{"id":6774,"date":"2019-10-29T10:58:34","date_gmt":"2019-10-29T15:58:34","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=6774"},"modified":"2019-10-29T13:38:48","modified_gmt":"2019-10-29T18:38:48","slug":"how-to-keep-malware-out-of-your-printers","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/how-to-keep-malware-out-of-your-printers\/","title":{"rendered":"How to Keep Malware Out of Your Printers"},"content":{"rendered":"<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/10\/printer_malware.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-6779 alignleft\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/10\/printer_malware.png\" alt=\"\" width=\"300\" height=\"317\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/10\/printer_malware.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/10\/printer_malware-284x300.png 284w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/a>The landscape of cybersecurity is always changing, and new threats are constantly emerging.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">One of the newest \u2013 and the most interesting, if you are into that kind of thing \u2013 is the rise of printer malware. This type of malware started to be reported in November 2017, when Barracuda Labs saw an attack where cybercriminals spoofed a printer to send a malicious attachment that appeared to be a legitimate file sent by a network printer.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Since then, this type of attack has become more common. Comodo <a href=\"https:\/\/www.comodo.com\/lab\/\" rel=\"nofollow\" target=\"_blank\">Threat Research Lab<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> wrote a recent <a href=\"https:\/\/blog.comodo.com\/comodo-news\/threat-lab-exclusive-if-your-konica-minolta-copier-scanner-calls-dont-answer\/\" rel=\"nofollow\" target=\"_blank\">blog post<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> that outlined the ways that this type of attack works, and predicts that they will become more common in the coming years.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">In this article, we\u2019ll look at how this kind of attack works, and how to protect yourself against it.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\"><strong><strong>How Printer Malware Works<\/strong><\/strong><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The reason why printer malware is becoming more common is linked to the changing way that printers are used. Specifically, most printers are now connected via cloud services, whether on your home network or at offices.\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The rise of cloud services has many advantages in terms of connectivity, but as Will Ellis, CISO at community research group <a href=\"https:\/\/privacyaustralia.net\/\" rel=\"nofollow\" target=\"_blank\">Privacy Australia<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> points out, \u201cAs more of our personal information goes into the \u2018cloud,\u2019 we become more interconnected but also much more vulnerable.\u201d The problem gets worse as you connect more devices to your printer, as we mentioned recently in our guide on <a href=\"https:\/\/www.poweradmin.com\/blog\/how-to-print-and-scan-documents-with-android\/\">how to print and scan documents with Android<\/a>.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Because many companies still don\u2019t know <a href=\"https:\/\/www.poweradmin.com\/blog\/how-to-monitor-hybrid-and-multi-cloud-networks\/\">how to monitor multi-cloud environments<\/a>, printers are often a \u2018soft spot\u2019 that hackers can use to inject malware into a system. Modern printers are also able to communicate with users via email (and sometimes other forms of messaging), and this is where the power of this type of attack becomes apparent.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">With the attacks detected in September by Comodo, for instance, cybercriminals spoofed the model number that belonged to the Konica Minolta C224e, one of the most widely-used printers in office environments. They sent a malicious email attachment (one of the <a href=\"https:\/\/learn.g2crowd.com\/4-common-cyber-attacks\" rel=\"nofollow\" target=\"_blank\">most common types of a cyberattack<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>) to victims from the printer and therefore bypassed the anti-malware software that had been deployed on the wiser system.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\"><strong><strong>How to Spot Printer Malware<\/strong><\/strong><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">In some respects, the signs that your printer has been infected with malware are similar to the general signs of a malware infection. As a recent <a href=\"https:\/\/clutch.co\/it-services\/resources\/5-signs-of-malware-infection-and-how-to-get-rid-of-it\" rel=\"nofollow\" target=\"_blank\">report from Clutch.co reveals<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, the signs include unusual behavior by your printer, such as not responding to your commands and refusing to install security updates.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">There are some more conspicuous signs of an infected printer, though. As we\u2019ve discussed, this type of malware will generally attempt to use your printer as a way of infecting your other devices, and it will generally do this by sending you messages which incorporate malicious code. Receiving a message like this from your printer is a pretty clear sign that it\u2019s been <\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">compromised.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">A recent article published on Comodo outlines <a href=\"https:\/\/blog.comodo.com\/cybersecurity\/protect-printer-scanner-malware\/\" rel=\"nofollow\" target=\"_blank\">how to spot an email like this<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>: attackers tend to focus on PDF-oriented malware, as most users think PDFs sent to their printer or scanner are harmless and coming from a safe source. The email you receive will likely have a subject line that mimics those used by your printer: \u201cscanned from HP\u201d or similar. Importantly, however, the filename will not be a .pdf, but something different, and likely a .exe.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">That\u2019s what you need to look out for, but how can you avoid your printer becoming infected in the first place?<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\"><strong><strong>How to Protect Yourself<\/strong><\/strong><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Protecting yourself against printer malware is similar to the processes you should have in place to protect all of your hardware, including (and especially) <a href=\"https:\/\/surfshark.com\/blog\/is-your-webcam-hacked\" rel=\"nofollow\" target=\"_blank\">your webcam<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, which can also be hacked.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">First and foremost, you should think carefully about how connected your printer is to your wider network. Today, many printer manufacturers sell printers with the ability to use WiFi to connect to your home network. This is extremely useful if you are working on a laptop and need to print frequently, but in reality that covers a relatively small number of users.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">If your printer is connected to your WiFi network all the time, it becomes much easier to attack it. It\u2019s far safer to use the \u2018traditional\u2019 way of connecting \u2013 via a cable \u2013 even if this means you \u2018waste\u2019 an extra minute a day.\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Going further, you should also protect your printer by changing it\u2019s security settings. Ideally, you should have done this the day you got it, but perhaps you forgot. Regardless, changing the default username and password for the printers admin functions can be an effective way to protect yourself, because (believe it or not) databases of these default values are available for free online.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Third, practice good <a href=\"https:\/\/itsecurity.uiowa.edu\/resources\/faculty-staff\/best-practices-email-attachments\" rel=\"nofollow\" target=\"_blank\">email attachment security<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>. Always check every email attachment you get carefully, especially if it is from a new source. And if you are in any doubt, don\u2019t open it. For most printers, you can also contact the printer manufacturer to ask if the behavior you are seeing is a normal part of the way the device functions.\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Finally, you should recognize that the sheer scale of cybercrime means that it is almost inevitable that you are going to fall victim to an attack one day, either from your printer or another source. For that reason, make sure you take regular backups of all your key data and use freely-available security tools like VPNs and encryption.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\"><strong><strong>The Bottom Line<\/strong><\/strong><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Lastly, don\u2019t be alarmed. It can be somewhat disturbing to realize that your printer, which normally sits on your desk quietly, can be turned against you. But by making sure it is properly secured, you can avoid infection, and protect yourself.\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The key, as with everything to do with cybersecurity, is to keep yourself informed of new threats as they arise, and deploy countermeasures. So just by reading this article, you\u2019ve taken the first step to avoid and stop printer malware.<\/span><\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The landscape of cybersecurity is always changing, and new threats are constantly emerging. \u00a0 One of the newest \u2013 and the most interesting, if you are into that kind of thing \u2013 is the rise of printer malware. This type of malware started to be reported in November 2017, when Barracuda Labs saw an attack [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":6779,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5,42],"tags":[],"class_list":["post-6774","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-how-to","category-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=6774"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6774\/revisions"}],"predecessor-version":[{"id":6783,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6774\/revisions\/6783"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/6779"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=6774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=6774"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=6774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}