January 21, 2009
IT Security Center
Information-technology Promotion Agency, Japan (IPA)
This is the report for unauthorized computer access from January to December 2008 compiled by IPA.
The yearly reported number for unauthorized computer access in 2008 was 155: decreased 63 (about 29%) compared with 218 in 2007. Following graph shows the shift in reported number filed by IPA Security Center over the past 10 years. They are tending to decrease in the most recent 5 years.
When compared with 2007, the total reported number and the numbers for actually damaged were both decreased in 2008.
Follows are of the reports classified by actually damaged. The number of the contents of the damage was decreased 81 (about 34%) compared with the one in 2007. The major reports filed with IPA are: alteration of files (inclusive of embedding of programs), lowering of service and alteration of homepages. As for the breakdown in the “Others”, “Spoofing of legitimate user in on-line services”, “exploiting as a steppingstone to attack to the other site (s)”, etc. were the major damages.
About 50% were from individual reporters.
The actual damages can be classified by following causes: Insufficient ID/password management/configuration with 35 (29%), use of older versions/patches have not yet been applied with 16 (13%), insufficient configuration with 4 (3%), etc. In addition, causes cannot be identified with 39 (33%) and was taking over about 30% against the whole. Accordingly, it can be considered as the methodology of unauthorized computer access was getting sophisticated, such instances for which causes cannot be identified were proportionally increased.
The remarkable aspects in 2008 were as follows. Intruded by the attack to the port used by SSH for which major cause is insufficient ID/password management, fraudulently accessed to the on-line services spoofed to be a legitimate user, exploited vulnerability (ies) in web applications were the named. It can be said that such tendency is being maintained over the past several years. For your information, most of damages listed here could have been successfully prevented if fundamental security measures were adequately conducted. Accordingly, system administrators should review following items as well as to conduct comprehensive countermeasures.
- ID/password severe management/configuration
- Applying patches for security holes (includes operational preventive measures if applying patches is not available)
- Router/firewall configuration/access control configuration
- Frequently check logs
As for individual users, be sure to check back following items.
- Up-dates your OSs and application software by Windows Update and Office Update, etc.
- Password configuration/management (use of complexed password, change it routinely, do not tell it to the other people)
- Leverages your router and personal firewall
- Check back of encryption of configuration in wireless LAN (use WPA2 as possible as you can, but WEP)
Please also refer to the following URLs for your further security:
Information-Technology Promotion Agency, Security Center
Kagaya/Hanamura/Ooura
Tel:+81-3-5978-7527
Fax:+81-3-5978-7518
E-mail: ![]()