/Fujacks is the virus exploiting security holes in Windows to infect those computers whose users do not conduct Windows Update. From December 2006 to January 2007, number of its consultation and the reports are filed with IPA from individual users.

Overview of the Virus:

If a user leaves to resolve the security holes in one Windows function used by the software upon accessing to database, W32/Fujacks automatically infects when the user browses the web contents being infected by the virus. Be sure to conduct Windows Update constantly to prevent infection accordingly.

When infected by the virus, you will face such damages, i.e., your private information is stolen by spyware being embedded or important files are deleted, etc. Some of W32/Fujacks variants convert icons of infected files that have “.exe” extensions into a picture of panda burning joss-sticks are reported (refer to the Chart 1 below.).

Sample of Icons being Infected by the Variants of W32/Fujacks

Chart 1: Sample of Icons being Infected by the Variants of W32/Fujacks

Those files that have “.exe”, “.thm”, “.php”, “.asp” and “.jsp” as their extensions are the targeted files for infection. Since these files are mainly used upon creating homepages, there may be a case to publicize infected files on the website. As the result, such infected files are publicized on the sites for renowned businesses and/or on the sites for individual users. There were some reports being infected when simply accessed to that site.

Most of all traditional viruses infect via e-mails; in contrary, this virus infects via e-mails as well as via websites as its paths; users need to be further cautious since “ it is risky to get infected simply browsing typical websites ”.

The Instances of Enlarging Infection:

When W32/Fujacks runs, it infects to those files that have “.exe”, “.htm”, “.asp”, “.php” and “.jsp”, etc. as their extensions in that computer. The virus can conduct dictionary attack as well: it analyzes password and infects to the files if easy password such as “admin” or “1234” is used as the administrator password in the other computer connected via the network with or in the file folders being shared.

When W32/Fujacks infects, it appends IFrame* code on HTML files (refer to the Chart 2.). In the “width=0 height=0” code, the virus sets size 0 x 0 frame, there will be nothing displayed specifically when browsing website. In addition, the URL being coded will be the links to the sites to have downloads the virus.

Accordingly, those who create homepages in corporation or individual update their homepages, etc. without realizing virus infection; HTML contents files being infected will be publicized as its result.

In the event, when a user accesses to the homepage, the user will face damage. The virus attempts the user accessing to the sites designated by the IFrame* tags without realizing and downloads the files, etc. being infected by the virus in that sites.

Those who create homepages should confirm with or without of unknown IFrame tags at the end of the HTML source before publicizing web contents.

IFrame* (Inline Frame): One of HTML tags which creates an inline frame that contains another document.


 *IFrame (Inline Frame): One of HTML tags which creates an inline frame that contains another document.


Example of HTML File Infected

Chart 2: Exsample of HTML File Infected

To prevent from such damages or to prevent enlarging infection by the virus, be sure to conduct following countermeasures:

Countermeasures:

-   Resolve security holes (or updating OSs and applications)

-   Conduct virus scan regularly while updating the virus signatures of anti-virus software

-   Do not open the attachment file to suspicious e-mail

-   Check HTML source before updating web contents

Information relevant to anti-virus measures:

Information for anti-virus software (in Japanese)

http://www.ipa.go.jp/security/antivirus/vacc-info.html

Five must-dos for dealing with files attached to email (in Japanese)

http://www.ipa.go.jp/security/antivirus/attach5.html

Seven anti-virus requirements for computer users (in Japanese)

http://www.ipa.go.jp/security/antivirus/7kajonew.html

Information relevant to resolving method for security holes (in Japanese)

“Procedure for the Usage of Windows Update (Microsoft)”

http://www.microsoft.com/japan/athome/security/square/guard/WU5Steps.mspx

 

I. Reporting Status for Computer Virus further details, please refer to the

   Attachment 1

The detection number [1] of virus for January was about 1.02M and was decreased 22.2% from 1.31M reported in December. In addition, the reported number [2] of virus

was about 3,513 and was decreased 9.4% from 3,212 reported in December.


[1]Detection number:

Reported virus counts (cumulative) found by a filer.

[2]Reported number:

Virus counts are aggregated: viruses of same type and variants reported on the same day are counted as one case number regardless how many viruses or the actual number of viruses is found by the same filer on the same day. In December, reported number was 3,212: aggregated virus detection number was about 1.31M.

The worst detection number was for W32/Netsky with about 0.62M, W32/Nuwar with about 0.14M and W32/Stration with about 0.09M were subsequently followed .

Detection Number of Virus about 1.02M (about 1.31M) -22.2%

Chart 1-1

Reported Number of Virus 3,513 (3,212) +9.4%

Chart 1-2

 

II. One-click Billing Fraud

The number of consultation about “one-click billing fraud” for January 2007 was 233 : the number was drastically increased from 155 and 130 being reported in November and December respectively.

The main cause taking over for 2006 was the damages by clicking at adult sites; however in January 2007, it was converted to those sites for the information relevant to entertainers' sites where inducing user suspicious sites .

Among consultation instances accepted by IPA, of some were being filed with the damage caused by one-click billing fraud while a user searching certain entertainer's animated movies or images. You are to be cautious as there is some risk facing billing fraud even you do not intend to browse adult sites.

Most of damages were caused by downloading malicious codes such as virus, etc.: Upon clicking the items relevant to membership registration in an entertainer's site, the user will be sent to an adult site without knowing and where the user simply clicks images or animated movies believing that they are free; then virus, etc. will automatically be downloaded.

If you simply wish to display movies or images, “Security Alert” won't be displayed, but download program files. Accordingly, it is possible to download malicious codes by clicking “Run” or “Save” unless you attempt to download programs intentionally, be sure to click “Cancel” and do not go forward.

Download of File ? Security Alert

Please feel free to consult with IPA if you faced damage from malicious codes, etc. (please refer to the IV. Accepting Status of Consultation on p8.)

 

III. Reporting Status for Unauthorized Computer Access (includes Consultations) Please refer to the Attachment 2 –

Report for unauthorized computer access and status of consultation

 

Aug.

Sept.

Oct.

Nov.

Dec.

Jan.'07

Total for Reported (a)

50

46

22

24

10

32

 

Damaged (b)

30

21

15

8

9

22

Not Damaged (c)

20

25

7

16

1

10

Total for Consultation (d)

24

35

53

30

40

52

 

Damaged (e)

13

26

37

20

23

25

Not Damaged (f)

11

9

16

10

17

27

Grand Total (a + d)

74

81

75

54

50

84

 

Damaged (b + e)

43

47

52

28

32

47

Not Damaged (c + f)

31

34

23

26

18

37

(1). Reporting Status of Unauthorized Computer Access

Reported number for January was 32: of 22 was the number actually damaged.

(2). Accepting Status of Consultations relevant to Unauthorized Computer Access, etc.

Consultation counts relevant to unauthorized computer access was 52: of 25 (of 3 was also counted as reported number) was the actual number that some sort of damage was reported.

(3). Status for Damage

Breakdown of the damage report includes: Intrusion with 1, Source Address Spoofing with 2 and others (damaged) with 19 . Breakdown of the reported damages caused by intrusion included: alteration of files with 1. The cause of intrusion was being exploited vulnerability in web server software.

Damage Instances:

[Intrusion]

(i) Attack of Homepage 

<Instance>

-   This business's site might have been altered so communicated from a user who browsed the site.

-   Study by a homepage manager was conducted: it is realized that some very political or religious contents that they do not know had been placed on a program folder in the website run using a hosting service (*1).

-   Since any suspicious contents on the access log of ftp could not be found, it may have been intruded by exploiting the vulnerability in the web server software.

[Others (Damaged)]

(ii) Damage by Bot

<Instance>

-   Suspicious IRC (*2) communication and/or port scans to 445/tcp in the network on campus were detected.

-   Study by the network administrator was conducted, it was realized that several computers on the campus were infected by bot.

 

IV. Accepting Status of Consultation

The gross number for the consultation for January was 946 . Of the consultation relevant to “ One-click Billing Fraud ” was 233 (December: 130), the consultation relevant to “ High-pressured selling of software for security measures ” with 13 (December: 15) and the consultation relevant to “ Winny ” with 17 (December: 15), etc.

Movement in entire number of consultation accepted by IPA

 

August

Sept.

Oct.

Nov.

Dec.

Jan. '07

Total

793

933

1,002

711

680

946

 

Automatic Response System

460

575

580

423

394

582

Telephone

280

302

326

214

222

324

e-mail

48

51

93

72

59

39

Fax, Others

5

5

3

2

5

1

*IPA consults/advises for computer viruses/unauthorized computer accesses as well as the other information concerning overall security issues

Mail: ?????????? for virus issues, ????????????for crack issues.

Tel.: +81-3-5978-7509 (24-hour automatic response)

Fax: +81-3-5978-7518 (24-hour automatic response)

*The Total case number includes the number in Consultation (d) column of the Chart in the “III. Reported Status for Unauthorized Computer Access” and “IV. Accepting Status of Consultation”.

*”Automatic Response System”:   Accepted numbers by automatic response
*“Telephone”:                           Accepted numbers by the Security Center personnel

 

<Reference> Shift in the consultation number of one-click billing fraud

Consultation Number of One-click Billing Fraud

Please refer to the following link for the measures for one-click billing fraud.

Reminder for the month (for the month of January) “Malicious Codes may be Installed if you Ignore Alert!!”

http://www.ipa.go.jp/security/english/virus/press/200601/E_PR200601.html

Reporting Status of Computer Virus and Unauthorized Computer Access for September and the 3 rd Quarter

2. One-click Billing Fraud

http://www.ipa.go.jp/security/english/virus/press/200609/E_PR200609.html

Reporting Status of Computer Virus and Unauthorized Computer Access for August

2. Consultation Number for the Damages by One-click Billing Fraud is Unchangeably Many!!

http://www.ipa.go.jp/security/english/virus/press/200608/E_PR200608.html

<Reference> Shift in the consultation number for High-Pressured Selling of Security Software

Consultation Number of High-pressured Selling of Security Software

As for the activities of high-pressured selling of security software, please also refer to the following link.

Reminder for the month (for the month of April)

“Be Cautious with the High-pressured Selling Activities of Software for Security Measures!!”

http://www.ipa.go.jp/security/english/virus/press/200604/E_PR200604.html

The major consultations for the month are as follows.

(i) Deceived by the mail masquerading to be the Internet settling service?!

Consultation:

Conducted remittance activity electronically via the Internet settling service and received the mail informing that the remittance was successfully done. However, again, I was urged to do so via another mail. Then I inquired to the settling service and realized that they'd not mailed me other than the mail informing that the remittance was done. The mail urging me to input private information seemed to be a fake one.

 

Response:

It seems that this user faced a phishing (*3) fraud. It is effective to change mail address and/or credit card numbers to prevent subsequent damages. In case private information is illegally used, it is possible that the purchasing history of the products that the legitimate user does not know will be included in his/her credit card billing statement. When facing such troubles, be sure to communicate with the credit card company where the user is dealing with. It is also good to consult with the consumer center near his/her area.

<Reference>

National Consumer Affairs Center of Japan

http://www.kokusen.go.jp/map/

(ii) About Security Countermeasures

Consultation:

Implementing certain security software is enough to fight against viruses and spyware? Are there any other measures?

Response:

Although anti-virus and/or anti-spyware measures software are implemented, it still remains some risks that they may not detect unknown unauthorized programs so they are not totally safe. As for the other preventive means, following MUST DOs can be considered.

-Maintain all the programs you are using up-to-dated.

-Do not open the files for which source is not identifiable.

-Do not browse suspicious sites.

-Disable the function of each script at a web browser.

In addition, implementing software such as personal firewall, etc. where configuring in which legitimacy on those programs identified can only connect to the Internet: this ensures to prevent important/private information deviation in case unauthorized program is being embedded.

<Reference>

Ministry of Economy, Trade and Industry – CHECK PC! Campaign (by March 31, 2007) (in Japanese)

http://www.checkpc.go.jp/

 

IPA – Security Alert Towards the Damage Prevention by Spyware (in Japanese)

http://www.ipa.go.jp/security/topics/170720_spyware.html

 

V. Accessing Status Captured by the Internet Monitoring (TALOT2”) in January

According to the Internet Monitoring (TALOT2), the total of unwanted (one-sided) number of access in January 2007 was 492,760 for 10 monitoring points. That is, the number of access was 1,590 from 390 source addresses/monitoring point/day.

Each monitoring environment for the TALOT2 is nearly equal to the general connection environment used for the Internet; it can be considered that the same amount of unwanted (one-sided) access can be monitored for the general Internet users' connection environment. In another word, your computer is being accessed from 390 unknown source addresses in average/day or you are being accessed from 4 times from one source address which considered unauthorized.

Number of Access and Source Number of Access/Monitoring Point/Day in Average

Chart 5.1: Unwanted (One-sided) Number of Access and Source Number of Access/Monitoring Point/Day

The Chart 5.1 shows the number of access and the source number of access/monitoring point/day in average from August 2006 to January 2007. According to this chart, the unwanted (one-sided) accesses are slightly increased compared with December. Such tendencies are caused by the access increases of Ping (ICMP* ) and newer vulnerabilities in a computer being targeted.

The entire access contents are being stabled: it can be considered that the most of accesses are the infection activity of bot (such accesses attempt to enlarge bot infection targeting vulnerability in computers) from the computers being infected by bot.

The accessing status in January 2007 is almost the same with the one in December 2006 entirely: the access increase of Ping (ICMP) and such accesses targeting vulnerabilities in Symantec Client Security and Symantec AntiVirus (such accesses to the port 2967/tcp) are continually increasing as it is previously described.


* Internet Control Message Protocol: such protocol which checks if the other side of computers are being operated or not.


Since the TALOT2 monitors accesses over the Internet one-sidedly, it does not respond to the access of Ping (ICMP). Accordingly, the TALOT2 cannot monitor the following accesses in case responded to Ping (ICMP); they can be considered such accesses which check whether the computers being targeted for attacks are in operation.

Number of Access Classified by the Source Area of Ping(ICMP)

Chart 5.2: Ping (ICMP) Accesses

The Chart 5.2 shows the shift in the number of access classified by the source area of Ping (ICMP), the Ping (ICMP) access increase from China area is remarkable. As for the accesses from the other source areas, they are being maintained at a certain water levels (with subtle increase).

For the additional information, please refer to the following site.

Attachment 3_Observation Status Captured by the Internet Monitoring (TALOT2)

http://www.ipa.go.jp/security/english/virus/press/200701/TALOT200701.html

 


“Various Statistics Information Provided by Other Organizations/Vendors are Publicized in the Following Sites”


@police:      http://www.cyberpolice.go.jp/english/
Trendmicro: http://www.trendmicro.com/en/home/us/home.htm
McAfee:      http://www.mcafee.com/us/


“Interpretation for Glossaries”

(*1) Hosting Service :

The business which rents a client disk capacity within a web server partially for which is being connected to the Internet and publicized. It can also be referred as rental server.

(*2) IRC (Internet Relay Chat) :

A chat (a real time conversation in between the users connecting to the Internet) system. Upon accessing to the IRC server on the Internet using exclusive software, a user can exchange messages among multiple users via the system. Users can also exchange files via the system.

(*3) Phishing :

Spoofing or masquerading to be the mail or the web pages of existed businesses illegally such as banking, etc. to exploit legitimate user IDs and passwords who previously opened or browsed such mails or web pages. “Fishing” is the word origin of “phishing”, but there are several theories such as “f” was exchanged by “ph” according to hackers' naming convention, coined word for which origins were “sophisticated” and “fish” or shortened word form of “password harvesting fishing”, etc.

 

The details are as follows:
- Attachment 1 Computer virus Incident Report [Details]
- Attachment 2 Unauthorized Computer Access Incident Report [Details]

- Attachment 3 Observation Status by Internet Monitoring System (TALOT2)

   


Contact
IT Security Center, Information-technology Promotion Agency, Japan (IPA/ISEC)
Tel:+81-3-5978-7527

Fax:+81-3-5978-7518

E-mail:






Term of Use


Copyright(c) Information-technology Promotion Agency, Japan. All rights reserved 2005