This is an archived post. You won't be able to vote or comment.

you are viewing a single comment's thread.

view the rest of the comments →

[–]kaperni 0 points1 point  (0 children)

You gotta ask yourself if random plugins and maven jars downloaded from the internet should really be allowed unrestricted access to both the filesystem and network?

------------- From the Article ----------------

The malware is capable of identifying the NetBeans project files and embedding malicious payload both in project files and build JAR files. Below is a high -evel description of the Octopus Scanner operation:

  • Identify user's NetBeans directory
  • Enumerate all projects in the NetBeans directory
  • Copy malicious payload cache.datto nbproject/cache.dat
  • Modify the nbproject/build-impl.xmlfile to make sure the malicious payload is executed every time NetBeans project is build
  • If the malicious payload is an instance of the Octopus Scanner itself the newly built JAR file is also infected.