Looks like there is something on TechArtists.
http://discourse.techart.online/t/another-maya-malware-in-the-wild/12970
On Wednesday, September 23, 2020 at 3:34:30 PM UTC-7 Geordie Martinez wrote:Chad Vernon, why do you teach people to do these things? :)On Wednesday, September 23, 2020 at 3:32:39 PM UTC-7 Geordie Martinez wrote:Hey all,
I have been haxored.
I recently opened a file from our studio in china and this malicious code (screencap only attached) was in there. it modified my userSetup.py so when I launched the next maya session it ran all this code. I have no idea what this is.
Has anyone seen this crap before?
--
You received this message because you are subscribed to the Google Groups "Python Programming for Autodesk Maya" group.
To unsubscribe from this group and stop receiving emails from it, send an email to python_inside_m...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/python_inside_maya/774e865f-88d1-4b16-8690-0c7bd8ce380en%40googlegroups.com.
Whew! But also, holy crap. Maya files could easily turn into attack vectors.
This bit of code was repeated in the file about 940+ times.
To view this discussion on the web visit https://groups.google.com/d/msgid/python_inside_maya/f2542116-c986-4465-9fcf-831a67d1f3d3n%40googlegroups.com.
the security tool is out of date and didn’t work.
I just ran this and it culled the nodes:
import maya.cmds as cmds
unknownNodes=cmds.ls(type = "unknown")
unknownNodes+=cmds.ls(type = "unknownDag")
unknownNodes+=cmds.ls(type = "script")
for item in unknownNodes:
if cmds.objExists(item):
print item
cmds.lockNode(item, lock=False)
cmds.delete(item)