processing-docs
processing-docs copied to clipboard
F-Secure finds 3 instances of Java/Blackhole malware exploit in Processing docs zip file
Issue description
Steps to reproduce: (28 November 2020) OS Windows 10 Pro, latest version; Microsoft Edge, latest version. F-Secure anti-virus, fully up-to-date:
Downloaded zip file of processing/docs (28 November 2020). Scanned with up-to-date F-Secure anti-virus. 3 instances of the blackhole exploit found:
[2] BApplet.class Exploit.EXP/Blacole.S.9
Category: Malware Type: Exploit Platform: Java
3 specific harmful items found (from the F-Secure report):
Exploit.EXP/Blacole.S.9 processing-docs-master.zip[5754] processing-docs-master/exhibition/works/cdrawer/cdrawer.jar[2] BApplet.class processing-docs-master.zip[5909] processing-docs-master/exhibition/works/inequality/inequality.jar[2] BApplet.class processing-docs-master.zip[6063] processing-docs-master/exhibition/works/sodaprocessing/sodaprocessing.jar[2]
Part of an exploit kit: see also: https://www.f-secure.com/v-descs/exploit_java_blackhole.shtml
F-Secure reported that it was unable to clean the files. I reverted to deleting the zip file.
URL(s) of affected page(s)
See above note.
Proposed fix
Author to examine original code files, perhaps send individual files to F-Secure for analysis; remove exploit from affected files if the exploit is real, or modify the code to prevent false negative if that's the case, or post notice that such a false negative exists and can be safely ignored.
I would have sent the zip file to F-Secure for analysis myself, but their file-size limit is 30Mb. I'm not opening the zip file myself just in case this is a real issue.
We get a lot of false positives like this, usually with things from core.jar. If you find out anything, let us know.