Information-technology
Promotion Agency,
Japan
$BK\J8$X(B
IPA

TOP|Aplication|Contact us|Sitemap


Information-technology Promotion Agency, Japan
-japanese charactor-






IT Security Center

The Information-technology SEcurity Center (ISEC) is the center for promoting information security in Japan.









Japanese




Activities




Information Service Activities






Security Software Development Activities






CRYPTREC






IT SecurityAssurance







Organization







PGP key







RFCs







Mission Statement







Links







About IPA/ISEC







IPA TOP>IT Security Center Japanese TOP>IT Security Center English TOP>information




Computer Virus / Unauthorized Computer Access Incident Report [Summary]


March 28, 2007
IT Security Center
Information-technology Promotion Agency, Japan (IPA)

This is a summary of computer virus/unauthorized computer access incident reports for February, 2007 compiled by IPA.

Reminder for the Month:

“You are Constantly Targeted by Someone from Somewhere”

- Be sure to conduct fundamental measures using security functions such as OSs , etc. -

According to the TALOT2 (Internet monitoring system by IPA), such access which might exploring the computer whose security holes on the Internet have not yet been measured are getting increased from the last half of 2006.

Numbver of Access and Source Number of Access/Monitoring Point/Day in Average

The one can be considered is the purpose of such access might be attempting to infect computers malicious codes such as bot, worm, etc. It is necessary to recognize that your computer is likely to be fraudulently accessed upon connecting to the Internet as there is variety of threats which attempting to access your computer illegally.

To protect your computer from such unexpected events, we encourage you to resolve security holes (updates of software in your OSs or Software you are using) as well as to use of firewall such as Windows firewall embedded in that OSs , etc. If your Windows firewall is configured as [disabled] because of the use of online games (this is not recommended configuration, though), be sure to get it back to [valid].

Note) Of 10 large Internet Service Providers (ISPs) share 80% of the Internet connection in Japan: here in IPA, we are monitoring in- and out-bound accesses on the Internet via ADSL which is nearly equal to the general Internet users' connection environment and to analyze illegal attempts which exploiting vulnerabilities. For further details, please refer to page 4 in the Attachment 4.

http://www.ipa.go.jp/security/english/virus/press/200702/TALOT200702overview.html

Please refer to the fundamental configuration to validate Windows firewall described as below.

-   As for Windows XP

Procedures: “Start” - “Configuration” - “Control Panel” - “Windows Security Center” - “Windows Firewall”

As for Windows XP

 

-   As for Windows Vista

Procedures: “ Windows” - “Control Panel” - “Security” - “Va lidates or Disables Windows Firewall”

As for Windows Vista

Features for the Month

1.   For the main instances of damages caused by unauthorized computer accesses,

     please refer to the “3. Reporting Status for Unauthorized Computer Access” on

     page 5 in this report for further details.

     -   Attack to the port used by SSH

     -   Phishing site is set illegally

2.   For the main instances of consultation (accessing status of consultation and

     instances of consultation), please refer to the “5. Accepting Status of

     Consultation” on page 7 in this report for further details.

     -   Bill for adult sites came while searching entertainers' information

     -   Phishing mails came 

3.   Internet monitoring (for further details, please refer to the Attachment 4)

     This is the initial intent to comprehensive and detailed interpretation of the

     Internet monitoring  (TALOT2) having been conducted by IPA.

 

I. Reporting Status for Computer Virus further details, please refer to the

   Attachment 1

The detection number [1] of virus for February was about 0.69M and was decreased about 32.3% from 1.02M reported in January. In addition, the reported number [2] of virus for February was 3,098 and was decreased 11.8% from 3,513 in January.


[1]Detection number:

Reported virus counts (cumulative) found by a filer.

[2]Reported number:

Virus counts are aggregated: viruses of same type and variants reported on the same day are counted as one case number regardless how many viruses or the actual number of viruses is found by the same filer on the same day. In December, reported number was 3,212: aggregated virus detection number was about 1.31M.

The worst detection number was for W32/Netsky with about 0.51M , W32/Nuwar with about 0.06M and W32/Sality with about 0.04M were subsequently followed.

Detection Number of Virus about 0.69M (about 1.02M) -32.3%

Chart 1-1

Reported Number of Virus 3,098 (3,513) -11.8%

Chart 1-2

 

II. W32/Nuwar Virus Spreading

W32/Nuwar virus was initially reported to IPA in last December 2006: since when number of its reports having been filed with IPA in the following January and February as well which indicate that the virus is continually spreading. This virus enlarges infection by distributing a large quantity of virus mails from infected computers. When infected, computer is hijacked or the user's private information is stolen, etc.

The Virus' Profile

W32/Nuwar is the virus which enlarges infection by distributing a large quantity of virus mails. The virus creates such file which introduces the other malicious codes named trojan_small in an infected computer. Then the trojan_small functions to introduce spyware from the Internet: accordingly it is likely that private information is stolen and/or important files are deleted, etc.

McAfee:

http://vil.nai.com/vil/content/v_140835.htm

Symantec:

http://www.symantec.com/security_response/writeup.jsp?docid=2006-122917-0740-99

Trendmicro:

http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_NUWAR.EL

Measures:

To prevent from damages and/or to avoid enlarging any of damages caused by virus, be sure to conduct following measures.

-   Resolve security holes (by updating OSs and applications)

-   Update virus signatures in anti-virus software/conduct scans regularly

-   Do not open attachment file to suspicious e-mail

Information relevant to Anti-virus Measures:

“Information relevant to vaccine software” (in Japanese)

http://www.ipa.go.jp/security/antivirus/vacc-info.html

“Five must-dos for dealing with files attaches to e-mail” (in Japanese)

http://www.ipa.go.jp/security/antivirus/attach5.html

“Seven anti-virus requirements for computer users” (in Japanese)

http://www.ipa.go.jp/security/antivirus/7kajonew.html

Information relevant to Resolving Security Holes:

“Procedures of Using Windows Update” (Microsoft)

http://www.microsoft.com/windowsxp/using/security/expert/russel_installsp2.mspx

 

III. Reporting Status for Unauthorized Computer Access (includes Consultations) Please refer to the Attachment 2 –

Report for unauthorized computer access and status of consultation

 

Sept.

Oct.

Nov.

Dec.

Jan.'07

Feb.

Total for Reported (a)

46

22

24

10

32

23

 

Damaged (b)

21

15

8

9

22

14

Not Damaged (c)

25

7

16

1

10

9

Total for Consultation (d)

35

53

30

40

52

50

 

Damaged (e)

26

37

20

23

25

28

Not Damaged (f)

9

16

10

17

27

22

Grand Total (a + d)

81

75

54

50

84

73

 

Damaged (b + e)

47

52

28

32

47

42

Not Damaged (c + f)

34

23

26

18

37

31

(1). Reporting Status of Unauthorized Computer Access

Reported number for February was 23: of 14 was the number actually damaged.

(2). Accepting Status of Consultations relevant to Unauthorized Computer Access, etc.

Consultation counts relevant to unauthorized computer access was 50: of 28 (of 8 was also counted as reported number) was the actual number that some sort of damage was reported.

(3). Status for Damage

Breakdown of the damage report includes: Intrusion with 6, DoS Attack with 1, Source Address Spoofing with 1 and others (damaged) with 6 .

Breakdown of the reported damages caused by intrusion included: exploited as a steppingstone server to attack to external sites with 5, locating some contents to exploit phishing (*1) with 1. The cause of intrusion included: the password for the port used by SSH was analyzed and vulnerabilities in OSs and server software were exploited.

 

Damage Instances:

[Intrusion]

(i) Attack to the Port (*3) Used by SSH (*2) …?

<Instance>

-   “We've been attempted to access illegally from your site” so communicated by an outside of organization via e-mail.

-   Study for the site was conducted; then it was recognized that the server was attacked and intruded to the port used by SSH. In addition, malicious code was embedded to that server to exploit as a steppingstone server to attack to outsides .

-   The main causes were the connection authorized domain by SSH was not restricted and the password for the SSH log-in was easily assumable .

 

(ii) Phishing site was located…?

<Instance>

-   When I access to your site, I am unexpectedly sent to such site seemed to be a financial institution in overseas” so communicated by a user who'd browsed the site run by this company.

-   Study for the site was conducted and then some contents data exploiting for phishing in that server were developed. We'd tried to check its access logs (*4), but they were all deleted

-   The cause was that we'd not updated OSs regularly so that vulnerabilities may have been exploited.

 

IV. Accepting Status of Consultation

The gross number for the consultation for February was 1019 . Of the consultation relevant to “ One-click Billing Fraud ” was 287 (January: 233), the consultation relevant to “ High-pressured selling of software for security measures ” with 22 (January: 17) and the consultation relevant to “ Winny ” with 14 (January: 13), etc.

Movement in entire number of consultation accepted by IPA

 

Sept.

Oct.

Nov.

Dec.

Jan. '07

Feb.

Total

933

1,002

711

680

946

1019

 

Automatic Response System

575

580

423

394

582

603

Telephone

302

326

214

222

324

336

e-mail

51

93

72

59

39

75

Fax, Others

5

3

2

5

1

5

*IPA consults/advises for computer viruses/unauthorized computer accesses as well as the other information concerning overall security issues

Mail: ?????????? for virus issues, ????????????for crack issues.

Tel.: +81-3-5978-7509 (24-hour automatic response)

Fax: +81-3-5978-7518 (24-hour automatic response)

*The Total case number includes the number in Consultation (d) column of the Chart in the “III. Reported Status for Unauthorized Computer Access” and “IV. Accepting Status of Consultation”.

*”Automatic Response System”:   Accepted numbers by automatic response
*“Telephone”:                           Accepted numbers by the Security Center personnel

 

<Reference> Shift in the consultation number of one-click billing fraud

Consultation Number of One-click Billing Fraud

As for the measures against one-click billing fraud, please refer to the following site.

Reminder for the month (for the month of January) “Malicious Codes may be Installed if you Ignore Alert!!”

http://www.ipa.go.jp/security/english/virus/press/200601/E_PR200601.html

Reporting Status of Computer Virus and Unauthorized Computer Access for September and the 3 rd Quarter

2. One-click Billing Fraud

http://www.ipa.go.jp/security/english/virus/press/200609/E_PR200609.html

Reporting Status of Computer Virus and Unauthorized Computer Access for August

2. Consultation Number for the Damages by One-click Billing Fraud is Unchangeably Many!!

http://www.ipa.go.jp/security/english/virus/press/200608/E_PR200608.html

<Reference> Shift in the consultation number for High-Pressured Selling of Security Software

Consultation Number of High-pressured Selling of Security Softwawre

As for the activities of high-pressured selling of security software, please also refer to the following link.

Reminder for the month (for the month of April)

“Be Cautious with the High-pressured Selling Activities of Software for Security Measures!!”

http://www.ipa.go.jp/security/english/virus/press/200604/E_PR200604.html

The major consultations for the month are as follows.

(i)   I am simply searching the information for entertainer, but the bill for an adult site came! Why…?

Consultation:

While checking the information for an entertainer, I have found some blogs which may have been created by his/her fan. When I accessed, there pasted some images of the entertainer. Then I have clicked the link for “View more”, I was suddenly sent to an adult site. Amazed, but clicked the link for “free images” as I was curious about. Then there displayed the policy for membership and required my age for the sign-up. Clicked “OK” without reading thoroughly, then the billing screen for the site usage fee was appeared.

 

Response:

Do not get panicking. The first thing you have to do is to re-boot your computer. In most of cases, you do not have to necessarily worry with such event if the billing screen is not appeared at all after re-booted your computer. Of about 30% of the consultation about one-click billing fraud filed with IPA in February were such cases. In addition, such cases which were induced from the other sites are rapidly increased. Accordingly, you have to always be cautious what will be happened to next? Even you are unexpectedly sent to an adult site, be sure to refrain going forward with curiosity. In most cases, there clearly be stated that the services hereinafter provided are paid-for. Accordingly, it is important to read out entire message displayed before you click to prevent damage in advance.

(ii) Phishing mail came…?

Consultation:

Following mail came. Since neither its address nor the link in the content are from Yahoo, I' d refrained to click them.

From:      “Yahoo JAPAN” < *488700@pp.love*.jp>

To:          **@yahoo.co.jp

Subject:   Yahoo! JAPAN – Procedure for User Account Continuity

-------------------------------------------------------------------------------

Yahoo! JAPAN – Procedure for User Account Continuity

-------------------------------------------------------------------------------

This message is automatically sent from Yahoo! JAPAN.

--- omitted ---

To continually use the Yahoo! Auction, it is necessary to renew your Yahoo! JAPAN ID user account. For further details, please refer to the pages for the user account continuity.

http:// *488700.love*.jp/

Response:

As with the instance above, be sure to be cautious with such phishing method to have users click links in the content believing that the messages are from service providers or financial institutions, etc. Upon clicking, you will be induced to the entry pages for private information imitated with the legitimate pages.

Even you are not enough familiar whether the address is legitimate or fake , it is still effective not to click the links within a mail content easily or to make it sure to call up to service providers, etc.

<Reference>

Ministry of Economy, Trade and Industry – CHECK PC! Campaign (by March 31, 2007) (in Japanese)

http://www.checkpc.go.jp/

IPA – Security Alert Towards the Damage Prevention by Spyware (in Japanese)

http://www.ipa.go.jp/security/topics/170720_spyware.html

 

V. Accessing Status Captured by the Internet Monitoring (TALOT2”) in February

According to the Internet Monitoring (TALOT2), the total of unwanted (one-sided) number of access in February 2007 was 330,685 for 10 monitoring points. That is, the number of access was 1,378 from 345 source addresses/monitoring point/day.

Since each monitoring environment for the TALOT2 is nearly equal to the general connection environment used for the Internet; it can be considered that the same amount of unwanted (one-sided) access can be monitored for the general Internet users' connection environment. In another word, your computer is being accessed from 345 unknown source addresses in average/day or you are being accessed from 4 times from one source address which considered unauthorized.

Number of Access and Source Number of Access/Monitoring Point/Day in Average

Chart 5.1: Unwanted (One-sided) Number of Access and Source Number of Access/Monitoring Point/Day in Average

The Chart 5.1 shows the number of access and the source number of access/monitoring point/day for the respective months from August 2006 to February 2007. According to this chart, unwanted (one-sided) accesses were tending subtle decrease compared with the one in January and was gotten back to the one in December 2006. Such tendency might have been caused by the stability of Ping (ICMP*) access and the stability of access targeting vulnerability in computers.

As for the entire access contents, it seemed that the most of accesses were the infection activities of bot (such accesses which attempt to enlarge infection of bot targeting vulnerabilities in computers) from the computers having been infected by bot.


* Internet Control Message Protocol: such protocol which checks if the other side of computers are being operated or not.


The accessing status in February 2007 was almost the same with the one in January 2007; it could be considered that the infection activities by bot might have been peaked as it could be seen in the viewpoint of the stability of Ping (ICMP) access and the tendency of access (such access targeting to the port 2967/tcp) decrease targeting to the vulnerabilities in Symantec Client Security and Symantec AntiVirus as they were described previously.

Because of the system maintenance periods for TALOT2 were turned to the beginning of February 2007, its monitoring data could not be recorded from February 2 to 5: it seemed that the above mentioned accesses were stabilized during that period.

Since TALOT2 monitors unwanted in- and out-bound accesses on the Internet one-sidedly, it does not respond to Ping (ICMP) accesses. Accordingly, TALOT2 cannot monitor the following accesses in case it would respond to Ping (ICMP); it can be the access confirming that the targeted computer for attack is in operation.

Number of Ping(ICMP) Access Classified by Source Area

Chart 5.2: Ping (ICMP) Accesses from October 2006 to February 2007

The Chart 5.2 shows the shift in number of access classified by source area of Ping (ICMP) accesses. The graph also shows the access increase after November 2006 and temporary access increase from China area. As it can be seen that the access increase from China monitored in January was solved after February 6. Along with such accesses from the other source area, tendencies in increase were gradually stabilized. The causes of these accesses were not yet clarified and threats were still continued.

Relevant to the above information, please refer to the following site for further details.

Attachment 3_Observation Status Captured by the Internet Monitoring (TALOT2)

http://www.ipa.go.jp/security/english/virus/press/200702/TALOT200702.html

As for the new intent, “General Information of Internet Monitoring in IPA”, please refer to the following site.

http://www.ipa.go.jp/security/english/virus/press/200702/TALOT200702overview.html

 


“Various Statistics Information Provided by Other Organizations/Vendors are Publicized in the Following Sites”


@police:      http://www.cyberpolice.go.jp/english/
Trendmicro: http://www.trendmicro.com/en/home/us/home.htm
McAfee:      http://www.mcafee.com/us/


“Interpretation for Glossaries”

(*1) Phishing :

Spoofing or masquerading to be the mail or the web pages of existed businesses illegally such as banking, etc. to exploit legitimate user IDs and passwords who previously opened or browsed such mails or web pages. “Fishing” is the word origin of “phishing”, but there are several theories such as “f” was exchanged by “ph” according to hackers' naming convention, coined word for which origins were “sophisticated” and “fish” or shortened word form of “password harvesting fishing”, etc.

(*2) SSH (Secure Shell) :

A protocol or a program used for log-in to another computer via the network, execute commands by a computer remotely and transfer files to another computer. Since data via the network is encrypted, a series of operations through the Internet can be conducted safely.

(*3) Port :

A window interfaces each service within a computer used for exchanging information with outsides. Numbers from 0 to 65535 are used for the ports so that they are also called Port Number.

(*4) Log :

Records for the status of service for a computer or the status of data communication. Generally, operator's ID, time and date for the operation, contents of operation, etc. are recorded.

 

The details are as follows:
- Attachment 1 Computer virus Incident Report [Details]
- Attachment 2 Unauthorized Computer Access Incident Report [Details]

- Attachment 3 Observation Status by Internet Monitoring System (TALOT2)

- Attachment 4 General Information of Internet Monitoring in IPA 

   


Contact
IT Security Center, Information-technology Promotion Agency, Japan (IPA/ISEC)
Tel:+81-3-5978-7527

Fax:+81-3-5978-7518

E-mail:






Term of Use


Copyright(c) Information-technology Promotion Agency, Japan. All rights reserved 2005