- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
Please dont link with a Google Amp link.
Sorry about that, on my mobile firefox it looked fine. Fucking google.
OP, edit this in.
Please
Fixed!
Thanks!
Done.
It’s a convenient file transfer/sync tool. Copying data has to happen somehow, I’m not surprised someone thought to use syncthing for that purpose >.<, since it can do that. But its not really different than any other tool here.
This is upsetting
The attack begins with a phishing email sent to the target
Okay bro im not reading past this its 2024
Just click this link bro. Just one more link man. Just click it I need it.
Your links do nothing! I’m invincible!
Gets drenched in liquid nitrogen
deleted by creator
Best i can do is chineese bootleg subway surfers riddled with malware and ads.
Wow, that second one… 🤣
They can’t even type Syncthing right.
Correct me if I’m wrong, but this doesn’t look like this has anything to do with Syncthing vulnerabilities. Instead it looks like a hack that uses a preconfigured Syncthing installation to transfer sensitive data. Disturbing nonetheless.
Indeed.
Looks like a specially modified SyncThing was just used for exfil.
The article uses the word modified, but it sounds like it’s just talking about configuring it and using it as normal.
It’s a Phishing scam using a tool. It’s no more exploiting SyncThing than TCP/IP.
Bet they also utilize electricity these bastards! What’s next? Physics? Oh the humanity!
Its physics all the way down
Just like using a remote desktop tool in a scam I suppose