Category : Applications , Bluetooth , Computer , Computer Forensics , Cyber , Cyber Attackers , Cyber Attacks , Cyber Crime , Cyber Criminal , Cyber Criminals , Cyber Security , Cyber threats , Data , Data Breach , Data Encryption , Devices , DoS , DoS Attack , Drone , Encryption , Firmware , Hack , Hackers , Hacking , IT Security , Malicious , Malware , MFP , Mobile Forensics , Mobile Phone , Network , Network Security , Remote Access , Security , Security Policies , Security Risks , Servers , Smartphone , Software , Unsecure Printer , Vulnerabilities , Wireless Network
Dear Blast Readers,
Did you know that 54% of employee’s say that they do not always follow the security policies put into place by their company’s Information Technology departments? * Did you know that about 51% of employees who have a printer, copier, or a multi functioning printer (MFP) at their work place say that they have copied, printed, and/or scanned confidential documents at work before? *
With cyber threats on the rise, it is not a shock that even printers are not safe from cyber attacks and data breaches. If a printer is connected to a wireless network and is unsecure, then it is open to hacking. Once compromised, other devices connected to the same network are left vulnerable.
How can a hacker gain access to a network using an unsecure printer?
One way a hacker can gain access to your unsecured printer is if the firmware is out-of-date. This allows the system to accept malicious lines of code. The hacker can then use the code to gain access to:
- Print Jobs.
- The user’s computer.
Another way a hacker can gain access to your unsecured printer is using a drone. Along with a drone the hacker would need a mobile phone and two applications. The two applications would do the following:
- The first application identifies all wireless printers
- The second application deploys malware into the printers.
So how does this type of drone attack occur?
Firstly, the hacker would fly a drone using a smart phone into position outside of an office building. Once into position, the hacker activates the two applications. Once the first application scans for open Wi-Fi printers, the second application establishes a fake access point (one that mimics the real device). Once established, the fake access point is then able to intercept documents that have been sent to the real device. With network access gained, the hacker can then in-bed malware into the company’s network.
When malware is installed within the network, hackers can gain access to your servers and documents by:
- Accessing sensitive and/or confidential information.
- Changing the printer’s settings or LCD readout.
- Launching DoS attacks (Denial-of-service attacks).
- Using the printer to receive and transmit faxes.
- To send unauthorized print jobs.
- Retrieving saved copies of documents.
- Eavesdropping on network printer traffic.
To take preventative measures against attacks on your printers Some typical prevention procedures include, but are not imited to:
- Educating Employees on the importance of security
- Defining what constitutes a secure password
- User identification (with PINs and other verification) for printer usage.
- Data encryption protocols (to prevent interception of data across the network).
If you any questions relating to Firmware, Network Security, Printer Security, Cyber Security or Computer Forensics contact FDS Global. You can reach us at our office at (954) 727-1957 or by email at RMoody@FDS.Global. Please feel free to visit our website at www.FDS.Global.
*(The statistics represented in this blast were identified from: Network, C. (2013, February 07). The Hidden IT Security Threat: Multifunction Printers. Retrieved April 25, 2017, from https://www.forbes.com/sites/ciocentral/2013/02/07/the-hidden-it-security-threat-multifunction-printers/#b615affb615a )*