Would someone be able to help me out. Cyanlabs is not recognizing my USB drives and I cannot create a reformat/update USB drive. I have all the necessary downloaded files for the update, but I don’t know what else needs to be on the drive for it to do the reformat. I hope someone could help me out with this quickly. Thanks
Log from a couple weeks ago below:
CYANLABS - SYN3 UPDATER - V22.214.171.124
Operating System: Microsoft Windows 10 Pro (2009)
I don’t have that option. When I select the drop down menu, it’s blank.
I have a hacker in my system and they may have fiddled with the program so I can’t make another USB Update. People laugh and make jokes about this, but they track me through the Nav and they get in through WiFi. This is my battle right now. Would you be able to tell me which files I need to add to the drive that I don’t have, please. I will then create an image of it so I have a copy.
No, bill32399, this is real. I’ve been dealing with this since January of last year. I just got this Escape a day or two before this passed Christmas, and I know how ‘they’ will operate. A car, now-a-days is just a computer on wheels, and if you’re a target, like I am, they will copy your key fob, relay attack you, get into your vehicle, turn on the WiFi and dump their hack into the computer. Then, they can track you through the Navigation. The only way to clean the computer is to reformat the APIM and drive to a remote location where you can see 360 degrees around you so you can get into Sync3, Master Reset it, then turn WiFi toggle off. I am not here to convince you that this is happening, I’m merely stating that WiFi is a vulnerability on ANY device. This is what I have discovered throughout the passed year plus. I’ve already told Ford, and I hope they do something about it. I’ve asked them to disable WiFi instead of having it automatically toggle on, like every other device with it. All my phones, just any device I have that has an electrical pulse with WiFi, is hacked. Which means, they see what I’m doing right now.
Make any joke you want, I don’t care. I’m not looking for your validation on this. I’m here for help, and Mr. SaNdMaN has been helping me without any criticism. I thank him for that. I just copied all the update files I had to my USB drive and created the reformat/autoinstall.lst files with the text inside them. I have to figure out how to do the downgrade and reformat tool now. If you can provide any easier instruction than what I’m about to look into on the suggested pages, I’d appreciate it. I don’t want to screw this up. Take away from this, WiFi is vulnerable and everyone needs to know about it.
If you created the USB as instructed (the LST files on the root and a folder called SyncMyRide with all the gz files inside it) you are good to go. That’s a downgrade USB: it will install Sync3 3.3 and then install the reformat tool.
Once the reformat phase is started, all packages listed in the reformat.lst file will be flashed onto the unit .
If you want confirmation, post the following and I will double check.
screenshot of the USB 's root
screenshot of the SyncMyRide folder’s contents
screenshot of the autoinstall.lst file’s content
screenshot of the reformat.lst file’s content
But since you had the files and the LST files are basically produced by copy&paste, I think it will be fine. You must ensure all LST files point to the correct files, and that those files are located under the SyncMyRide folder.
That looks good, if there’s an issue, I’m overlooking it.
I think it does not matter, but make autoinstall.lst and reformat.lst names lowercase.
I’m not sure what you mean by this, the process won’t generate any files. Once the unit is in the reformat phase it will read the reformat.lst file and look for those files inside the SyncMyRide folder. The syntax is a bit different than from autoinstall.lst as you can see.
So as long every file is correctly referenced and placed, it will be ok.
Once you connect that USB to the car, autoinstall.lst will be read first thus downgrading the unit to 3.3.19052 ( 4U5T-14G381-AN). Once it’s on 3.3, it will install the reformat tool. Once the unit boots in reformat phase, reformat.lst file will be read and flash all those files.
If any file is missing at this point, you will be presented with a red screen showing the error. The unit won’t be operative until the reformat is complete.
Follow the instructions and you should be fine.
Oh, one more thing: make sure to use a quality branded USB pendrive, not a cheap / generic one…
Thank you. I did see that the ‘reformat.lst’ files are the same files in the ‘SyncMyRide’ folder after posting my reply. Sorry about that.
I truely appreciate your help here today, Mr. SaNdMaN. I do not have enough time before the vehicle leaves for the night, but I will be formatting the APIM tomorrow. I doubt I will have any problems, but if I do I hope you don’t mind me asking you for help once again.
Be careful with WiFi on your devices. Turn it off if you’re not using it to be safe. You will never know your devices are hacked unless you ask me for help with that. I will return the favor if needed.
Sure thing, if something happens just let us know and we will troubleshoot it.
If you hit a red screen in the reformat phase do not panic, it’s recoverable. Just make sure to take a picture at the screen so we have an idea of what’s going on.
What on earth have I just read, they track you through your nav and get in through your WiFi, well, basic security would be change your WiFi password use wpa2/3, run adwcleaner or similar and remove all potential threats, SYNC 3 runs on QNX i am 99% confident they did not hack your SYNC via WiFi.
There are so many things wrong with this sentence, Yes key cloning and signal relay attacks are a thing, turning on the WiFi with a key by entering the vehicle is ofcourse possible, however, you are very unlikely to be able to infect your computer just by connecting WiFi in your car. Ofcourse things can spread but SYNC does not have the abilities for this so unless you are a supreme leader or something no one is going to go through that effort.
Track you via the Navigation… on the car? Yeah not going to happen, sounds more like someone got access to your FordPass Credentials (API Credentials or directly your email password), if this is the case reset your FordPass and also reset your SYNC to deauthorize any allowed devices.
I’m sorry but this is absolute paranoia unless again you are some majorly high official/public figure such as a president, head of FBI etc… in which case you would have people to deal with this for you.
Thank you for making it possible to easily upgrade the APIM Sync3 software with reformatting abilities. Your software/update/reformat truely does clean the Ford APIM of the hack that I am dealing with. Any time I mention what I am dealing with, to try and get help, I am met with criticism and doubt. Anyone I talk to thinks I’m ‘paranoid’ or that it’s just not happening, which makes it 1,000,000 times more difficult for me to find someone who will help me. Mr. SaNdMaN has helped me, and I can’t thank him enough for it. I will be going out to do the reformat of the APIM soon. What I can’t do, is talk to you about your comments. I will tell you that this has nothing to do with a WiFi password or my computer getting hacked through Sync3 or vice-versa. I see how you came to that conclusion and I’d like to make it clear that that is not how it works. The hack being used only needs WiFi to be on and up in the air on any device. Once the hack get’s dropped inside the computer, in whichever system is the target, it’s done. It takes seconds and you’re hacked. After the hack is inside your targeted system, WiFi could be off and everything in the settings could be tightly secured, but you’re 100% vulnerable. Yes, they do track me through the Navigation in Sync3, and I will argue this and never change my mind about it. The car before this Escape was a 2010 Chevy Cobalt without Navigation, and they used physical GPS trackers on it. I will not go into any more detail about this subject since this is still on-going. Maybe, you will read about my story in the news in the comming months. It will blow your mind.
But you have free speech, make any more jokes or criticisms that you wish…I will ignore and keep doing what I’m doing. Again, thank you for your software. Without it, it would make cleaning the APIM harder.
You can not use the same “hack” on all devices, WiFi is a family of protocols, that doesn’t mean you can infect ANY os QNX, Windows, Mac OS, Linux with the same hack. it’s really not as simple as you make it sound. it’s complete BS unless i see evidence to suggest otherwise i’m going to stick to that conclusion
EDIT: to clarify, things like de-auth attacks etc are platform agnostic but that doesn’t do anything other than essentially DDOS the WiFi to deauth you, also if the WiFi or Physical Network connection is not connected and they are not using any 3g/4g/5g modem etc then they have no way to continue control of the device, how would that even be possible?