Story image

Why your printer could be the doormat to your network

14 Mar 2017

For years, networked printers have left gaping holes in business defences.

Flaws within printers can permit print docs to be captured, allow buffer overflow exploits, disclose passwords or cause printer damage.

We recently reported the news of a kid hacker breaking his way with ease into more than 160,000 printers worldwide.

Chief of security strategy at SentinelOne, Jeremiah Grossman says printers can expose users to many different kinds of attacks.

According to Grossman, these include:

  • Hackers can use vulnerabilities to capture old printing logs and steal sensitive information. They may also exploit these flaws to break into a networked device and move laterally through a business to gain more information.
  • Attackers can gain control of networked printers to use one company’s bandwidth to attack other businesses and individuals around the globe via DDoS

Obviously, one of the main drivers of the issue is a lack of awareness.

"Most of the time, printers are not going to be terribly different from any IoT device," Grossman says.

"Normally, the purchasers of network-connected printers aren't concerned. "'Why should I be concerned about a printer?' they ask. "But it's not just a printer; it's a computer inside a printer and should be treated as such."

Another issue is ownership, as printers are shared devices in an office it can often be unclear just what department they belong to, leading to ambiguity over who should be maintaining the security.

One of the longstanding issues, according to Grossman, is vendors not supporting patches on older devices. Businesses have the information they need to protect themselves, but they won’t be secure due to lack of incentive in the system.

What is concerning, is that printers will become more popular targets over time. Grossman asserts that currently the most popular (and easiest) methods of entry for hackers include web hacking and email attacks, but gradually this will change to IoT as we become more connected and computers and operating systems more secure.

Here are some simple methods to better secure your printer and network:

  • Regularly check manufacturer websites to see if patches are available
  • Isolate printers on local networks separate from PCs
  • Periodically update passwords
  • Use intrusion detection

It’s also vital to buy your printer hardware from a trusted manufacturer, like Fuji Xerox, and to ensure your equipment remains modern.

At the end of the day, printers are low-hanging fruit for hackers, and it’s up to businesses to ensure they remain out of reach.

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.