- cross-posted to:
- cybersecurity@sh.itjust.works
- cross-posted to:
- cybersecurity@sh.itjust.works
Correct me if I’m wrong, but this doesn’t look like this has anything to do with Syncthing vulnerabilities. Instead it looks like a hack that uses a preconfigured Syncthing installation to transfer sensitive data. Disturbing nonetheless.
It’s a Phishing scam using a tool. It’s no more exploiting SyncThing than TCP/IP.
Bet they also utilize electricity these bastards! What’s next? Physics? Oh the humanity!
Its physics all the way down
Just like using a remote desktop tool in a scam I suppose
Looks like a specially modified SyncThing was just used for exfil.
The article uses the word modified, but it sounds like it’s just talking about configuring it and using it as normal.
Indeed.
Please dont link with a Google Amp link.
OP, edit this in.
Please
Fixed!
Thanks!
Done.
Sorry about that, on my mobile firefox it looked fine. Fucking google.
They can’t even type Syncthing right.
It’s a convenient file transfer/sync tool. Copying data has to happen somehow, I’m not surprised someone thought to use syncthing for that purpose >.<, since it can do that. But its not really different than any other tool here.
This is upsetting