Printer Hacking – A Very Real Enterprise Data Security Breach
In today’s immersive world of technology, organizations have access to an array of tools used to assist them in every-day operations and decision making.
As we innovate and pioneer technology, we also create a new set of issues.
Data breaches, data theft, phishing, ransomware, and malware are all good examples.
Many of these vulnerabilities can come from every-day usage of peripherals like printers, and it is something enterprises must consider to protect the confidentiality of their documents.
Early in 2017, a white-hat hacker breached over 150,000 office and receipt printers to raise everyone’s awareness on ensuring organizations have secure printing on all their printers.
Widely recognized printers such as HP, Brother, Epson and Canon were prone to attacks.
The hacker Stackoverflowin, states that the script he wrote “targets printing devices that have IPP (Internet Printing Protocol) ports, LPD (Line Printer Daemon) ports, and port 9100 left open to external connections.”
Printers set-up in an organization by default have no security.
A network administrator must reconfigure the network to keep it secure.
The usage of multi-purpose printers or MFPs are prominent in small to large organizations because of how easy it makes day-to-day operations.
Features like faxing, scanning, photocopying and emailing have proven fruitful in cutting down time and costs.
However, the problem with that is that it opens a multitude of security vulnerabilities.
Printer Hacking Security Breaches
How do attacks happen?
There are several ways hackers can perform malicious activities.
A common attack is when MFPs have an authentication mechanism that gives access to an employee via RFID, swipe-card, fingerprint, or manual entry of credentials (username and password).
Hackers can bypass the MFPs network access granting them the ability to print jobs and steal sensitive information.
Another popular attack is a denial of service or DOS for short.
It is when a printer is flooded with traffic from a botnet or an application that would render the printer useless, sometimes going as far as destroying it.
Obtaining free or cheap software for conducting a DOS attack is not hard.
Searching for results on Google or the “dark-web” (a digital black marketplace) is enough.
The emergence of BYOD and printing has made organizations even more vulnerable to print attacks.
Many personal devices are connected to a printer, or an array of printers.
A hacker can inject your personal device with malware that can gain direct access to the corporate network, and thus its printers.
Interested in learning more about how to secure your print infrastructure? Check out this free whitepaper on how to achieve a secure print infrastructure!
Printer Hacking Security Measures
There are many security measures that your organization can use to avoid attacks on printers.
Allow communications only with secured or trusted networks and hosts.
The network administrator can easily configure which websites employees have access too. Get rid of unused protocols such as FTP, telnet and SNMP.
Turning off unused protocols limits the way malware, viruses and worms can get inside the organizational network.
Use a corporate-only network address for keeping the printer hidden from the internet.
Although hiding organizational printers will certainly keep the spotlight away, it does not necessarily mean your printers are secured.
If a curious hacker manages to penetrate the network, he or she will be able to see the printer.
If there is no security measure on the printers, then it will be easy for a hacker to intercept documents, steal sensitive information or sabotage its operations.
As the digital world grows to solve every-day tasks in the lives of millions, so does the need of cyber-security.
It is progressively becoming easier to breach devices and steal sensitive information. In today’s global space, organizations have an obligation to deploy printer related security measures.
6 Replies to “Printer Hacking – A Very Real Enterprise Data Security Breach”
Leave a Reply
Try UniPrint Infinity
Whether you are using virtualization solutions or physical desktops, UniPrint Infinity is the print management solution of choice for your organization.
Recent Posts
- UniPrint Infinity: Are you ready for Citrix Synergy ’19?
- Building a Print Security Strategy: 7 Factors to Consider
- HIMSS 2019 – Digital Transformation Through Digital Input and Output
- 6 Trends that will Redefine the Print Industry in 2019
- 3 Best Implementation Practices to Prepare for a VDI Environment
- Enterprise Mobility and Printing: The Workforce of the Future
- Printing in a Digital World
- Mobility and Workforce Productivity: A Trend You Simply Can’t Afford to Overlook!
- Enterprise Device Management: 3 Best Practices for ensuring a Secured, Simplified Environment
- Virtualization: 2 Big Reasons Why You Need to Consider Virtualized Printing
- See All
i have a question….i have a hp printer on my home network…and there is an external hp printer nearby in another home, and it is showing up on my choices to connect to the internet. could that printer be used to copy data from the computers i have hooked up to my network when i am online? if so, how do i stop this from happening? thank you
Hi george! You should be fine once you don’t connect to that printer. Connect only to your local internet network or printer for maximum security.
Thanks for the excellent article
I have never thought that data can be theft by just printer hacking, Let’s suppose someone hacks my printer, what he can do, the hacker just take print of out from my printer or can theft my data.
I think your printer is secure unless you have remote access with another network, If your printer is VPN, I don’t think it can be hacked.
Your data is safe if it gets hacked, USE VPN too keep it safe and secure…