Ḹḗṃɯӳ
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 year ago

Ukraine says hackers abuse SyncThing tool to steal data

www.bleepingcomputer.com

external-link
message-square
16
link
fedilink
  • cross-posted to:
  • technology@lemmy.world
31
external-link

Ukraine says hackers abuse SyncThing tool to steal data

www.bleepingcomputer.com

Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 year ago
message-square
16
link
fedilink
  • cross-posted to:
  • technology@lemmy.world
The Computer Emergency Response Team of Ukraine (CERT-UA) reports about a new campaign dubbed "SickSync," launched by the UAC-0020 (Vermin) hacking group in attacks on the Ukrainian defense forces.
  • jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    edit-2
    1 year ago

    https://github.com/syncthing/syncthing/blob/main/LICENSE

    The license does not restrict use of a file transfer protocol for file transfer. In fact it’s the Mozilla public license. It’s very permissive

    Got to admit, your comment matches your username, kudos

    • MentalGymnastics@sh.itjust.worksBanned
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      8
      ·
      1 year ago

      The license clearly does not apply. Nice try though. I mean it does take some mental work to think synchthing permits this type of abuse. Wait is that too disrespectful?

      • jet@hackertalks.com
        link
        fedilink
        English
        arrow-up
        7
        ·
        1 year ago

        If the license the code is published with doesn’t apply, what license would apply?

Cybersecurity@sh.itjust.works

cybersecurity@sh.itjust.works

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !cybersecurity@sh.itjust.works

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

  • Be respectful. Everyone should feel welcome here.
  • No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
  • No Ads / Spamming.
  • No pornography.

Community Rules

  • Idk, keep it semi-professional?
  • Nothing illegal. We’re all ethical here.
  • Rules will be added/redefined as necessary.

If you ask someone to hack your “friends” socials you’re just going to get banned so don’t do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 133 users / day
  • 264 users / week
  • 1.3K users / month
  • 4.73K users / 6 months
  • 1 local subscriber
  • 7.71K subscribers
  • 3.11K Posts
  • 5.27K Comments
  • Modlog
  • mods:
  • Kid@sh.itjust.works
  • Lanky_Pomegranate530@midwest.social
  • BE: 0.19.12
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org