The latest technique is based on the concept of cross-site scripting, whereby an attacker can inject malicious code into Web pages viewed by others.
Having prospered by passing the costs of their operations onto others, spammers have a new way to vex computer users: printer hijacking.
Building on the concept of cross-site scripting, whereby an attacker can inject malicious code in Web pages viewed by others, security researcher Aaron Weaver has demonstrated how an attacker can inject spam messages into a Web site visitor's printer.
Weaver's research is available in a paper published online. It describes how the attack could be initiated by creating a hidden iframe -- a block of code inserted into a Web page and often served from a different domain than the Web page -- and a Web form that submits the spam message to the printer. An attacker could also send the spam message as a fax, if the printer has fax capabilities.
"The end result is that by visiting a Web site on the Internet you could end up sending printer spam to your printer without even knowing that anything happened," Weaver explains in his paper. "Since most printers don't have any security set, it is possible to print anything, control the printer, change the print settings, and even send faxes."
Weaver offers two ways to defend against this attack: Set an administrator password for your printers and consider restricting access to the printer so that it only accepts print jobs from a specific server.
Printer security has been an issue among security professionals for years. In a presentation at the 2000 Cert Conference, for example, computer security researcher Steve Nugen presented information about an incident in which a Space and Naval Warfare Systems Command printer was hacked, allowing the attacker to reprogram routing tables on other network equipment to copy print jobs to a server in Russia.
[Interop ITX 2017] State Of DevOps ReportThe DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are adopting DevOps methodologies, the effects on their staff and processes, and the tools they are utilizing for the best results.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.