Yes, this could be good publicity right before the release!

--emi

sâm., 30 mai 2020, 16:57 Emma Atkinson <emma.atkins...@gmail.com> a scris:

> I wouldn't treat this as a negative thing about which to be defensive. It
> can be positive and show the team in a good light.
>
> Here's a suggestion....
>
> We are aware of news report ... etc.
> We contacted the researchers behind the news.  They found 26 infected
> projects. The owners have been contacted and their accounts have been made
> private, which we think is the correct action.
> We contacted the researcher who has given us some additional information.
> We will examine the information to identify whether there is anything we
> could add or change to Netbeans. There appears to be no need for urgent
> action ahead of the imminent release of Netbeans IDE version 12.
>
> Perhaps add.....
>
> We welcome suggestions from Netbeans  users. Please send your constructive
> proposals and suggestions to <email address>.
>
> Then give the key details of the problems uncovered.
>
>
> Just a suggestion.
>
> Emma
>
>
>
>
> On Sat, 30 May 2020, 14:11 Geertjan Wielenga, <geert...@apache.org> wrote:
>
>>
>> OK, I’ll put together a blog we can refer to that will say this —
>> “research has been done on GitHub that identified 26 small Ant-based Java
>> projects, mostly games, some of them by the same person, none of the
>> projects appeared to be enterprise/professional, that had been infiltrated
>> by malware. The projects have been set to private on GitHub and the project
>> owners have been approached about this. The malware campaign has had very
>> low impact and is considered by GitHub to be over.”
>>
>> Most of the above is not in the research article, but comes from me
>> asking repeated questions on Twitter to the guy behind tbe report.
>>
>> Gj
>>
>>
>> On Sat, 30 May 2020 at 13:57, Emilian Bold <emilian.b...@gmail.com>
>> wrote:
>>
>>> Note this is not a CVE since it's not a NetBeans vulnerability.
>>>
>>> Executing any build will run with the local user privileges on any
>>> popular IDE and injecting something dubious in a build is trivial.
>>>
>>> Still, I think GitHub could have approached the Apache security team so
>>> the NetBeans PMC has a reply to this.
>>>
>>> It would be trivial to push a check for that cache.dat file but it's not
>>> the role of the IDE to play at being an antivirus.
>>>
>>> --emi
>>>
>>> sâm., 30 mai 2020, 14:03 Geertjan Wielenga <geert...@apache.org> a
>>> scris:
>>>
>>>>
>>>> It seems to me like we should put out a blog entry with some response
>>>> to this. Just so that we have a central point to refer to when people ask
>>>> about this.
>>>>
>>>> However, I have no idea what that blog entry should say, beyond “if
>>>> someone wants to do so, they can inject malware into the build process of
>>>> software, here’s an example of how they can do that”, and then point to
>>>> that report.
>>>>
>>>> Gj
>>>>
>>>> On Sat, 30 May 2020 at 12:08, Emma Atkinson <emma.atkins...@gmail.com>
>>>> wrote:
>>>>
>>>>> Should someone from the Apache Netbeans governing team, approach
>>>>> Microsoft for information on this matter?
>>>>>
>>>>> I would have thought Microsoft GitHub would welcome any approach that
>>>>> might go some way toward tackling the problem.  Knowing details should
>>>>> enable the Netbeans and NetbeansIDE communities to help. It would also be
>>>>> good for the public to know Apache Netbeans takes these matters as
>>>>> seriously as Oracle would have done.  Be on the front foot.
>>>>>
>>>>> This might be a matter of reducing risk rather than eliminating a
>>>>> vulnerability.  Any fix may not involve much effort. Perhaps a written or
>>>>> updated guide might be all that is needed. If the contaminated accounts
>>>>> belong to computer science students, perhaps some changes to Apache
>>>>> Netbeans IDE defaults, or added warnings would help users avoid 
>>>>> inadvertent
>>>>> contamination of their code or build environments from untrusted origins. 
>>>>> A
>>>>> general lesson in good practice perhaps.
>>>>>
>>>>> Emma
>>>>>
>>>>>
>>>>> On Sat, 30 May 2020, 09:32 Emilian Bold, <emilian.b...@gmail.com>
>>>>> wrote:
>>>>>
>>>>>> I'm leaning towards this being a student project honestly. Why would a
>>>>>> company developing a legacy project grab random unknown Ant-based
>>>>>> projects from GitHub?
>>>>>>
>>>>>> But NetBeans is used a lot for teaching and I suspect teachers don't
>>>>>> introduce Maven / Gradle since they are more complex and they use the
>>>>>> default Ant-based build system.
>>>>>>
>>>>>> So, if a smart student wants to troll his fellow students it does
>>>>>> something like this.
>>>>>>
>>>>>> Note that GitHub has the full logs of who uploaded, downloaded,
>>>>>> visited and cloned those 26 projects but made no remarks about them. I
>>>>>> think those logs would be highly informative as to source and the
>>>>>> target domain / country. My money is on students from India / China /
>>>>>> Greece / Brazil.
>>>>>>
>>>>>> --emi
>>>>>>
>>>>>> On Fri, May 29, 2020 at 11:50 PM Alan <
>>>>>> netbeans.5zc...@ambitonline.com> wrote:
>>>>>> >
>>>>>> > The odds that a virus scanner would have a pattern for something
>>>>>> like this are very low indeed, so in this specific case I doubt it would
>>>>>> make a difference. However, excluding paths for any reason leaves an
>>>>>> aperture open that could be exploited.
>>>>>> >
>>>>>> > The targeted attacks I've seen are amazingly specific. For example,
>>>>>> someone profiled a customer site looking for the queries with the slowest
>>>>>> response time, then launched requests against those pages at a rate low
>>>>>> enough to not trigger DDoS protection on the network firewall, but to 
>>>>>> bring
>>>>>> the site down anyway.
>>>>>> >
>>>>>> > This malware has the hallmarks of such a specific attack. Scan the
>>>>>> end product for open source components, then infect the components, get 
>>>>>> in,
>>>>>> get the code, go away. Not something your general antivirus software is
>>>>>> ever going to even notice.
>>>>>> >
>>>>>> > On 2020-05-29 16:32, Juan Algaba wrote:
>>>>>> >
>>>>>> > I wonder if excluding netbeans from antivirus scanning (for
>>>>>> performance reasons), but not the project folders, make you more at risk 
>>>>>> to
>>>>>> something like this?
>>>>>> >
>>>>>> > On Fri, May 29, 2020 at 12:40 PM Alan <
>>>>>> netbeans.5zc...@ambitonline.com> wrote:
>>>>>> >>
>>>>>> >> The malware is oddly focused. I suspect a specific group was being
>>>>>> targeted. If eventually GitHub releases the project names that might
>>>>>> provide a clue.
>>>>>> >>
>>>>>> >> On 2020-05-29 15:30, Emilian Bold wrote:
>>>>>> >>
>>>>>> >>  so I guess this is all just about me. :-)
>>>>>> >>
>>>>>> >> Hehe.
>>>>>> >>
>>>>>> >> Still, they worked too much to target Ant and NetBeans. I think the
>>>>>> >> Gradle wrapper is a much easier target and developers will run
>>>>>> >> ./gradlew without a 2nd tought.
>>>>>> >>
>>>>>> >> --emi
>>>>>> >>
>>>>>> >> On Fri, May 29, 2020 at 10:25 PM Geertjan Wielenga <
>>>>>> geert...@apache.org> wrote:
>>>>>> >>
>>>>>> >> Sure, those are simply Ant files.
>>>>>> >>
>>>>>> >> I also wonder about the 26 open source projects they refer to on
>>>>>> GitHub, without naming them, where this problem was encountered. I have
>>>>>> about that number of NetBeans projects in my GitHub repo, so I guess this
>>>>>> is all just about me. :-)
>>>>>> >>
>>>>>> >> Gj
>>>>>> >>
>>>>>> >> On Fri, 29 May 2020 at 21:22, Scott Palmer <swpal...@gmail.com>
>>>>>> wrote:
>>>>>> >>
>>>>>> >> The malware explicitly targets NetBeans:
>>>>>> >>
>>>>>> >> The malware is capable of identifying the NetBeans project files
>>>>>> and embedding malicious payload both in project files and build JAR 
>>>>>> files.
>>>>>> Below is a high -evel description of the Octopus Scanner operation:
>>>>>> >>
>>>>>> >> • Identify user's NetBeans directory
>>>>>> >> • Enumerate all projects in the NetBeans directory
>>>>>> >> • Copy malicious payload cache.dat to nbproject/cache.dat
>>>>>> >> • Modify the nbproject/build-impl.xml file to make sure the
>>>>>> malicious payload is executed every time NetBeans project is build
>>>>>> >> • If the malicious payload is an instance of the Octopus Scanner
>>>>>> itself the newly built JAR file is also infected.
>>>>>> >>
>>>>>> >>
>>>>>> >>
>>>>>> >> Though they did also mention:
>>>>>> >>
>>>>>> >> "If malware developers took the time to implement this malware
>>>>>> specifically for NetBeans, it means that it could either be a targeted
>>>>>> attack, or they may already have implemented the malware for build 
>>>>>> systems
>>>>>> such as Make, MsBuild, Gradle and others as well and it may be spreading
>>>>>> unnoticed," GitHub added.
>>>>>> >>
>>>>>> >>
>>>>>> >> I’m not sure if there is any sort of sanity check NB can do to the
>>>>>> cache.dat file to help prevent this.
>>>>>> >>
>>>>>> >> Scott
>>>>>> >>
>>>>>> >>
>>>>>> >> On May 29, 2020, at 3:16 PM, Geertjan Wielenga <
>>>>>> geert...@apache.org> wrote:
>>>>>> >>
>>>>>> >>
>>>>>> >> It seems to be saying that a build system that uses Apache Ant can
>>>>>> be poisoned by malware. That probably is equally true for Gradle and 
>>>>>> Apache
>>>>>> Maven — so I don’t understand why they’re picking on Ant.
>>>>>> >>
>>>>>> >> Gj
>>>>>> >>
>>>>>> >> On Fri, 29 May 2020 at 21:09, Peter Steele <steeleh...@gmail.com>
>>>>>> wrote:
>>>>>> >>
>>>>>> >> Hi
>>>>>> >>
>>>>>> >> Saw this
>>>>>> >>
>>>>>> >>
>>>>>> https://www.zdnet.com/article/github-warns-java-developers-of-new-malware-poisoning-netbeans-projects/
>>>>>> >>
>>>>>> >> Do we know anything more about this?
>>>>>> >>
>>>>>> >>
>>>>>> >>
>>>>>> ---------------------------------------------------------------------
>>>>>> >> To unsubscribe, e-mail: users-unsubscr...@netbeans.apache.org
>>>>>> >> For additional commands, e-mail: users-h...@netbeans.apache.org
>>>>>> >>
>>>>>> >> For further information about the NetBeans mailing lists, visit:
>>>>>> >> https://cwiki.apache.org/confluence/display/NETBEANS/Mailing+lists
>>>>>> >>
>>>>>> >>
>>>>>> >>
>>>>>> >
>>>>>> >
>>>>>> > --
>>>>>> >
>>>>>> > -Juan Algaba
>>>>>>
>>>>>> ---------------------------------------------------------------------
>>>>>> To unsubscribe, e-mail: users-unsubscr...@netbeans.apache.org
>>>>>> For additional commands, e-mail: users-h...@netbeans.apache.org
>>>>>>
>>>>>> For further information about the NetBeans mailing lists, visit:
>>>>>> https://cwiki.apache.org/confluence/display/NETBEANS/Mailing+lists
>>>>>>
>>>>>>

Reply via email to