- cross-posted to:
- cybersecurity@sh.itjust.works
- cross-posted to:
- cybersecurity@sh.itjust.works
The attack begins with a phishing email sent to the target
Okay bro im not reading past this its 2024
Just click this link bro. Just one more link man. Just click it I need it.
Your links do nothing! I’m invincible!
Best i can do is chineese bootleg subway surfers riddled with malware and ads.
Gets drenched in liquid nitrogen
Wow, that second one… 🤣
Correct me if I’m wrong, but this doesn’t look like this has anything to do with Syncthing vulnerabilities. Instead it looks like a hack that uses a preconfigured Syncthing installation to transfer sensitive data. Disturbing nonetheless.
It’s a Phishing scam using a tool. It’s no more exploiting SyncThing than TCP/IP.
Bet they also utilize electricity these bastards! What’s next? Physics? Oh the humanity!
Its physics all the way down
Just like using a remote desktop tool in a scam I suppose
Looks like a specially modified SyncThing was just used for exfil.
The article uses the word modified, but it sounds like it’s just talking about configuring it and using it as normal.
Indeed.
Please dont link with a Google Amp link.
Sorry about that, on my mobile firefox it looked fine. Fucking google.
OP, edit this in.
Done.
Please
Fixed!
It’s a convenient file transfer/sync tool. Copying data has to happen somehow, I’m not surprised someone thought to use syncthing for that purpose >.<, since it can do that. But its not really different than any other tool here.
They can’t even type Syncthing right.
This is upsetting