Proven team of researchers at Columbia University that hackers can use printers connected to the Internet to penetrate computers.
The researchers selected laser printers LaserJet company HP, after they connect to the Internet, and they are already through the property Remote Firmware Update to penetrate the computers connected to printers, a property that you check to ask any update of the printer with the beginning of any print job, it can be to hackers fraud on the user to install the firmware of a malignant determination is dedicated to this purpose, which guarantees them complete control in the printer.
The research team also pointed out that all the printers tested which lacked a property check digital signatures, which means it does not verify the source of the firmware update firmware, which increases the ease of penetration on the task of hackers. Researchers also pointed out that over the danger that this method of penetration is very difficult to detect because the security software does not analyze the performance printers, giving the hacker absolute freedom to tamper with the device and the quality of any theft of data wanted.
The researchers selected laser printers LaserJet company HP, after they connect to the Internet, and they are already through the property Remote Firmware Update to penetrate the computers connected to printers, a property that you check to ask any update of the printer with the beginning of any print job, it can be to hackers fraud on the user to install the firmware of a malignant determination is dedicated to this purpose, which guarantees them complete control in the printer.
The research team also pointed out that all the printers tested which lacked a property check digital signatures, which means it does not verify the source of the firmware update firmware, which increases the ease of penetration on the task of hackers. Researchers also pointed out that over the danger that this method of penetration is very difficult to detect because the security software does not analyze the performance printers, giving the hacker absolute freedom to tamper with the device and the quality of any theft of data wanted.
ليست هناك تعليقات:
إرسال تعليق