• dariusj18English
    arrow-up
    41
    arrow-down
    0
    ·
    4 months ago
    link
    fedilink

    Got worried about a synching vuln, but no, they are just using it as a file transfer agent for their own malware.

    • slazer2auEnglish
      arrow-up
      26
      arrow-down
      0
      ·
      4 months ago
      link
      fedilink

      Threat actor using software as intended.

      • dariusj18English
        arrow-up
        35
        arrow-down
        0
        ·
        4 months ago
        link
        fedilink

        Next article, “hackers abuse bash to list directory contents and write the output to a file.

        • KidOPMEnglish
          arrow-up
          6
          arrow-down
          0
          ·
          4 months ago
          link
          fedilink

          Honestly, I didn’t think about vulnerability in SyncThing when I read the article. But I wondered why defense forces would have p2p open on their networks.

          • slazer2auEnglish
            arrow-up
            4
            arrow-down
            0
            ·
            4 months ago
            link
            fedilink

            When you say P2P you think torrents. But syncthing have rendezvou helpers to facilitate connections without seeing any data.

            • KidOPMEnglish
              arrow-up
              6
              arrow-down
              0
              ·
              4 months ago
              link
              fedilink

              Not necessarily. Torrent is a way to find a peer for direct connection or via a relay (of course that is more than that). Syncthing, even using a relay server, requires some ports available for at least outbound connection (22000 TCP/UDP or whatever port the relay is using). This should not be possible in a medium security network, let alone a defense network. I don’t know if syncthing works without a direct connection (to the peer or relay, something like transport via http proxy).

              • jetEnglish
                arrow-up
                5
                arrow-down
                0
                ·
                4 months ago
                link
                fedilink

                It does. It has hole punching incorporated into the protocol. So as long as it can get to the internet, it can use coordination servers and do double hole punching so that they can talk to each other

                • KidOPMEnglish
                  arrow-up
                  2
                  arrow-down
                  0
                  ·
                  4 months ago
                  link
                  fedilink

                  Interesting. I didn’t know that syncthing does hole punching.

                  From a defense perspective, how would this work with an enterprise firewall, with UDP/TCP only allowed to specific destinations or specific sources. Example: only the internal DNS relay server can access 53/UDP and only the internal proxy server can access 80/443. What I mean is in a network with a very closed firewall, how would Syncthing be able to connect with peers?

  • jetEnglish
    arrow-up
    18
    arrow-down
    0
    ·
    4 months ago
    edit-2
    4 months ago
    link
    fedilink

    Use Not abuse.

    I just lost a bunch of respect for bleeping computer

    • MentalGymnasticsEnglish
      arrow-up
      1
      arrow-down
      20
      ·
      4 months ago
      link
      fedilink

      Oh no you lost respect because someone use the wrong word. My day is ruined that you lose respect. How will the world continue because jet@hackertalks.com haves lost respect. Also they abused it because in the Eula you agree not to use their software in this manner. So they improperly used this software to exfiltrate data. I haven’t seen you write your own articles either. Sorry let me not abuse you too much.

      • KidOPMEnglish
        arrow-up
        11
        arrow-down
        0
        ·
        4 months ago
        link
        fedilink

        Instance Rules

        Be respectful. Everyone should feel welcome here.

        • MentalGymnasticsEnglish
          arrow-up
          1
          arrow-down
          8
          ·
          4 months ago
          link
          fedilink

          The license clearly does not apply. Nice try though. I mean it does take some mental work to think synchthing permits this type of abuse. Wait is that too disrespectful?

          • jetEnglish
            arrow-up
            7
            arrow-down
            0
            ·
            4 months ago
            link
            fedilink

            If the license the code is published with doesn’t apply, what license would apply?