July 10, 2009
IT Security Center
Information-technology Promotion Agency, Japan (IPA)
This is the summary of computer virus/unauthorized computer access incident reports for June, 2009 compiled by IPA.
“Isn’t Your Website being Altered?”
-Your website may have been tailored as such website spreading virus-
Currently, there emerged that the number of instances that those websites operated by businesses and individual users are being altered. In the websites being altered, there may be embedded such traps to have users who browsed that websites to infect virus. In the event, there rushed number of reports and consultations to IPA such that “virus was detected”, “computer was infected by virus”, etc. from the users whose websites were being altered.
Such website manager whose website was being altered supposed to be a casualty; however, he/she will also be a victimizer to have the other users’ computers infect virus. To prevent enlarging such damage, website manager should check if his/her website is not illegally altered to the “hub to spread virus”.
As for the cause of website alteration, there is the instance that the account information for ftp* was stolen. In that instance, a malicious intent used the ftp account (ID/password) stolen to masquerade to be a legitimate user and whose web pages altered were publicized (i.e., uploaded) on the web server.
As for the methodology to steal ftp account, sending spyware to subjected computer is often used.
*File Transfer Protocol: such protocol to transfer files via a network.
In the web pages being altered, there embedded fraudulent scripts: accordingly, those general users who’d browsed that pages automatically send to the malicious site in where certain virus was trapped. What if the general user browses that malicious website, he/she will be infected by virus if there is vulnerability in his/her computer (see the Chart 1-1).
Chart 1-1: The Mechanism from Web Alteration to Virus Infection
Website manager should recognize that he/she may have a chance to infect/enlarge virus in the website where he/she manages: be sure to check with or without of alteration by referring following items.
(a) Check the sources on all the web pages on the website
Be sure to check all the web pages on the website whether fraudulent script is included or not. Similarly, be sure to check the (web) pages stored in your computer for update/edition purposes as well. Since it is hardly distinguishable in visual if the webpage is altered or not, you are to check the source for the (web) pages using a homepage editor software, etc.
In June, there identified such website that the following scripts were appended, be sure to check if such random letter-string is not included in your web pages as well.
(b) Check the access logs to the ftp
In this case, there identified such instance that some fraudulent scripts are embedded in the normal pages by exploiting ftp accounts fraudulently. Accordingly, be sure to check the logs if someone is accessed to ftp with the time and date when you were not accessed.
Particularly in businesses, it is recommended to check the access logs to ftp regularly and to implement following items as preventive measures.
- Limits access to ftp (i.e., squeezes IP addresses accessible to ftp, obtains access via VPN only, etc.)
- Implements alteration detection system/service
As mentioned above, it is expected to check the website by the website manager his/herself to detect the part (s) being altered yet certain alteration may be revealed by one of website users. To be ready to take necessary actions swiftly, we encourage website managers to publicize his/her contact on his/her website; simply his/her mail address will be enough.
What if the website being altered will remain longer, the damage that cause those who browse the website will be enlarged as well. Be sure to be ready to respond it immediately in case your website is altered.
In case your website is altered, it is necessary to take immediate actions to prevent enlarging damages. First of all, be sure to close the website anyway to study the cause and take necessary modification activities subsequently. If suspicious logs relevant to ftp were detected, the ftp account used to publicize the website may be hijacked and malicious web pages are uploaded. Accordingly, be sure to change the password for ftp account: when you re-publicize your website, be sure to check if some fraudulent scripts are not included in your normal web pages in advance and then replace them with the wrong ones.
Though repeatedly altered with the same method in vain even you’d changed your password, it is possible that your computer used to change the password may be infected by spyware and the important information such as your ftp accounts, etc. may have been deviated. Accordingly, when you change your password to re-publicize your website, be sure to clean up (i.e., initialize) your computer to free from fraudulent program in advance.
It is ideal to eliminate the cause (s), modify the web pages altered, and then re-publicize the website in turn in case your website is being altered. We also encourage those website managers for whom websites were being altered should communicate their users the facts that your website was altered; there may have been certain risks to get infected by virus and apologize those users who’d browsed your website previously via your renewed website as well. For your further information, it is also ideal to provide inquiry window for general users.
In addition, in case you get damage (s) such as your website is altered; your computer is infected by virus; etc.: be sure to file them with IPA as possible as you can. Here in IPA, we accept reports relevant to both virus and unauthorized computer access: we parse such reports for statistical purposes and publicize them other than the information which is identifiable certain person or business on our website monthly. The reports are also leveraged when we publicize information relevant to countermeasures against viruses, unauthorized computer accesses, etc.
In case a user infects virus by browsing the web pages being altered, it will be the significant threat if he/she cannot realize virus infection visually as there displays none of anomaly. Further, there is number of cases that none of specific symptoms is appeared visually in case infected.
To prevent such virus infection, be sure to conduct following measures.
(a) Resolve vulnerability (ies)
There identified vulnerability (ies) in OSs such as Windows and Mac OS, in application software such as Microsoft Office, Adobe Reader, etc. Be sure to resolve vulnerability (ies) by update your OSs and applications to the latest version, by applying patches, etc.
(b) Anti-virus measures
Be sure to update your signature for your anti-virus software regularly to have your virus detection function always effective.
When infected by virus in the event that you’d browsed the website being altered and automatically sent to a malicious site, your computer may show following symptoms.
- Cannot resolve vulnerability since access to the Microsoft Update is interfered.
- Information relevant to virus is not available, cannot update virus signature, etc. since the site (s) for security measures software vendors is not accessible.
- Cannot run command prompt (cmd.exe) and/or registry editor (regedit.exe).
When such symptoms are identified, it is probable that your computer is infected by virus. There may be a case that your computer is infected by several viruses at one time. To fully remove the viruses, you are to initialize your computer: be sure to back up necessary data files to certain removable memory media such as USB memory, etc. before you start to initialize your computer.
The detection number of virus in June was about 87T: 24.4% decreased from about 115T in May. In addition, reported number of virus in June was 1,460: 5.3% increased from 1,387 in May.
*1 Detection Number: virus counts (cumulative) found by a filer.
*2 Aggregated virus counts. Viruses of same type and their variants reported on the same day are counted as one case number regardless how many viruses or the actual number of viruses is found by the same filer on the same day. In June, the reported number was 1,460 and the aggregated virus count was about 87T.
The worst detection number was for W32/Netsky with about 70T; W32/Downad with about 6T and VBS/Solow with about 3T subsequently followed.
Chart 2-1: Detection Number of Virus
Note: Numbers in parenthesis are for the previous month
Chart 2-2: Reported Number of Virus
Note: Numbers in parenthesis are for the previous month
| Jan.'09 | Feb. | Mar. | Apr. | May | Jun. | ||
|---|---|---|---|---|---|---|---|
| Total for Reported (a) | 10 | 9 | 20 | 9 | 8 | 7 | |
| Damaged (b) | 7 | 6 | 13 | 6 | 6 | 6 | |
| Not Damaged (c) | 3 | 3 | 7 | 3 | 2 | 1 | |
| Total for Consultation (d) | 29 | 35 | 40 | 39 | 45 | 35 | |
| Damaged (e) | 13 | 14 | 11 | 11 | 16 | 9 | |
| Not Damaged (f) | 16 | 21 | 29 | 28 | 29 | 26 | |
| Grand Total (a + d) | 39 | 44 | 60 | 48 | 53 | 42 | |
| Damaged (b + e) | 19 | 20 | 24 | 17 | 22 | 15 | |
| Not Damaged (c + f) | 20 | 24 | 36 | 31 | 31 | 27 | |
Reported number in June was 7: Of 6 was the number actually damaged.
The consultation number relevant to unauthorized computer access was 35 (of 1 was also counted as reported number): Of 9 was the number actually damaged.
The breakdown for damage reports included intrusion with 1, DoS attack with 1, masquerading with 3 and embedding of fraudulent program with 1.
As for the damages caused by intrusion was that the server was exploited as a steppingstone server to attack to the other site (s). The cause of intrusion was that the server was conducted by password cracking* attack to the ports used by SSH*.
*SSH(Secure SHell):One of the protocols to communicate with the computer remotely via a network.
*Password Cracking:The activity to analyze/parse the other person’s password illegally. Brute Force Attack (Exhaustive Search Attack) and Dictionary Attack are the well-known methods. The program for cracking activity is also existed.
[Intrusion]
TCP SYN Flood Attack: The one of the DoS attacks which exploits TCP protocol to lower and/or to halt server’s function.
[Masquerading]
The gross number of consultation in June was 1,898. Of the consultation relevant to “One-click Billing Fraud” was 694 (May: 628): the number was getting worsened ever. The consultation relevant to “Hard selling of falsified anti-virus software” was 6 (May: 2), the consultation relevant to “Winny” with 13 (May: 5), were also realized. (The consultation relevant to “the suspicious mail sent to specific organization to collect specific information/data” was 0 (May: 5).
| Jan.'09 | Feb. | Mar. | Apr. | May | Jun. | ||
|---|---|---|---|---|---|---|---|
| Total | 960 | 1,051 | 1,406 | 1,668 | 1,765 | 1,898 | |
| Automatic Response System | 529 | 521 | 758 | 962 | 992 | 1,081 | |
| Telephone | 390 | 471 | 597 | 651 | 710 | 777 | |
| 39 | 57 | 49 | 55 | 58 | 37 | ||
| Fax, Others | 2 | 1 | 2 | 0 | 5 | 3 | |
*IPA consults/advises for computer viruses/unauthorized computer accesses as well as the other information concerning overall security issues
*”Automatic Response System”: Responding numbers by automatic response
*“Telephone”: Responding numbers by the Security Center personnel
*The Total case number includes the number in Consultation (d) column of the Chart in the “III. Reported Status for Unauthorized Computer Access” and “IV. Accepting Status of Consultation”.
Chart 4-1: One-click Billing Fraud/Consultation Number
The major consultation instances are as follows.
I am using Windows 2000 and Windows XP in my business. Anti-virus software is installed and their signature files are always up to dated so that I may not be infected by virus even I do not conduct Windows Update?
That concept is not true. You may have high risk to get infected by virus if the vulnerability in your computer is not resolved by Windows Update, etc. Hereafter, we explain it allegorically.
PC as in … a house (physical building)
Anti-virus software as in … the entity that monitors in- and out-bound accesses from the door/window for the house (physical building)
For here, such condition that the Windows Update is not conducted mean to be the “house that has certain failure”: it can be assumed that “the wall was partially/entirely collapsed”, “the roof has big hole (s)”, etc. That is, if vulnerability is remained, someone (malicious intent) can easily be intruded into your house with insane attempts.
Resolving vulnerability is the fundamental security measures.
I have a Windows 98 based computer. I have not used it awhile, but I wish to use it again as a word processor or a spreadsheet purposes hereafter. I will not have any risk (s) to get infected by virus if I will not connect to the Internet or a domestic LAN?
Even unconnected, there remains certain risk (s) to get infected by virus if you will exchange some data with the other PC (s). Nowadays, there spreading such virus which infects via an USB memory so that you have to specifically pay attention to it. As for Windows 98/Me, their supporting period by Microsoft is already terminated so that the modification program (s) will not be provided even vulnerability will be developed thereafter: you are confronting high risk (s) accordingly. Even your anti-virus software can respond to it, the anti-virus function may not be properly operated as the OS itself carries problems. That is, if you use such OS for which supporting period is terminated, you have to use it with defenseless state. Naturally, your PC is remained to be risky, so that we do not recommend to use those OSs for which supporting period by its manufacturers is terminated.
According to the Internet Monitoring (TALOT2), the total of unwanted (one-sided) number of access in June was 115,860 for the 10 monitoring points and the gross number of source* was 41,065. That is, the number of access was 386 from 137 source addresses/monitoring point/day.
*Gross number of source:
the gross number of the source accessed to TALOT2. In addition, the source will be counted as 1 if accessed from identical source in the same day to the same point/port
Since each monitoring environment for the TALOT2 is nearly equal to the general connection environment used by the Internet; it can be considered that the same amount of unwanted (one-sided) access can be monitored for the general Internet users’ connection environment.
Chart 5-1: Unwanted (One-sided) Number of Access and Source Number of Access/Monitoring Point/Day in Average
The Chart 5-1 shows the unwanted (one-sided) number of access and the source number of access/monitoring point/day from January to June 2009. Both the unwanted (one-sided) numbers of accesses were subtly increased compared with the ones in May.
The Chart 5-2 shows the comparison in numbers of access classified by destination (by port) for the months of May and June.
In June, the number of access to the port 445/tcp was significantly increased since the access to that port from overseas was increased compared with the one in May (See the Chart 5-3). The cause why such access from overseas was increased has not yet identified; however, the number of access from specific source was not increased, but the entire source number of access from overseas itself was directly relevant to that increase.
In addition, we’d obtained such information that the access to the port 445/tcp from overseas was increased from the other organization who also conducts the Internet monitoring.
As for the other ports other than the port 445/tcp were not significantly shifted, but the accesses to the ports other than the worst 10 ports were significantly decreased.
Chart 5-2: Comparison in Number of Access to the Port 445/tcp Classified by Destination (by Port)
for the Months of May and June
Chart 5-3: Shift in Number of Access to the Port 445/tcp (Domestic/Overseas)
For further information, please also refer to the following URLs.
IT Security Center, Information-technology Promotion Agency, Japan (IPA/ISEC)
Tel:+81-3-5978-7527
Fax:+81-3-5978-7518
E-mail: ![]()