- cross-posted to:
- cybersecurity@sh.itjust.works
- cross-posted to:
- cybersecurity@sh.itjust.works
Correct me if I’m wrong, but this doesn’t look like this has anything to do with Syncthing vulnerabilities. Instead it looks like a hack that uses a preconfigured Syncthing installation to transfer sensitive data. Disturbing nonetheless.
It’s a Phishing scam using a tool. It’s no more exploiting SyncThing than TCP/IP.
Bet they also utilize electricity these bastards! What’s next? Physics? Oh the humanity!
Its physics all the way down
Just like using a remote desktop tool in a scam I suppose
Looks like a specially modified SyncThing was just used for exfil.
The article uses the word modified, but it sounds like it’s just talking about configuring it and using it as normal.
Indeed.
The attack begins with a phishing email sent to the target
Okay bro im not reading past this its 2024
Just click this link bro. Just one more link man. Just click it I need it.
Your links do nothing! I’m invincible!
Best i can do is chineese bootleg subway surfers riddled with malware and ads.
Gets drenched in liquid nitrogen
deleted by creator
deleted by creator
Please dont link with a Google Amp link.
OP, edit this in.
Please
Fixed!
Thanks!
Done.
Sorry about that, on my mobile firefox it looked fine. Fucking google.
They can’t even type Syncthing right.
It’s a convenient file transfer/sync tool. Copying data has to happen somehow, I’m not surprised someone thought to use syncthing for that purpose >.<, since it can do that. But its not really different than any other tool here.
This is upsetting