Criminals now spoof scanners and printers to spread malware

malware

Cyber criminals are getting smarter and more resourceful. They are now spoofing hardware accessories to spread their malicious payloads. Recent reports have revealed that some hackers have begun sending malicious which trick the user into believing that the attachment is coming from the network printer.

Researchers at Barracuda reported attacks of this nature in November 2017, and the Comodo Threat Intelligence Lab detected them in September 2017. Researchers from Comodo detected and analyzed more than 110,000 instances of phishing emails within just the first three days of this September 2017 malware campaign.

The malware had the ability to gain unauthorized access to a user’s computer and conduct covert surveillance. Researchers found that the attackers attempt to infect the victim through email by impersonating HP, Canon, HP, and other brand printers/scanner device to earn trust.

“Receiving a PDF attachment in an email sent by a printer is so commonplace that many users assume the document is completely safe,” Barracuda researchers said. “From a social engineering perspective, this is exactly the response that the cyber-criminals want.”

Attackers seem to focus on PDF-oriented malware, as most users think PDFs sent to their printer or scanner are harmless and coming from a safe source.

The email subject reads something along the lines of “scanned from HP” or any printer within the network, and the attachment contains the malicious code. It will have a modified file name, which allows the attackers to hide the deceptive code inside the archive, imitating a ‘.pdf,’ ‘.jpg’, ‘.txt’ or any other format.

The malware in the attached email is intended to gain access to the victim’s system. It has the ability to monitor activity, change the settings of the system, copy files, and use bandwidth of the victims’ device.

To prevent these types of attacks, researchers recommend that users double check with the sender if they receive unexpected files or delete them, hover the mouse over hyperlinks to ensure they look legitimate, and not click anything suspicious.

Researchers have warned users to counter check before they download anything even it comes from a reliable source. Employees should be trained to identify such malicious files beforehand and should be taught about threat protection.

Kevin Jones197 Posts

Kevin Jones, Ph.D., is a research associate and a Cyber Security Author with experience in Penetration Testing, Vulnerability Assessments, Monitoring solutions, Surveillance and Offensive technologies etc. Currently, he is a freelance writer on latest security news and other happenings. He has authored numerous articles and exploits which can be found on popular sites like hackercombat.com and others. He holds prestigious certifications like OSWP, OSCP, ITIL. His goals in life are simple - to finish her maiden business venture on Cybersecurity, and then to keep writing books for as long as possibly can and never miss a flight that makes the news.

0 Comments

Leave a Comment

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register