Information-technology
Promotion Agency,
Japan
$BK\J8$X(B
IPA

TOP|Aplication|Contact us|Sitemap


Information-technology Promotion Agency, Japan
-japanese charactor-






IT Security Center

The Information-technology SEcurity Center (ISEC) is the center for promoting information security in Japan.









Japanese




Activities




Information Service Activities






Security Software Development Activities






CRYPTREC






IT SecurityAssurance







Organization







PGP key







RFCs







Mission Statement







Links







About IPA/ISEC







IPA TOP>IT Security Center Japanese TOP>IT Security Center English TOP>information




Computer Virus / Unauthorized Computer Access Incident Report [Summary]


April 30, 2007
IT Security Center
Information-technology Promotion Agency, Japan (IPA)

This is a summary of computer virus/unauthorized computer access incident reports for March, 2007 and 1st Quarter (January to March) compiled by IPA.

Reminder for the Month:

“Don't You Disregard of Alerting Screen, Do You?”

- Be sure not to go forward when alerted to prevent installing malicious codes!! -

The number of consultation of one-click billing fraud being reported to IPA from February 2007 was being maintained/updated the worst record: the number of consultation for March is 316 (Please also refer to the Shift in the Number of Consultation of One-click Billing Fraud on p7 for further details.).

As for Windows, when images and animated pictures on typical homepages are clicked, the software which shows images and/or the media player which retrieves animated pictures already installed in the computer are automatically started. However, what if the viruses and malicious codes which show one-click billing fraud are placed on the homepages spoofing to be images and/or animated pictures, then, Windows displays alerting screen (Chart a) whether the programs (viruses and/or malicious codes) shall be continuously executed by downloading them. In such a case, be sure to click “Cancel” and do not go forward .

Interpretation of the alerting screen in the Chart a

Alerting screen includes three columns such as the “name” of program file, “type” of program file and the “source” of program file. The instance in the following chart, the “type” refers “application” meaning to be a program. That is, the “type” of file should not be program if you wish to download images, etc. When alerted, be sure to check the “type” of file and the “source” of file and do not hesitate to click “Cancel” if any of file attributions are differed with the one you'd requested .

Alerting Screen of Downloading Files in Windows Vista/Windows XP

Chart a: Alerting Screen of Downloading Files in Windows Vista/Windows XP

Upon clicking “ Run ” in the alerting screen in the Chart a above, then another alerting screen (Chart b) is appeared and confirms whether the user wishes to “run” the program.

Windows leverages the automatic mechanism which proves the source of program's legitimacy. If the “source” of the program is being proved, the name of the “source”

should be appeared in the alerting screens. However, in the instance b above, the source is unknown ; so that you cannot trust the source. Therefore, be sure to click “Cancel” for not going forward .

Alerting Screen of Internet Explorer in Windows Vista/Windows XP

Chart b: Alerting Screen of Internet Explorer in Windows Vista/Windows XP

In Windows Vista, the new function, “UAC: User Account (*1) Control”, shows following screen in the Chart c to prevent starting up of the programs run by an unintended user operation or an unwillingly allowed operation by that function when installed the programs for word processor and/or driver software and/or changed the configuration of its system.

Even accidentally clicked “ Run ” in the alerting screen in the Chart b; the UAC will be appeared so that you can check the “source” and the contents of alert with ease. As an instance, the column of the source shows “unidentified”; be sure to click “Cancel” and do not “Run” in case the Chart c.

As an instance, the column of the source shows “unidentified”; be sure to click “Cancel” and do not “Run” in the case of the Chart c.

Instance of Alerting Message of UAC

Chart c: Instance of Alerting Message of UAC

As it is shown in the above, Windows Vista automatically prevents malicious codes such as viruses and spyware, etc. by prompting the alert by the UAC function before incident occurs even a user attempts to execute unauthorized programs by mistake.

Since the UAC function is being validated as the initial default setting, be sure not to make it invalidated.

(Reference)

Windows Vista Developer Center > Security (in Japanese)

http://www.microsoft.com/japan/msdn/windowsvista/security/

IPA – Responding procedure in case billed when simply clicked images (in Japanese)

http://www.ipa.go.jp/security/ciadr/oneclick.html

IPA – Seven anti-virus requirements for computer users

IPA – Five must-dos for dealing with files attached to email

http://www.ipa.go.jp/security/english/virus/antivirus/shiori-e.html

 

I. Reporting Status for Computer Virus further details, please refer to the

   Attachment 1

The detection number [1] of virus for March was about 0.66M and was decreased about 4.6% from 0.69M reported in February. In addition, the reported number [2] of virus for March was 2,933 and was decreased 5.3% from 3,098 in February.


[1]Detection number:

Reported virus counts (cumulative) found by a filer.

[2]Reported number:

Virus counts are aggregated: viruses of same type and variants reported on the same day are counted as one case number regardless how many viruses or the actual number of viruses is found by the same filer on the same day. In December, reported number was 3,212: aggregated virus detection number was about 1.31M.

The worst detection number was for W32/Netsky with about 0.52M , VBS/Solow with about 0.04M and W32/Sality with about 0.03M were subsequently followed.

Detection Number of virus about 0.66M (about 0.69M) -4.6%

Chart 1-1

Reported Number of Virus 2,933 (3,098) -5.3%

Chart 1-2

 

II. Reporting Status for Unauthorized Computer Access (includes Consultations) Please refer to the Attachment 2 –

Report for unauthorized computer access and status of consultation

 

Oct.

Nov.

Dec.

Jan.'07

Feb.

Mar.

Total for Reported (a)

22

24

10

32

23

13

 

Damaged (b)

15

8

9

22

14

9

Not Damaged (c)

7

16

1

10

9

4

Total for Consultation (d)

53

30

40

52

50

43

 

Damaged (e)

37

20

23

25

28

20

Not Damaged (f)

16

10

17

27

22

23

Grand Total (a + d)

75

54

50

84

73

56

 

Damaged (b + e)

52

28

32

47

42

29

Not Damaged (c + f)

23

26

18

37

31

27

(1) Reporting Status for Unauthorized Computer Access

Reported number for March was 13 : of 9 was the number actually damaged .

(2) Accepting Status for Consultations relevant to Unauthorized Computer Access, etc.

Consultation counts relevant to unauthorized computer access was 43: of 20 (of 4 was also counted as reported number) was the actual number that some sort of damage was reported.

(3) Status of Damage

Breakdown of the damage report includes: Intrusion with 2, DoS Attack with 1, Source Address Spoofing with 1 and others (damaged) with 4 .

Breakdown of the reported damages caused by intrusion included: exploited as a steppingstone server to attack to external sites with 1 and destruction of data within server with 1. The cause of intrusion included: the password for the port (*3) used by SSH (*2) was broken by password cracking attack (*4) and the vulnerabilities were exploited.

 

Damage Instances:

[Intrusion]

(i) Data was destructed by the intrusion exploited by the vulnerability in cgi (*5) …?

<Instance>

-   The web server which operates database was suddenly stopped.

-   According from the study, it was realized that the file for database was destructed.

-   The cause was the intrusion by the OS command injection attack exploiting vulnerability of cgi program being operated by the web server to run unauthorized codes.

 

(ii) Confronted by Phishing (*6) fraud…?

<Instance>

-   When attempted to placing bids to the goods listed on an auction site, it is realized that my auction account was being halted. The reason being appended was “listing of illegal goods”, but I'd never known.

-   Way back to 2 weeks ago, I received a mail confirming continual use of the current auction account and I easily input my ID, password and credit card number where I was led by the mail. Accordingly, I again checked the mail, it is realized that the sender was not relevant to the auction.

 

III. Accepting Status of Consultation

The gross number for the consultation for March was 1127. Of the consultation relevant to “ One-click Billing Fraud ” was 316 (February: 287), the consultation relevant to “ High-pressured selling of software for security measures ” with 23 (February: 23) and the consultation relevant to “ Winny ” with 5 (February: 14), etc.

Movement in entire number of consultation accepted by IPA

 

Oct.

Nov.

Dec.

Jan. '07

Feb.

Mar.

Total

1,002

711

680

946

1019

1127

 

Automatic Response System

580

423

394

582

603

697

Telephone

326

214

222

324

336

376

e-mail

93

72

59

39

75

54

Fax, Others

3

2

5

1

5

0

*IPA consults/advises for computer viruses/unauthorized computer accesses as well as the other information concerning overall security issues

Mail: ?????????? for virus issues, ????????????for crack issues.

Tel.: +81-3-5978-7509 (24-hour automatic response)

Fax: +81-3-5978-7518 (24-hour automatic response)

*The Total case number includes the number in Consultation (d) column of the Chart in the “III. Reported Status for Unauthorized Computer Access” and “IV. Accepting Status of Consultation”.

*”Automatic Response System”:   Accepted numbers by automatic response
*“Telephone”:                           Accepted numbers by the Security Center personnel

 

<Reference>

Shift in the consultation number of one-click billing fraud

Consultation Number of One-click Billing Fraud

As for the measures against one-click billing fraud, please refer to the following site.

Reporting Status of Computer Virus and Unauthorized Computer Access for September and the 3 rd Quarter

2. One-click Billing Fraud

http://www.ipa.go.jp/security/english/virus/press/200609/E_PR200609.html

Reporting Status of Computer Virus and Unauthorized Computer Access for August

2. Consultation Number for the Damages by One-click Billing Fraud is Unchangeably Many!!

http://www.ipa.go.jp/security/english/virus/press/200608/E_PR200608.html

<Reference>

Shift in the consultation number for High-Pressured Selling of Security Software

Consultation Number of High-pressured Selling of Security Softwawre

As for the activities of high-pressured selling of security software, please also refer to the following link.

Reminder for the month (for the month of April)

“Be Cautious with the High-pressured Selling Activities of Software for Security Measures!!”

http://www.ipa.go.jp/security/english/virus/press/200604/E_PR200604.html

The major consultations for the month are as follows.

(i) Though I searched secured adult site…?

Consultation:

Since I had heard that there are number of fraudulent activities in adult sites nowadays, I attempted to search secured one so I had accessed to one of the sites being met with the keywords such as “porno” and “not phishy” from a search via a major provider. I had clicked “OK” button with ease even it required to input my “age” when I clicked a file presumed to be animated pictures. As its result, there appeared billing screen with the message “Thank you for your registration with our site” .

One Example of Search at a Portal Site

Response:

Currently, number of people is being fooled with the traps of one-click billing fraud easily opposite to their intents. It is likely that those malicious site managers establish their sites to be met with the key words such as “porno” and/or “not phishy”, etc. Accordingly, be cautious when you access to the sites being met by the key words in your search which may contain unsecured sites as well.

<Reference>

IPA – Reminder for December 2006 “Do not easily tempted, there are many traps hiding on the Internet!!”

http://www.ipa.go.jp/security/english/virus/press//200611/E_PR200611.html

IPA – Reminder for August 2006 “If you feel something suspicious, be sure to get back where you were before!!”

http://www.ipa.go.jp/security/english/virus/press//200607/E_PR200607.html

(ii) Phishing mail came…?

Consultation:

Way up from several days ago, my computer suddenly started to display “Your computer is likely to be damaged by forged software.” My computer is infected by some virus? My computer was customized by myself which was given over from one of my acquaintances.

Alerting Screen

Chart 3- 2: Alerting Screen

Response:

The message displayed on your computer is the measuring program to prevent any of software from illegally copying activity provided by Microsoft (Windows Genuine Advantage Notifications) from February 2007. In addition, this feature is already embedded in Windows Vista released on January 2007. The message above actually meant that the Windows being installed in your computer is unlikely a legitimate one and may be an illegally copied version or pirated version . It is better to inquire it to the source where you'd obtained your computer. In case the Windows is not a legitimate version, you need to obtain legitimate license.

<Reference>

Microsoft – Overview of Windows Genuine advantage Notifications

http://www.microsoft.com/genuine/About.Notifications.aspx

 

IV. Accessing Status Captured by the Internet Monitoring (TALOT2”) in March

According to the Internet Monitoring (TALOT2), the total of unwanted (one-sided) number of access in March 2007 was 402,140 for 10 monitoring points. That is, the number of access was 1,297 from 327 source addresses/monitoring point/day.

Since each monitoring environment for the TALOT2 is nearly equal to the general connection environment used for the Internet; it can be considered that the same amount of unwanted (one-sided) access can be monitored for the general Internet users' connection environment. In another word, your computer is being accessed from 327 unknown source addresses in average/day or you are being accessed from 4 times from one source address which considered unauthorized.

Number of Access and Soruce Number of Access /Day/Monitoring Point

Chart 4.1: Number of Access and Source Number of Access/Monitoring Point/Day

The Chart 4.1 shows the number of access and the source number of access in average/day from October 2006 to March 2007. According from this chart, the status of unwanted (one-sided) accesses were subtle decreased compared with the one in February 2007 and getting back to the one in November 2006. Accordingly, the accessing status is stabilized entirely.

The accessing status in March 2007 is almost the same with the one in February 2007. However, such access exploiting vulnerabilities in computer being operated remotely was even press reported its incidents (*7) : you are to be further cautious with such accesses.

The access to the port 22/tcp is likely to search SSH (Secure Shell) to analyze vulnerable password authentication. Against those computers which respond to such access were trapped by the brute force attack or dictionary attack to break password. Accordingly, it would be probable to be broken if you configured vulnerable (easy) password.

Those organizations/corporations where use SSH (Secure Shell) should enforce its monitoring system as well as review administrative structure of servers, etc. and policies relevant to security.

<Reference>

IPA – Configuration and Operation of Secured Web servers – User Authentication (in Japanese)

http://www.ipa.go.jp/security/awareness/administrator/secure-web/chap6/6_userauth-1.html

Number of Access to the Port 22/tcp Classified by Source Area(Using 9 Monitoring Points)

Chart 4.2: Shift in Number of Access Classified by Source Area/9 Points

Relevant to the above information, please refer to the following site for further details.

Attachment 3_Observation Status Captured by the Internet Monitoring (TALOT2)

http://www.ipa.go.jp/security/english/virus/press/200703/TALOT200703.html

 


“Various Statistics Information Provided by Other Organizations/Vendors are Publicized in the Following Sites”


@police:      http://www.cyberpolice.go.jp/english/
Trendmicro: http://www.trendmicro.com/en/home/us/home.htm
McAfee:      http://www.mcafee.com/us/


“Interpretation for Glossaries”

(*1) Account :

Privilege which allowing legitimate user to use resources on computers and/or on the Internet.

(*2) SSH (Secure Shell) :

A protocol or a program used for log-in to another computer via the network, execute commands by a computer remotely and transfer files to another computer. Since data via the network is encrypted, a series of operations through the Internet can be conducted safely.

(*3) Port :

A window interfaces each service within a computer used for exchanging information with outsides. Numbers from 0 to 65535 are used for the ports so that they are also called Port Number.

(*4) Password Cracking :

The approach to identify anyone else's password by analyzing, etc. Approaches include brute-force attack, dictionary attack, etc. and there is the code for exclusively crack as well.

*Brute Force Attack:

One of attacking methods that attempts to combination of letters exhaustively to analyze password in accordance with a certain rule. It refers to forcible attacking method.

*Dictionary Attack:

One of attacking methods that attempts to every word listed on a dictionary from very beginning to its end to analyze password.

(*5) cgi (Common Gateway Interface):

The mechanism which transmits a client the results being processed upon the server runs a program on it requested by a client.

(*6) Phishing:

Spoofing or masquerading to be the mail or the web pages of existed businesses illegally such as banking, etc. to exploit legitimate user IDs and passwords who previously opened or browsed such mails or web pages. “Fishing” is the word origin of “phishing”, but there are several theories such as “f” was exchanged by “ph” according to hackers' naming convention, coined word for which origins were “sophisticated” and “fish” or shortened word form of “password harvesting fishing”, etc.

(*7) Incident:

The events caused by expression/materialization of information security risks in the information security fields.

 

The details are as follows:
- Attachment 1 Computer virus Incident Report [Details]
- Attachment 2 Unauthorized Computer Access Incident Report [Details]

- Attachment 3 Observation Status by Internet Monitoring System (TALOT2)

- Attachment 4 Computer virus Incident Report for the 1st Quarter (January to March)

- Attachment 5 Unauthorized Computer Access Incident Report for the 1st Quarter (January to March)

   


Contact
IT Security Center, Information-technology Promotion Agency, Japan (IPA/ISEC)
Tel:+81-3-5978-7527

Fax:+81-3-5978-7518

E-mail:






Term of Use


Copyright(c) Information-technology Promotion Agency, Japan. All rights reserved 2005