Information-technology
Promotion Agency,
Japan
$BK\J8$X(B
IPA

TOP|Aplication|Contact us|Sitemap


Information-technology Promotion Agency, Japan
-japanese charactor-






IT Security Center

The Information-technology SEcurity Center (ISEC) is the center for promoting information security in Japan.









Japanese




Activities




Information Service Activities






Security Software Development Activities






CRYPTREC






IT SecurityAssurance







Organization







PGP key







RFCs







Mission Statement







Links







About IPA/ISEC







IPA TOP>IT Security Center Japanese TOP>IT Security Center English TOP>information




Computer Virus / Unauthorized Computer Access Incident Report [Summary]


October 26, 2007
IT Security Center
Information-technology Promotion Agency, Japan (IPA)

This is a summary of computer virus/unauthorized computer access incident reports for September, 2007 and 3rd Half of 2007 (July to September) compiled by IPA.

 

I. Reminder for the Month:

“Do you have adequate knowledge about the threat caused by bot?”

- Be cautious with the bot, a type of computer virus!! -

 

In September, there were number of reports and consultations from those consulters who'd been infected by bot. The example of consultation was as follows: “Your computer is being infected by bot so that you need to take certain measures, so communicated from the provider whom the consulter signed up with.” All computer users, now is the time that you are to realize the threat caused by bot and be sure to conduct bot preventive measures, their earlier detection and removal for your computer's secured state.

(1)   Threat by bot

Bot is the code being developed with the scope to manipulate computers from outside via a network. Those infected computers are automatically connected to the directive server, etc. embedded by a malicious intent as the part of the network which made up with several to hundreds of thousands of infected computers so called “bot network”.

Those computers embedded with the bot network is remotely operated from the directive server, etc. by the malicious intent and is used to send number of spams and/or to conduct DoS (Denial of Services) to certain sites .

Nowadays, such activities exploiting criminal activities from hourly leasing of the bot network and/or selling private information exploited by bot, etc. to gain benefits can be seen.

Threat of bot network

(2)   Features of bot infection

The major infection path for the conventional bot was caused by opening of appended file to email and/or by the attack exploiting vulnerability .

However, recently, such damage by browsing the web pages in which bot is being embedded is getting majore d for which infection path is getting invisible from general computer users.

In addition, the bot engineering is getting sophisticated and, in most of time, its characteristic symptoms are not shown up so that infected users hardly recognize that they are infected, and the users can use own computer as usual just before they are infected.

(3)   The tips of bot countermeasures for general users

(a)   Implementation of anti-virus and anti-spyware software and periodic updates those signatures used by the software (Since bot is upgraded in relatively shorter period of time, updating of signatures is extremely important.).

(b)   Do not easily open the appended files to unknown emails.

(c)   Refrain browsing of suspicious websites.

(d)   Configure higher security for browsers, etc.

(e)   Do not click the links appended on spams (It is ideal to discard them without seeing.)

(f)   Use routers and firewalls upon connecting to the Internet.

(g)   Always keep OSs and applications on your computer up-to-dated (Implements Microsoft update, etc.).

For further details, please also refer to the “Brochure for Anti-bot Measures, ver.5, June 1, 2007”.

http://www.ipa.go.jp/security/english/virus/antivirus/pdf/Bot_
measures_eng.pdf

BOT V5

In case your computer is infected by bot, removal of bot is the unique measures or the last resort . In addition, general users hardly recognize that they are infected by bot: number of instances shows that it is realized communicated by third party such as providers, etc. In case you receive the mails alerting bot infection from providers, etc., be sure to conduct bot removals by following to the contents of the mails and remove them with the tools provided by the Cyber Clean Center (CCC) introduced in (5) .

(4)   The tips of bot countermeasures for web operation managers, etc.

Nowadays, such damages that website is hi-jacked exploiting the attacking tools so called MPack is increased. ( http://www.jpcert.or.jp/at/2007/at070016.txt ) (in Japanese)

Web operation managers and server managers need to conduct following measures to avoid being that their servers are used as the base of infection activities of bot, etc. while they do not know.

(a)   Check with or without of vulnerability on applications to eliminate the chance to allow malicious intents to exploit (embedding of virus, etc.) them for bot infection.

(b)   Keep OSs and applications on webservers free from vulnerability.

(c)   Take reasonable measures to prevent enlarging damages such as closing websites immediately in case developed anomaly state on websites: i.e. when inquired from one of users that his/her anti-virus software is warned while browsing sites.

(5)   Approaches to the bot measures by IPA

IPA cooperates to the operation of the Cyber Clean Center (CCC: https://www.ccc.go.jp/en_index.html ) established/started by the Ministry of Internal Affairs and Communications (MIC) and the Ministry of Economy, Trade and Industry (METI) on December 2006 to eradicate “bot” under their collaboration project “anti-bot measures business”.

CCC offers users such tools to remove bot from their computers/necessary information and as well as analyzes the characteristics of bots that can be the threat of the Internet.

Cyber Clean Center

In addition, IPA provides the vendors of anti-infection measures sample of bot as the “Bot Infection Prevention Promotion Group” to promote prevention of infection and its recurrence.

The achievement of CCC activities is publicized on the “Achievement of CCC Activities, August 2007 ( https://www.ccc.go.jp/report/200708/0708monthly.html ) (in Japanese) for your further reference.

 

II. Introduction of the Information relevant to the Approaches of Anti-virus

     Measures Conducted by IPA

-Responding keys when occurred information leakage

-What you have to do when information is leaked!!-

This booklet allows not only incident-responding personnel but also managements of SMEs whose manuals which handling information leakage incidents is not provided easily comprehend what they have to do/pay attention to, etc. in a short period of time for immediate/adequate responses when information leakage accident occurs.

Index

1.   Fundamental Concept

2.   Typical Procedures to Respond Information Leakage

Johorouei

3.   Responding Keys for Information Leakage by Type

      3.1   The Response in case of Information Missing/Information Theft

      3.2   The Response in case Information is Transmitted to/is Publicized on Web by

              Mistake

      3.3   The Response in case Information is Leaked by Inside Criminal

      3.4   The Response in case Information is Leaked via Winny/Share, etc.

      3.5   The Response in case Information is Leaked by Malicious Codes, such as

              Virus/Spyware, etc.

      3.6   The Response in case Information is Leaked by Illegal Accesses

      3.7   The Response in case Information is Rumored/Publicized on Blogs, etc.

4.   Responding Keys upon Development/Reporting of Information Leakage (Internally)

5.   Responding Keys upon Communication/Reporting/Publication of Information

      Leakage (Outside)

6.   Referential Information

The 1 st edition (issued on August 2007) (in Japanese)

URL http://www.ipa.go.jp/security/awareness/johorouei/

 

III. Reporting Status for Computer Virus further details, please refer to the

   Attachment 1

The detection number [1] of virus in September was about 0.44M : decreased 11.4% from 0.49M detected in August. In addition, the reported number [2] of virus is September was 2,426 : also decreased 13.5% from 2,806 in August.


[1]Detection number:

Reported virus counts (cumulative) found by a filer.

[2]Reported number:

Virus counts are aggregated: viruses of same type and variants reported on the same day are counted as one case number regardless how many viruses or the actual number of viruses is found by the same filer on the same day. In September, the reported number was 2,426: aggregated virus detection number was about 0.44M.

The worst detection number of virus was W32/Netsky with about 0.40M , W32/Mytob with about 0.015M and W32/Bagle with about 0.005M subsequently followed.

Detection Number of Virus about 0.44M (0.49M) -11.4%

Chart 3-1

Reported Number of Virus 2,426 (2,806) -13.5%

Chart 3-2

Note) Numbers in the parenthesis are the Numbers for previous month.

 

IV. Reporting Status for Unauthorized Computer Access (includes Consultations) Please refer to the Attachment 2 –

Report for unauthorized computer access and status of consultation

 

Apr.

May

June

July

Aug.

Sept.

Total for Reported (a)

15

19

41

10

16

10

 

Damaged (b)

12

13

36

8

13

8

Not Damaged (c)

3

6

5

2

3

2

Total for Consultation (d)

31

37

27

25

23

27

 

Damaged (e)

20

21

11

11

15

12

Not Damaged (f)

11

16

16

14

8

15

Grand Total (a + d)

46

56

68

35

39

37

 

Damaged (b + e)

32

34

47

19

28

20

Not Damaged (c + f)

14

22

21

16

11

17

(1) Reporting Status for Unauthorized Computer Access

Reported number for September was 10: of 8 was the number actually damaged .

(2) Accepting Status for Consultations relevant to Unauthorized Computer Access, etc.

Consultation counts relevant to unauthorized computer access was 27: of 12 (of 4 was also counted as reported number) was the actual number that some sort of damage was reported.

(3) Status of Damage

The breakdown of damage report was: Intrusion with 2, Source Address Spoofing with 1 and Others (Damaged) with 5 . The breakdown of reported damage relevant to the intrusion include: placing malicious contents to exploit for phishing* with 1, etc. The cause of intrusion was leaving vulnerability of OSs on server as it was with 1, etc.

*Phishing:   One of malicious engineering which induces users to fabulous web pages spoofing to be actual business such as legitimate financial institution, etc. to exploit users' IDs and passwords.

(4) Damage Instances:

[Intrusion]

(i) Malicious contents exploiting for phishing were located…

<Instance>

-   “Virus file is being located” so communicated from the contents creator of this business' website.

-   After thoroughly examined this business' server, it is realized that some script files and illegal contents files for phishing were located.

-   The cause is not yet identified.

[Accept Probe [Attempt]]

(ii) Server is being attempted by illegally logging-ins…

<Instance>

-   The server publicized for outside is being attempted by illegally logging-ins from one of IP addresses of overseas.

-   Though we have not yet been accessed, there still have potentials to be accessed. Is there any measures/suggestions?

-   We wish to restrict accesses from domestic only.

 

V. Accepting Status of Consultation

The gross number for the consultation in September was 910 . Of the consultation relevant to “ One-click Billing Fraud ” was 270 (August: 330), the consultation relevant to “ High-pressured selling of software for security measures ” with 12 (August: 13) and the consultation relevant to “ Winny ” with 4 (August: 6), etc.

Movement in entire number of consultation accepted by IPA /method

 

Apr.

May

June

July

Aug.

Sept.

Total

827

814

932

1162

1013

910

 

Automatic Response System

486

484

537

694

593

544

Telephone

279

254

339

403

374

310

e-mail

58

69

53

64

43

55

Fax, Others

4

7

3

1

3

1

*IPA consults/advises for computer viruses/unauthorized computer accesses as well as the other information concerning overall security issues

Mail: ?????????? for virus issues, ????????????for crack issues.

Tel.: +81-3-5978-7509 (24-hour automatic response)

Fax: +81-3-5978-7518 (24-hour automatic response)

*The Total case number includes the number in Consultation (d) column of the Chart in the “IV. Reported Status for Unauthorized Computer Access” and “V. Accepting Status of Consultation”.

*”Automatic Response System”:   Accepted numbers by automatic response
*“Telephone”:                           Accepted numbers by the Security Center personnel

 

<Reference>

Shift in Number of Consultation relevant to One-click Billing Fraud

One-click Billing Fraud/Number of Consultation

The main instances for consultations are as follows.

(i) Virus alerts when clicked the link included in the mail body!

Consultation:

Virus mail sent to the most of all addressees within a business. The sender is spoofing to be the personnel in that business, but is not actually existed. The mail contents and the files appended seemed to be relevant to their business. Those computers on which some mails were opened are attempting somewhat fishy accesses to specific IP addresses outside continually.

Response:

This must be the Spear type of attack targeting specific organization. In this case, it is utmost important to warn entire organization with the message such as “Be cautious if you got such mails!” along with typical anti-virus measures. In addition, other than the execution type of viruses , you have to be also cautious with some virus codes which may be added to some document files created by a word processor, etc .

<Reference>

IPA – Seven anti-virus requirements for computer users

http://www.ipa.go.jp/security/antivirus/7kajonew.html (in Japanese)

 

(ii) Information is leaked via Winny…

Consultation:

“Your company's internal information is deviated on the Winny network” so communicated from outside. In-house investigation was conducted and then it was realized that one of Winny user within that business dealt company data with his/her own computer and the data was deviated when a exposure type of virus is infected that computer. Are there any remedies or measures to be taken?

Response:

In case of information leakage incident, it is the utmost priority to “minimize the damages directly/indirectly caused by information leakage” . Wrong response will enlarge damages: be sure to conduct adequate responses by referring following URL.

<Reference>

IPA – Tips when information leakage incident occurred

http://www.ipa.go.jp/security/awareness/johorouei/ (in Japanese)

 

VI. Accessing Status Captured by the Internet Monitoring (TALOT2”) in September

According to the Internet Monitoring (TALOT2), the total of unwanted (one-sided) number of access in September 2007 was 242,378 for 10 monitoring points. That is, the number of access was 808 from 243 source addresses/monitoring point/day.

Since each monitoring environment for the TALOT2 is nearly equal to the general connection environment used for the Internet; it can be considered that the same amount of unwanted (one-sided) access can be monitored for the general Internet users' connection environment. In another word, your computer is being accessed from 243 unknown source addresses in average/day or you are being accessed from 3 times from one source address which considered unauthorized.

Number of Access and Source Number of Access/Day/Monitoring Point in Average

Chart 6-1 Unwanted (One-sided) Number of Access and Source Number of Access/Monitoring Point/Day

The Chart 6-1 shows the unwanted (one-sided) number of access and the source number of access/day/monitoring point in average from April to September 2007 for the respective months. This chart also shows that the both unwanted (one-sided) accesses indicating less than 1,000 for the continuum of past 3 months: it seems that both accesses tend to moderately be decreasing.

The accessing status in September 2007 was decreasing as with the pacing seen in July and August: this maintains from January 2007. However, such access targeting those computers that can remotely access to the other could be seen many.

 

(1) Accesses targeting such servers that use SSH

The accesses to the computers which use SSH (Secure Shell: the command execution tool for which security is enough strengthened to which communication path is encrypted for remotely accesses.) seemed such accesses targeting those computers with simple/easily breakable passwords.

The Chart 6.2 shows the number of access to the port 22/tcp in the TALOT2 system which uses SSH for the system maintenance purposes.

Number of Access to the Port 22/tcp Classified by Source Area (One Monitoring Point which Uses SSH)

Chart 6-2 Number of Access to the Port 22/tcp Classified by Source Area (One Monitoring Point which uses SSH)

As it shows in the above graph, there may be accessed several tens of thousands and several millions of accesses *1 per day. Those computers responding to such accesses are conducted by Brute Force attack *2 which analyzes their passwords.

*1:   Since these accesses are for specific monitoring point; these data are excluded from statistic information as they are not suit for the purposes to publicize for general users. The accesses which use P2P file sharing software are also excluded with the same reason. Though the entire number of accesses seemed being decreased; you can realize that this is not always true when including such accesses observed in such specific monitoring point.

*2:   Brute Force attack is also referred as Exhaustive attack which uses variety means to break passwords.

In the information of unauthorized access reported to IPA, such access instances caused by insufficient IDs and/or passwords being set are increasing consecutive years. Accordingly, system administrators should thoroughly check IDs and passwords used for applications one more time and conduct enforcing connection authentication. It is also important to check with or without of vulnerability in servers.

 

For further details, please refer to the following site.

Attachment3_Observation Status Captured by the Internet Monitoring (TALOT2)

http://www.ipa.go.jp/security/english/virus/press/200709/TALOT200709.html

 


“Various Statistics Information Provided by Other Organizations/Vendors are Publicized in the Following Sites”


@police:      http://www.cyberpolice.go.jp/english/
Trendmicro: http://www.trendmicro.com/en/home/us/home.htm
McAfee:      http://www.mcafee.com/us/

 

- Attachment 3 Observation Status by Internet Monitoring System (TALOT2)

- Attachment 4 Computer virus Incident Report for the 3rd Quarter (July to September)

- Attachment 5 Unauthorized Computer Access Incident Report for the 3rd Quarter (July to September)

   


Contact
IT Security Center, Information-technology Promotion Agency, Japan (IPA/ISEC)
Tel:+81-3-5978-7527

Fax:+81-3-5978-7518

E-mail:






Term of Use


Copyright(c) Information-technology Promotion Agency, Japan. All rights reserved 2005