Also sent it to annou...@apache.org.

I'll wait a few hours for any comments anyone has on the text, which is a
bit of a mosaic of the comments throughout this thread -- mostly by Eric
Costlow, many thanks! -- and will then tweet this, etc.

Gj

On Mon, Jun 1, 2020 at 1:27 PM Geertjan Wielenga <geert...@apache.org>
wrote:

>
> https://blogs.apache.org/netbeans/entry/newly-identified-inactive-malware-campaign
>
> There it is!
>
> Gj
>
> On Mon, Jun 1, 2020 at 11:55 AM Sally Khudairi <s...@apache.org> wrote:
>
>> Thank you, Geertjan; hello, everyone.
>>
>> Great work --I first noticed what had happened from Emilian's, followed
>> by your, tweets yesterday. I see that quite a few articles are out on this
>> Octopus Scanner campaign.
>>
>> Rapid response is essential to avoid further confusion/miscommunication,
>> so great work on getting on this straight away.
>>
>> I have two minor requests: if you could 1) please refer to "Apache Ant"
>> and "Apache NetBeans" upon the first mention of the projects in the post,
>> that would be great. Also, 2) send this to annou...@apache.org so we can
>> help spread the word.
>>
>> I'll be standing by to help with any media queries that come through for
>> the PMC.
>>
>> Many kind thanks for your ongoing efforts.
>>
>> Best,
>> Sally
>>
>> - - -
>> Vice President Marketing & Publicity
>> Vice President Sponsor Relations
>> The Apache Software Foundation
>>
>> Tel +1 617 921 8656 | s...@apache.org
>>
>>
>> On Mon, Jun 1, 2020, at 02:48, Geertjan Wielenga wrote:
>> >
>> > Hi Sally,
>> >
>> > We propose putting the below on the Apache NetBeans blog re the GitHub
>> malware report on the inactive malware campaign.
>> >
>> > To everyone else — Sally is VP Marketing and Publicity at Apache.
>> >
>> > Thanks, and thanks Eric for your rewrite of the text.
>> >
>> > Gj
>> >
>> > On Sun, 31 May 2020 at 22:39, Erik Costlow <erikcost...@outlook.com>
>> wrote:
>> >> If making any comment at all, I would rewrite. If there were a
>> vulnerability or the attack was large, I'm sure the GitHub team would have
>> gotten in touch. The key themes are:
>> >>
>> >>  1. The attack was small, isolated, and is over
>> >>  2. Most builds do not leverage anything netbeans-specific, such as
>> this ant build (I guessed at 2006)
>> >>  3. Software supply chain risk is legitimate and if action were needed
>> or is needed in the future, something would happen
>> >>
>> >> Researchers at GitHub have identified 26 projects on GitHub that have
>> been infected by malware. The initial point of infection is undetermined
>> and all activity with the malware has been shut down. The malware relied on
>> projects created using an older customized ant-based build system that has
>> been in limited use since 2006. This does not impact users of other build
>> systems like Maven or Gradle, or even most ant users. The majority of
>> NetBeans projects leverage native build tool integrations that is shared
>> with continuous integration systems.
>> >> With over 44 million repositories hosted on GitHub[2], the scope of
>> these 26 projects looks isolated and does not significantly impact the
>> NetBeans community.
>> >> Software Supply Chain attacks are not unique to any IDE and the
>> NetBeans contributor team will monitor the threat landscape to keep
>> developers safe and aware.
>> >>
>> >> [1]
>> https://securitylab.github.com/research/octopus-scanner-malware-open-source-supply-chain
>> >> [2]
>> https://www.zdnet.com/article/github-tops-40-million-developers-as-python-data-science-machine-learning-popularity-surges/
>> >>
>> >>
>> >> "Researchers at GitHub have identified 26 projects on GitHub that have
>> been
>> >> infected by malware. The malware infiltrates the project structure of
>> >> Ant-based applications in the format generated specifically by
>> NetBeans.
>> >> The owners of the 26 projects, which are mostly small Java
>> applications,
>> >> have been contacted and the infected projects have been set to private
>> on
>> >> GitHub. The malware campaign is no longer active, GitHub did not
>> consider
>> >> it relevant enough to be in touch with the NetBeans community about
>> it, and
>> >> there is no evidence that applications beyond the 26 in question have
>> been
>> >> impacted. Be aware that any project structure that you use when
>> developing
>> >> applications can be infiltrated by malware and make sure that the
>> files you
>> >> check into your versioning system are your own or that you know where
>> they
>> >> come from and what they do."
>> >>
>> >>
>> >> ________________________________
>> >> From: Neil C Smith <neilcsm...@apache.org>
>> >> Sent: Sunday, May 31, 2020 1:51 PM
>> >> To: dev <dev@netbeans.apache.org>
>> >> Subject: Re: Proposed blog on malware report
>> >>
>> >> On Sun, 31 May 2020, 18:08 Geertjan Wielenga, <geert...@apache.org>
>> wrote:
>> >>
>> >> > Be aware that any project structure that you use when developing
>> >> > applications can be infiltrated by malware and make sure that the
>> files you
>> >> > check into your versioning system are your own or that you know
>> where they
>> >> > come from and what they do."
>> >> >
>> >> >
>> >> > Feedback welcome and needed.
>> >> >
>> >>
>> >> Looks good to me, but I'd be tempted to emphasise "when developing
>> >> applications, with any IDE or build system, ..." And also that you
>> should
>> >> treat building untrusted code the same way you'd treat running
>> untrusted
>> >> binaries, ie. carefully.
>> >>
>> >> Interesting that the GitHub article doesn't mention that this applies
>> to
>> >> projects that were originally structured with Ant in NetBeans. You
>> wouldn't
>> >> have to still be building in the IDE to be exploited here?
>> >>
>> >> Best wishes,
>> >>
>> >> Neil
>> >>
>> >> >
>
>

Reply via email to