https://blogs.apache.org/netbeans/entry/newly-identified-inactive-malware-campaign

There it is!

Gj

On Mon, Jun 1, 2020 at 11:55 AM Sally Khudairi <s...@apache.org> wrote:

> Thank you, Geertjan; hello, everyone.
>
> Great work --I first noticed what had happened from Emilian's, followed by
> your, tweets yesterday. I see that quite a few articles are out on this
> Octopus Scanner campaign.
>
> Rapid response is essential to avoid further confusion/miscommunication,
> so great work on getting on this straight away.
>
> I have two minor requests: if you could 1) please refer to "Apache Ant"
> and "Apache NetBeans" upon the first mention of the projects in the post,
> that would be great. Also, 2) send this to annou...@apache.org so we can
> help spread the word.
>
> I'll be standing by to help with any media queries that come through for
> the PMC.
>
> Many kind thanks for your ongoing efforts.
>
> Best,
> Sally
>
> - - -
> Vice President Marketing & Publicity
> Vice President Sponsor Relations
> The Apache Software Foundation
>
> Tel +1 617 921 8656 | s...@apache.org
>
>
> On Mon, Jun 1, 2020, at 02:48, Geertjan Wielenga wrote:
> >
> > Hi Sally,
> >
> > We propose putting the below on the Apache NetBeans blog re the GitHub
> malware report on the inactive malware campaign.
> >
> > To everyone else — Sally is VP Marketing and Publicity at Apache.
> >
> > Thanks, and thanks Eric for your rewrite of the text.
> >
> > Gj
> >
> > On Sun, 31 May 2020 at 22:39, Erik Costlow <erikcost...@outlook.com>
> wrote:
> >> If making any comment at all, I would rewrite. If there were a
> vulnerability or the attack was large, I'm sure the GitHub team would have
> gotten in touch. The key themes are:
> >>
> >>  1. The attack was small, isolated, and is over
> >>  2. Most builds do not leverage anything netbeans-specific, such as
> this ant build (I guessed at 2006)
> >>  3. Software supply chain risk is legitimate and if action were needed
> or is needed in the future, something would happen
> >>
> >> Researchers at GitHub have identified 26 projects on GitHub that have
> been infected by malware. The initial point of infection is undetermined
> and all activity with the malware has been shut down. The malware relied on
> projects created using an older customized ant-based build system that has
> been in limited use since 2006. This does not impact users of other build
> systems like Maven or Gradle, or even most ant users. The majority of
> NetBeans projects leverage native build tool integrations that is shared
> with continuous integration systems.
> >> With over 44 million repositories hosted on GitHub[2], the scope of
> these 26 projects looks isolated and does not significantly impact the
> NetBeans community.
> >> Software Supply Chain attacks are not unique to any IDE and the
> NetBeans contributor team will monitor the threat landscape to keep
> developers safe and aware.
> >>
> >> [1]
> https://securitylab.github.com/research/octopus-scanner-malware-open-source-supply-chain
> >> [2]
> https://www.zdnet.com/article/github-tops-40-million-developers-as-python-data-science-machine-learning-popularity-surges/
> >>
> >>
> >> "Researchers at GitHub have identified 26 projects on GitHub that have
> been
> >> infected by malware. The malware infiltrates the project structure of
> >> Ant-based applications in the format generated specifically by NetBeans.
> >> The owners of the 26 projects, which are mostly small Java applications,
> >> have been contacted and the infected projects have been set to private
> on
> >> GitHub. The malware campaign is no longer active, GitHub did not
> consider
> >> it relevant enough to be in touch with the NetBeans community about it,
> and
> >> there is no evidence that applications beyond the 26 in question have
> been
> >> impacted. Be aware that any project structure that you use when
> developing
> >> applications can be infiltrated by malware and make sure that the files
> you
> >> check into your versioning system are your own or that you know where
> they
> >> come from and what they do."
> >>
> >>
> >> ________________________________
> >> From: Neil C Smith <neilcsm...@apache.org>
> >> Sent: Sunday, May 31, 2020 1:51 PM
> >> To: dev <dev@netbeans.apache.org>
> >> Subject: Re: Proposed blog on malware report
> >>
> >> On Sun, 31 May 2020, 18:08 Geertjan Wielenga, <geert...@apache.org>
> wrote:
> >>
> >> > Be aware that any project structure that you use when developing
> >> > applications can be infiltrated by malware and make sure that the
> files you
> >> > check into your versioning system are your own or that you know where
> they
> >> > come from and what they do."
> >> >
> >> >
> >> > Feedback welcome and needed.
> >> >
> >>
> >> Looks good to me, but I'd be tempted to emphasise "when developing
> >> applications, with any IDE or build system, ..." And also that you
> should
> >> treat building untrusted code the same way you'd treat running untrusted
> >> binaries, ie. carefully.
> >>
> >> Interesting that the GitHub article doesn't mention that this applies to
> >> projects that were originally structured with Ant in NetBeans. You
> wouldn't
> >> have to still be building in the IDE to be exploited here?
> >>
> >> Best wishes,
> >>
> >> Neil
> >>
> >> >

Reply via email to