November 13, 2009
IT Security Center
Information-technology Promotion Agency, Japan (IPA)
This is the summary of computer virus/unauthorized computer access incident reports for October, 2009 compiled by IPA.
“The “Threat relevant to Falsified Security Measures Software” Enlarges Again!”
-Be sure to learn malicious intents’ methodologies to prevent potential damages-
According to the virus reports summarized by IPA by every month, such threat that the malicious program (hereinafter, we will refer it as virus) which attempts user to purchase “falsified security measures software” is again enlarged after the interval of about a year (See the Chart 1-1): |
The “falsified security measures software” refers the virus which warns user fictitious messages such as “Your computer is infected by virus”, etc. This virus also displays the fabulous window relevant to “virus detection”: This window urges the user to purchase paid-for product to remove virus. Eventually, the user will be led to a malicious site to buy “falsified security measures software”.
To prevent potential damages caused by this virus, be sure to check the methodology (ies) used by this anew “falsified security measures software” type of virus for which we’d specifically describe below.
* Detection Number:The gross total of the virus (pcs.) found by users and then filed by IPA.
As for the infection mechanism, following instances are identified as the methodologies used by the “falsified security measures software” type of virus:
(i)via the file (s) appended to spam:
It can be assumed that there distributed/spread spams that masqueraded to be Microsoft and/or one of renowned businesses in overseas extensively wide area (see the Chart 1-2). Accordingly, if user opens the file appended to that spam either intentionally or by mistake, |
the virus (i.e., downloader) which embedded in the file automatically downloads/installs the “falsified security measures software” type of virus from the site (s) outside while the user does not know; (see the “step 1-1 to 1-3” in the Chart 1-3).
(ii)Upon browsing one of the legitimate websites in where wrongful scripts are previously embedded:
In this methodology, when user attempts to browse one of legitimate websites, the “falsified security measures software” type of virus will be automatically downloaded/installed to his/her computer since wrongful scripts (program) was already embedded to the legitimate site by malicious intent (see the “step 2-1 to 2-5” in the Chart 1-3). In this case, such vulnerability (ies) in the user’s OSs and/or applications such as Adobe Flash Player, Adobe Reader, etc. will be exploited by the virus (i.e., malicious intent).
Chart 1-3: Infection Mechanism used by the “Falsified Security Measures Software” type of Virus
To prevent potential damages caused by the “falsified security measures software” type of virus, be sure to conduct following measures:
(a)Spam handling:
The best security measures against the virus masquerading to be the one of substantiated/renowned organizations such as Microsoft, etc. being appended to spam to have you make it trust such as in the (i) in the “ (1) Infection Mechanism” above is “never, ever opens the mail which you think you are not related to”. It depends, but it is also helpful to immediately contact to the organization (i.e., supposed to be the source of the sender) to verify the authenticity. It is utmost important to pay close attention to prevent infection from virus if you feel somewhat suspicious.
(b)Vulnerability measures:
As with the (ii) in the “(1) Infection Mechanism” above, you may get damage even you simply browse legitimate website (s) in where wrongful scripts are previously embedded: in this case, the vulnerability (ies) in your OSs and/or applications are already exploited by malicious intent. Further, if the vulnerability (ies) in the computer to be used for editing web pages is not resolved, you will give malicious intent a chance to embed wrongful scripts so that you may cause those users who browse that web pages. As you will see, the fundamental preventive measures is to maintain your OSs and applications always up-to-dated and to resolve vulnerability (ies) as far as you can.
(c)Anti-virus measures:
As for the common preventive measures along with the individual preventive measures mentioned in the (a) and (b), it is also important to update your trustful anti-virus software upon use. If you are going to purchase anti-virus software, be sure to pick up the one provided by an enough trustful provider. To that end, we encourage you to purchase it at a retailer, etc. directly rather downloading it via the Internet.
Upon verified the “falsified security measures software” type of virus obtained by IPA, we identified following symptoms:
These symptoms are appeared on the display in concert (see the Chart 1-4) and the user is eventually misled to enter his/her personal information such as credit card number, etc.
Chart 1-4: The Windows Display Infected by the “Falsified Security Measures Software” type of Virus
As you can easily imagine that trustful anti-virus measures software does not urgently alert in this way. In case your computer anomaly behaves like the example in the Chart 1-4 it is probable that your computer is get infected by the “falsified security measures software” type of virus: The potential cause may be your anti-virus software which is not regularly up-to-dated. The virus may furnish variety of blocking mechanisms against anti-virus software. Accordingly, they may be remained in your computer even you up-to-date your anti-virus software to remove the virus. In case such symptoms do not remedied, be sure to refer to the “(4) Post Countermeasures” which described below.
In case the symptoms do not remedied with the anti-virus software up-to-dated, be sure to conduct “System Restore” which will be specified in (a) below. If the symptoms are still remained in vain or the “System Restore” is failed, be sure to initialize your computer as the last resort.
(a)Recovery by “System Restore”:
Windows XP, Windows Vista, and Windows 7 furnish “System Restore” function that can restore back to the previous state either before the computer unstably behaves or the computer is getting unavailable. This is the default function which recovers the computer’s state based on the system information the Windows automatically and routinely stores.
Upon conducting the “System Restore”, be sure to refer to the following URLs provided by Microsoft. Please be noted, those application software installed, the information updated from the date you’d specified to today will be unavailable so that you need to do that again after the “System Restore” is successfully completed.
(b)Computer Initialization:
This refers to initialize your computer to the original state when you just purchased it. Upon initialize your computer, be sure to follow to the procedures in the “restoring to the computer just purchased” described in your instruction manual. As always, we recommend you to back up important data to the outside memory media such as USB memory, CD-R, or add-on HDD, etc. for your further security.
The detection number of virus(*1)in October was about 70T: decreased about 7.8% from the one in September (76T). In addition, the reported number of virus(*2)in October was 1,210: 6.9% decreased from 1,301 in September.
*1 Detection Number: virus counts (cumulative) found by a filer.
*2 Aggregated virus counts. Viruses of same type and their variants reported on the same day are counted as one case number regardless how many viruses or the actual number of viruses is found by the same filer on the same day. In October, the reported number was 1,210 and the aggregated virus count was about 70T.
The worst detection number was W32/Netsky with about 59T: W32/Mydoom with about 3.3T and W32/Mytob with about 2.8T followed.
Chart 2-1: Detection Number of Virus
Note: Numbers in parenthesis are for the previous month
Chart 2-2: Reported Number of Virus
Note: Numbers in parenthesis are for the previous month
In September 2009, the detection number of the “falsified security measures software” type of virus was drastically increased (see the Chart 2-3). As we specifically parsed in the introductory chapter followed by the “1. Reminder for the Month”, this may be the cause that the mails to which FAKEAV appended were massively distributed to infect the “falsified security measures software” type of virus. When infected, it usually causes significant damages: in the worst case, you need to initialize your computer to recover from the infection: Accordingly, as always, you are to be cautious with the information about the virus continually.
For your further information, number of such falsified programs having been distributed as the attachment file to e-mail: as you will see it from the Chart 2-3 below, they move artificially as they significantly increase at certain period of time, etc. This may be the cause that massive mails are concurrently distributed by bot, etc.
At the Cyber Clean Center (CCC), they are providing anti-bot measures as well as its removable tools on their web site. Be sure to utilize them as the part of infection prevention measures to check with or without of bot and/or to block installing falsified program in your computer, etc.
Chart 2-3: Detection Number of Falsified Program/Type by Month
| May | Jun. | Jul. | Aug. | Sep. | Oct. | ||
|---|---|---|---|---|---|---|---|
| Total for Reported (a) | 8 | 7 | 14 | 20 | 11 | 21 | |
| Damaged (b) | 6 | 6 | 6 | 12 | 8 | 14 | |
| Not Damaged (c) | 2 | 1 | 8 | 8 | 3 | 7 | |
| Total for Consultation (d) | 45 | 35 | 24 | 39 | 44 | 34 | |
| Damaged (e) | 16 | 9 | 3 | 17 | 13 | 11 | |
| Not Damaged (f) | 29 | 26 | 21 | 22 | 31 | 23 | |
| Grand Total (a + d) | 53 | 42 | 38 | 59 | 55 | 55 | |
| Damaged (b + e) | 22 | 15 | 9 | 29 | 21 | 25 | |
| Not Damaged (c + f) | 31 | 27 | 29 | 30 | 34 | 30 | |
Reported number in October was 21: Of 14 was the number actually damaged.
The consultation number relevant to unauthorized computer access was 34 (of 4 were also counted as reported number): Of 11 was the number actually damaged.
The breakdown for the damage reports were intrusion with 6, unauthorized mail relay with 1, DoS attack with 1 and masquerading with 6.
As for the damages caused by “intrusion” were: maleficent file was located and/or file was destructed on web servers with 3, servers were exploited as the steppingstone server to attack to the other sites with 2, data theft from servers with 1. The damage cause relevant to “intrusion” included: the vulnerability in web application was exploited with 3 (of 2 were the vulnerability (ies) relevant to phpMyAdmin), insufficient password management with 2 and insufficient configuration with 1.
As for the damages caused by “masquerading”, someone spoofing to be the legitimate user for on-line services logged in and used the services without asking with 6 (i.e., on-line games with 5 and shopping portal with1) was the major cause.
[Intrusion]
[Masquerading]
The gross number of consultation in October was 2,049. Of the consultation relevant to “One-click Billing Fraud” was 793 (September: 650) and was marked the worst figure ever before. The consultation relevant to “Hard selling of falsified anti-virus software” was 6 (September: 6), the consultation relevant to “Winny” with 3 (September: 0), were also realized. (The consultation relevant to “the suspicious mail sent to specific organization to collect specific information/data” was 0 (September: 0).
| May | Jun. | Jul. | Aug. | Sep. | Oct. | ||
|---|---|---|---|---|---|---|---|
| Total | 1,765 | 1,898 | 1,708 | 1,792 | 1,653 | 2,049 | |
| Automatic Response System | 992 | 1,081 | 923 | 1,105 | 915 | 1,157 | |
| Telephone | 710 | 777 | 736 | 702 | 676 | 843 | |
| 58 | 37 | 47 | 68 | 60 | 45 | ||
| Fax, Others | 5 | 3 | 2 | 7 | 2 | 4 | |
*IPA consults/advises for computer viruses/unauthorized computer accesses as well as the other information concerning overall security issues
*”Automatic Response System”: Responding numbers by automatic response
*“Telephone”: Responding numbers by the Security Center personnel
*The Total case number includes the number in Consultation (d) column of the Chart in the “III. Reported Status for Unauthorized Computer Access” and “IV. Accepting Status of Consultation”.
Chart 4-1: One-click Billing Fraud/Consultation Number
The major consultation instances are as follows.
I sneaked to browse an adult site with the computer in my office. Since it came to my ears that users can watch adult movies free of charge, I went down by clicking buttons appeared on my display in turn; then a billing statement which followed by the message saying “Your registration has successfully completed” could not be disappeared. I inquired it to IPA and realized that my computer is infected by virus. The consultant kindly advised me how to address it; an error message with “Administrative privilege is required” is displayed and is far beyond of my account. Though I attempted to log in with one of administrative account, I am totally unable to address it.
(Other than this, we’d filed more than 10 cases of similar troubles when reporters browsed an adult site with the computer in their office.)
With the computers in an office to which “restrictive account” have been configured, there may be difficulties upon restoring them. It is possible to configure certain administrative privilege on your account tentatively to address such troubles; however, you need to give reasonable excuses to the system administrator in your office.
Fundamentally, browsing an adult site in your office is allowed? It may be varied from business to business, but most of them probably provide certain disciplines. Other than adult sites, there are number of malicious sites that attempt to infect users’ computers in the cyber world. It depends, but there is such virus which enlarges infection to the other users in your office. Accordingly, if you will be the casualty, your responsibility is significant, indeed. Be sure to refrain browsing such site (s) which is not directly related to your work during office hours.
One personnel traveled overseas: he/she stored data obtained there in an USB memory and got back to Japan. Upon inserted the USB memory to his/her computer to retrieve the data, the computer gets anomaly behaving. In the mean time, some servers that are operated in my office also anomaly behaves. Further, of about 50 computers in my office behave differently. Their symptoms are as follows:
Of some of the USB memory infection type of virus, there is such virus which enlarges infection by copying itself to the network sharing folder, or by exploiting vulnerability in the other computers (MS08-067); it seems that the virus is spread over in your office.
Further, it seems that the computers may have been infected by the newly emerged viruses as well for which virus signature has not yet been available. Because number of computers in your office is already infected by virus and the newly emerged virus (es?) as well, asking security professionals is the shortcut for earlier resolution.
According to the Internet Monitoring (TALOT2), the total of unwanted (one-sided) number of access in October was 161,716 for the 10 monitoring points and the gross number of source* was 66,430. That is, the number of access was 522 from 214 source addresses/monitoring point/day.
*Gross number of source:Gross number of source refers the total of source number of access summed-up to the respective monitoring points in TALOT2.
Since each monitoring environment for the TALOT2 is nearly equal to the general connection environment used by the Internet; it can be considered that the same amount of unwanted (one-sided) access can be monitored for the general Internet users’ connection environment.
Chart 5-1: Unwanted (One-sided) Number of Access and Source Number of Access/Monitoring Point/Day in Average
The Chart 5-1 shows the unwanted (one-sided) number of access and the source number of access/monitoring point/day in average from May to October 2009. Both unwanted (one-sided) number of accesses were subtly decreased from the ones in September.
The Chart 5-2 shows the comparison in number of access classified by destination (by port) in September and October. As the graph shows, the access to the port 445/tcp was increased about 40% from the one in September.
The port 445/tcp is one of the renowned ports to be targeted by the viruses and worms which exploit vulnerability (MS08-067) in Windows. The vulnerability (MS09-050) in SMB(*)v2 in Windows publicized by Microsoft on October 13, 2009 (U.S.time) was also relevant to the port 445/tcp.
In TALOT2, such access increase to the port 445/tcp had been monitored on and around the vulnerability information was publicized, there may have been some malicious activities which attempted to exploit this vulnerability (see the Chart 5-3). Since this vulnerability can be permanently addressed by applying the modification program which provided by Microsoft on the day the vulnerability was publicized: accordingly, be sure to apply it immediately for your further security.
(*) SMB is referred as Server Message Block. This is the one of file sharing protocols to be used by the computer on Windows by default. SMBv2 (SMB Version 2.0) is the up-dated version for the default SMB and only supported by Windows Server 2008, Windows 7 and Windows Vista.
Chart 5-2: Comparison in Number of Access Classified by Destination (by Port) (September:October)
Chart 5-3: Number of Access to the Port 445/tcp Classified by Source Area
(10 Monitoring Points Total)
For further information, please also refer to the following URLs.
IT Security Center, Information-technology Promotion Agency, Japan (IPA/ISEC)
Tel:+81-3-5978-7527
Fax:+81-3-5978-7518
E-mail: ![]()