this post was submitted on 07 Jun 2024
31 points (84.4% liked)

Cybersecurity

5731 readers
114 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 1 year ago
MODERATORS
all 20 comments
sorted by: hot top controversial new old
[–] [email protected] 41 points 5 months ago (1 children)

Got worried about a synching vuln, but no, they are just using it as a file transfer agent for their own malware.

[–] [email protected] 26 points 5 months ago (2 children)

Threat actor using software as intended.

[–] [email protected] 35 points 5 months ago (1 children)

Next article, "hackers abuse bash to list directory contents and write the output to a file."

[–] kid 6 points 5 months ago (1 children)

Honestly, I didn't think about vulnerability in SyncThing when I read the article. But I wondered why defense forces would have p2p open on their networks.

[–] [email protected] 4 points 5 months ago (1 children)

When you say P2P you think torrents. But syncthing have rendezvou helpers to facilitate connections without seeing any data.

[–] kid 6 points 5 months ago (1 children)

Not necessarily. Torrent is a way to find a peer for direct connection or via a relay (of course that is more than that). Syncthing, even using a relay server, requires some ports available for at least outbound connection (22000 TCP/UDP or whatever port the relay is using). This should not be possible in a medium security network, let alone a defense network. I don't know if syncthing works without a direct connection (to the peer or relay, something like transport via http proxy).

[–] [email protected] 5 points 5 months ago (1 children)

It does. It has hole punching incorporated into the protocol. So as long as it can get to the internet, it can use coordination servers and do double hole punching so that they can talk to each other

[–] kid 2 points 5 months ago (1 children)

Interesting. I didn't know that syncthing does hole punching.

From a defense perspective, how would this work with an enterprise firewall, with UDP/TCP only allowed to specific destinations or specific sources. Example: only the internal DNS relay server can access 53/UDP and only the internal proxy server can access 80/443. What I mean is in a network with a very closed firewall, how would Syncthing be able to connect with peers?

[–] [email protected] 4 points 5 months ago* (last edited 5 months ago) (1 children)

If the firewall was properly locking down servers to functions then it shouldn't work. But if it has general Web access sync thing is very resilient

This is the reason people use sync thing and recommend it, it's really hard to kill

[–] [email protected] 3 points 5 months ago* (last edited 5 months ago)

Bestbet would probably be block on an application level. I swapped to bitwarden since syncthing wasn't liked by the AV on my work pc and I was using it to sync my password db.

[–] [email protected] 18 points 5 months ago* (last edited 5 months ago) (1 children)

Use... Not abuse.

I just lost a bunch of respect for bleeping computer