A Hacker Just Pwned Over 150,000 Printers Exposed Online (bleepingcomputer.com) 75
Last year an attacker forced thousands of unsecured printers to spew racist and anti-semitic messages. But this year's attack is even bigger. An anonymous reader writes: A grey-hat hacker going by the name of Stackoverflowin has pwned over 150,000 printers that have been left accessible online. For the past 24 hours, Stackoverflowin has been running an automated script that searches for open printer ports and sends a rogue print job to the target's device. The script targets IPP (Internet Printing Protocol) ports, LPD (Line Printer Daemon) ports, and port 9100 left open to external connections. From high-end multi-functional printers at corporate headquarters to lowly receipt printers in small town restaurants, all have been affected. The list includes brands such as Afico, Brother, Canon, Epson, HP, Lexmark, Konica Minolta, Oki, and Samsung.
The printed out message included recommendations for printer owners to secure their device. The hacker said that people who reached out were very nice and thanked him.
The printers apparently spew out an ASCII drawing of a robot, along with the words "stackoverflowin the hacker god has returned. your printer is part of a flaming botnet... For the love of God, please close this port." The messages sometimes also include a link to a Twitter feed named LMAOstack.
The printed out message included recommendations for printer owners to secure their device. The hacker said that people who reached out were very nice and thanked him.
The printers apparently spew out an ASCII drawing of a robot, along with the words "stackoverflowin the hacker god has returned. your printer is part of a flaming botnet... For the love of God, please close this port." The messages sometimes also include a link to a Twitter feed named LMAOstack.
Oh, the humanity! (Score:2)
Of all the bad outcomes of a printer being hacked, that it "spews" racist printouts (everything racist, I guess, is spewed) until you switch off the printer or fix your security doesn't seem to be the worst thing?
Does your printer keep spewing pages that you find offensive until you make a Bitcoin payment to a racial supremacist group?
Re: Oh, the humanity! (Score:2)
I hope the dipshit plants a few trees to compensate for the 390 reams printed.
Re: (Score:2)
FYI: In the west, trees are planted just after harvest. That's why we have sustainable forestry in the first place.
Re: Oh, the humanity! (Score:1)
Re: (Score:2)
Re: (Score:1)
The paper companies will do it for him. (Turns out, they sell paper made from trees. Who knew?)
Let's hope that paper is sequestered in a landfill, keeping the carbon in the cellulose away from oxygen.
Re: Oh, the humanity! (Score:2)
Spewing? (Score:2)
So the issue at hand is that the printer hacking used up printer supplies and that the hacked pages were racist, misogynist, homophobic, homoerotic, xenophobic, jingoistic, pornographic, plain disgusting, or simply annoying are peripheral concerns?
Uh, wait (Score:2)
Are a bunch of printers on the Internet with public IPs (a thought that previously has never crossed my mind, as it's not even a criminal offense...we'd need to invent a new category for it)?
Re: (Score:2)
Oh, most certainly, some of them in branch offices of multinational corporations. The better ones have hard drives for storing print jobs, FTP and configurable web pages, etc. I know of one local company which was appalled to find that their printer was being used to host a kiddie porn FTP site.
This is actually a fairly common configuration when the IT guy doesn't know how to set up a VPN (don't they teach that in computer classes any more?). They just drop it on the outside of the firewall, maybe set up
Re: Uh, wait (Score:1)
This keeps happening because mfgs won't fix it (Score:5, Interesting)
I've been giving some thought to this whole botnet epidemic. It occurs to be that there is a very straightforward solution:
Every manufacturer, software vendor, etc., should ship their hardware, software, device, etc., in a mode in which all remote/external access is completely disabled. Then the user would be required to at least take a positive action to enable the remote or network capability.
However, I am relatively certain this won't happen, for these reasons:
Given that manufacturers are in no rush to do anything that costs them more money (hardware margins are razor thin for just about every hardware company not named "Apple"), I really don't see this changing anytime soon, which is sad because this sort of mentality is making the Internet a worse place for everyone all around.
this in a printer being printed to not a hack! (Score:2)
this in a printer being printed to not a hack! It's just that some people have them with PUB IP's now with IPV6 and an ISP router it may be giving out pub IPv6 ip's with DHCP.
Re: (Score:2)
Semantics.
It's illegal [ncsl.org] in the US:
Unauthorized access" entails approaching, trespassing within, communicating with, storing data in, retrieving data from, or otherwise intercepting and changing computer resources without consent.
Re: (Score:2)
One simple way this kind of attack could be mitigated would be to simply limit connections to the local IP subnet. Requests from other subnets would be ignored unless the user had configured and set a password.
Most people only want to use the printer locally.
Re: (Score:3)
This.
The cure for botnet infections and data breaches is litigation.
Re: (Score:2)
Uh, disabling those protocols means the printer won't print at all, since many printers in corporate and home settings already are networked and not connected via USB or other things.
The bigger question is - how come said printers were hooked up to the Internet directly? Even the most basic firewall would fix it. For home users, said printer will be on WiFi or Ethernet, behind their NAT router, so all is good. And on a corporate network, it too should be behind the firewall and blocked.
Did some company f**k
Re: (Score:2)
how come said printers were hooked up to the Internet directly?
Stupid/lazy IT guy and stupid/lazy bosses. Boss wants to print from his laptop when he's lazing in the coffee shop downstairs. Too stupid and/or lazy to use a VPN, so the stupid and/or lazy IT guy (probably a contractor) drops it outside the firewall. I've been told to do this with security equipment so that the customer could view their cameras from home, and refused. Customer was pissed off. My boss was pissed off. Customer's IT staff t
Re: (Score:2)
Or, as likely, non-existant IT guy(-ess) and a boss that simply doesn't understand that there is a question here. Until the printer starts spewing a page of "your printer is fucked up" every few hours.
Nope, I'd agree with the classification of this guy as a "grey hat".
Botnet? (Score:5, Interesting)
Having port 9100 open doesn't make my printer part of a botnet. It just allows me to print from anywhere. I often set the printer as the DMZ address on my network, because I'd rather have people sending crap at a printer than at my actual computers. This kind is crap is really annoying, not helpful. We COULD turn off external printer ports, but in some cases they are needed or desired. Wasting paper tellling me the port is open? Stupid. Pressuring printer companies to implement a way to only allow authenticated users to print to external ports? Knock yourself out.
(If your printer has the web configuration/admin page unsecured, or telnet config open - that's a different story.)
Re:Botnet? (Score:5, Insightful)
Remember when fax machines printed immediately so that anyone in the world could waste a few sheets of your paper?
We didn't consider that a security issue either.
just tie up someones phone with end less faxes! (Score:2)
https://www.youtube.com/watch?... [youtube.com]
Re: (Score:3, Funny)
We did when the paper triggered the motion sensor security alarm.
Re:Botnet? (Score:4, Informative)
Remember when fax machines printed immediately so that anyone in the world could waste a few sheets of your paper?
We didn't consider that a security issue either.
A few sheets? Ever heard of the Black Fax Attack?
Pranksters used to loop black construction paper through fax machines so that the recipient would run out of toner or have their machine gummed up real good.
Re: (Score:2)
Teenagers egged my house, let's call the SECRET SERVICE!
Re:Botnet? (Score:5, Insightful)
On some models of printer, port 9100 can do a lot more than just accept data to be printed...
For instance, some Xerox printers let you upload firmware updates via port 9100, and vulnerabilities exist allowing remote code execution (see https://www.exploit-db.com/exp... [exploit-db.com])
Printers are fully capable computers, having processors far more powerful than even highend servers from a few years ago. If someone gains the ability to execute arbitrary code on one, then they have a foothold on your network capable of launching further attacks against other hosts.
Re: (Score:2)
>For instance, some Xerox printers let you upload
>firmware updates via port 9100, and vulnerabilities
>exist allowing remote code execution
Damnit, I *knew* I should have listened when he warned me not buy the gatling gun with servos option . . . :)
hawk
Re: (Score:2)
Re: (Score:3)
You know CUPS and any self respecting laser printer have had authentication and encryption for like ages. You could even run CUPS on your router and allow your computer to print from anywhere on the Internet.
On the other hand, this is indeed not a hack, this is just a public printer server.
Re: (Score:3)
Considering that the average printer gets patched just about never, I wouldn't be.
Re: (Score:2)
This.
The message needs to use words that the reader will react to. If 'botnet' wasn't used, would this even had made news?
Re: (Score:3)
What is really needed is advanced network security for dummies-- things like an LCD display on your router to hand out tokens for computers to access the WAN, and 802.1x to segment each machine into a different VLAN unless the traffic is valid.
Re: (Score:2)
Re: (Score:2)
I often set the printer as the DMZ address on my network, because I'd rather have people sending crap at a printer than at my actual computers.
This is the dumbest thing I've read in a while.
Re: (Score:2)
I often set the printer as the DMZ address on my network, because I'd rather have people sending crap at a printer than at my actual computers.
You don't want people to send crap to your actual computers, so you open a huge hole through your firewall, right into a powerful computer that has horribly buggy, rarely-updated firmware and frequently communicates with all of your actual computers, through their (also likely buggy) print drivers -- which on many systems execute with system permissions?
You need to rethink that strategy.
My recommendation (with some caveats, see below) is to use Google Cloud Print. Your printer opens a secure (TLS) outbo
Re: (Score:2)
And if the data I'm printing is both commercially confidential AND detrimental to the interests o
If you hack my printer (Score:3)
I'll throw it out because I don't use that thing anymore. I can't even imagine what I would need with hardcopies anymore.
Ah, printers, the grand-fathers of IoT insecurity (Score:4, Insightful)
Re: (Score:3)
At work we have open wifi to date the most interesting thing I've seen connected to it was an HP printer.
Why is that interesting?
Because as best as I can tell the printer is somewhere the next city block over we only noticed because stuff here started offering to print to it.
The public wifi also shuts of at 6PM so maybe it's a business? IDK.
Haven't had any problems with people printing stuff to our printer however due to the network size and having more than one printer of the same model we have had issues
So what? (Score:2)
Giant Penis (attention grabber) (Score:5, Funny)
Funny story, third hand but from a source I 100% believe.
Walking back from a bar to his car in the downtown of a mid-size American city a friend of my friend notices open WiFi. *Score!* He connects to the network and gets a list of connected devices. He sees the usual stuff, but also something he'd never seen before. He does a quick search and finds out it's a commercial banner printer. It does 600dpi prints up to 30" wide off of rolls that can be 250' long. *SCORE!*
At this point WiFi is pretty new to most people, and security is barely on anyone's mind. He does a relatively nice thing - he finds a standard HP Laserjet and prints off a letter explaining that their WiFi is open, their 5-figure printer is exposed to the world, and it would be a really good idea to fix that. He even gives them a link to their AP's documentation showing how to set up password access.
As you might imagine, he was a pretty frequent visitor to the bar - so he watched and waited for a while. Seeing no change in their openness, he repeated the warning letter and made it pretty clear they should take the potential for damage seriously. He ended up traveling away for work reasons, and when he returned over two full weeks later he was eager to return to his local spot.
Of course there was still no change in the open network, and the printer was still available. After some thought, he got pretty well inebriated, and knew exactly what to do. He downloaded the printer's driver software to his laptop, found a good high resolution picture and printed a 30' long veiny erect penis on their big buck banner printer. The next week, the WiFi was password protected at that location.
A new meaning to "reams" of paper? (Score:2)
At least it wasn't as offensive as racist slogans?
Another anecdote (Score:2)
Back in the early 2Ks, I worked for a certain networking gear manufacturer who gets confused with a food service company. Two or three times, a particular virus popped up that looked for open Windows file shares and would drop a copy of itself on said file share, naively hoping that a moron would later see it and click on it. Well, some bright spark had decided that for some reason, printers needed to be set up as a pseudo file share. This would then dump raw ASCII to the printer. (I suppose it might have b
Read the latest research in printer security? (Score:3, Informative)
Think of the environment (Score:1)