You Overtrust Your Printer

11/20/2021
by   Giampaolo Bella, et al.
0

Printers are common devices whose networked use is vastly unsecured, perhaps due to an enrooted assumption that their services are somewhat negligible and, as such, unworthy of protection. This article develops structured arguments and conducts technical experiments in support of a qualitative risk assessment exercise that ultimately undermines that assumption. Three attacks that can be interpreted as post-exploitation activity are found and discussed, forming what we term the Printjack family of attacks to printers. Some printers may suffer vulnerabilities that would transform them into exploitable zombies. Moreover, a large number of printers, at least on an EU basis, are found to honour unauthenticated printing requests, thus raising the risk level of an attack that sees the crooks exhaust the printing facilities of an institution. There is also a remarkable risk of data breach following an attack consisting in the malicious interception of data while in transit towards printers. Therefore, the newborn IoT era demands printers to be as secure as other devices such as laptops should be, also to facilitate compliance with the General Data Protection Regulation (EU Regulation 2016/679) and reduce the odds of its administrative fines.

READ FULL TEXT

page 9

page 10

research
05/31/2021

GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security

Internet-of-Things (IoT) and cyber-physical systems (CPSs) may consist o...
research
04/24/2023

Changes in Conducting Data Protection Risk Assessment and After GDPR implementation

Based on Article 35 of the EU (European Union) General Data Protection R...
research
10/02/2019

Eradicating Attacks on the Internal Network with Internal Network Policy

In this paper we present three attacks on private internal networks behi...
research
10/27/2021

Teardown and feasibility study of IronKey – the most secure USB Flash drive

There are many solutions for protecting user data on USB Flash drives. H...
research
02/27/2022

Attacks on Deidentification's Defenses

Quasi-identifier-based deidentification techniques (QI-deidentification)...
research
11/20/2021

VoIP Can Still Be Exploited – Badly

VoIP phones are early representatives as well as present enhancers of th...
research
10/16/2021

Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services

Mobile crowdsourcing services (MCS), enable fast and economical data acq...

Please sign up or login with your details

Forgot password? Click here to reset