Network Printer & Scanner Spoofing Campaign Targets Millions

  /     /     /  
Publicated : 22/11/2024   Category : security


Network Printer & Scanner Spoofing Campaign Targets Millions


Cybercriminals distribute malicious email attachments purportedly coming from three common brands of network printer-scanner devices.



Spoofed emails purportedly coming from HP, Canon, and Epson network printer-scanner devices are attempting to infect millions of users with malicious attachments, according to Barracuda.
The attempts began in late November with the attackers sending bogus emails that read Scanned from HP, Scanned from Epson, or Scanned from Canon, in the subject line, Barracuda researchers note in a blog. The attackers use PDF files to carry their malicious payload, because employees will typically send a PDF file from a network printer to their co-workers, Barracuda notes.
Attackers have attempted to avoid detection by modifying file names and extensions from within the traditional file archive. This allows the attackers to hide the malware inside the archive and imitate a .jpg, .txt, or other file format.
Once the attachment is opened, the attackers can gain remote access to users computers and check for network-connected systems.
Read more about the spoofed network printer-scanner campaign
here
.

Last News

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Network Printer & Scanner Spoofing Campaign Targets Millions