No, because it targets the project folders and the build artifacts, not the NetBeans JARs themselves.
--emi On Fri, May 29, 2020 at 11:33 PM Juan Algaba <jalg...@colef.mx> wrote: > > I wonder if excluding netbeans from antivirus scanning (for performance > reasons), but not the project folders, make you more at risk to something > like this? > > On Fri, May 29, 2020 at 12:40 PM Alan <netbeans.5zc...@ambitonline.com> wrote: >> >> The malware is oddly focused. I suspect a specific group was being targeted. >> If eventually GitHub releases the project names that might provide a clue. >> >> On 2020-05-29 15:30, Emilian Bold wrote: >> >> so I guess this is all just about me. :-) >> >> Hehe. >> >> Still, they worked too much to target Ant and NetBeans. I think the >> Gradle wrapper is a much easier target and developers will run >> ./gradlew without a 2nd tought. >> >> --emi >> >> On Fri, May 29, 2020 at 10:25 PM Geertjan Wielenga <geert...@apache.org> >> wrote: >> >> Sure, those are simply Ant files. >> >> I also wonder about the 26 open source projects they refer to on GitHub, >> without naming them, where this problem was encountered. I have about that >> number of NetBeans projects in my GitHub repo, so I guess this is all just >> about me. :-) >> >> Gj >> >> On Fri, 29 May 2020 at 21:22, Scott Palmer <swpal...@gmail.com> wrote: >> >> The malware explicitly targets NetBeans: >> >> The malware is capable of identifying the NetBeans project files and >> embedding malicious payload both in project files and build JAR files. Below >> is a high -evel description of the Octopus Scanner operation: >> >> • Identify user's NetBeans directory >> • Enumerate all projects in the NetBeans directory >> • Copy malicious payload cache.dat to nbproject/cache.dat >> • Modify the nbproject/build-impl.xml file to make sure the malicious >> payload is executed every time NetBeans project is build >> • If the malicious payload is an instance of the Octopus Scanner itself the >> newly built JAR file is also infected. >> >> >> >> Though they did also mention: >> >> "If malware developers took the time to implement this malware specifically >> for NetBeans, it means that it could either be a targeted attack, or they >> may already have implemented the malware for build systems such as Make, >> MsBuild, Gradle and others as well and it may be spreading unnoticed," >> GitHub added. >> >> >> I’m not sure if there is any sort of sanity check NB can do to the cache.dat >> file to help prevent this. >> >> Scott >> >> >> On May 29, 2020, at 3:16 PM, Geertjan Wielenga <geert...@apache.org> wrote: >> >> >> It seems to be saying that a build system that uses Apache Ant can be >> poisoned by malware. That probably is equally true for Gradle and Apache >> Maven — so I don’t understand why they’re picking on Ant. >> >> Gj >> >> On Fri, 29 May 2020 at 21:09, Peter Steele <steeleh...@gmail.com> wrote: >> >> Hi >> >> Saw this >> >> https://www.zdnet.com/article/github-warns-java-developers-of-new-malware-poisoning-netbeans-projects/ >> >> Do we know anything more about this? >> >> >> --------------------------------------------------------------------- >> To unsubscribe, e-mail: users-unsubscr...@netbeans.apache.org >> For additional commands, e-mail: users-h...@netbeans.apache.org >> >> For further information about the NetBeans mailing lists, visit: >> https://cwiki.apache.org/confluence/display/NETBEANS/Mailing+lists >> >> >> > > > -- > > -Juan Algaba --------------------------------------------------------------------- To unsubscribe, e-mail: users-unsubscr...@netbeans.apache.org For additional commands, e-mail: users-h...@netbeans.apache.org For further information about the NetBeans mailing lists, visit: https://cwiki.apache.org/confluence/display/NETBEANS/Mailing+lists