• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

700+ Brother printers are wide open to attack.

Elixer

Lifer
Maybe one of these days these companies will get a clue? Then again, I doubt it.
The cause of all these exposures is Brother's choice of shipping the printers with no admin password. Most organizations most likely connected the printers to their networks without realizing the admin panel was present and wide open to connections. These printers are now easy discoverable via IoT search engines like Shodan or Censys.
...
For example, an attacker could change the printers' passwords and cause downtime to affected organizations.
...
An attacker could include spyware-like behavior in tainted firmware updates and have printers send copies of printed documents to an attacker's server.



https://www.bleepingcomputer.com/ne...d-panels-and-password-reset-functions-online/
 
Every day there is an attack here, an attack there, a vulnerability everyfreakingwhere! It's a real PITA to have to keep up with all this crap.
 
Do people actually connect these directly to the internet?

The model they show on the picture looks exactly like mine too lol. But right now it's not even connected to the network only USB, thoubh I have been wanting to read up on how to setup CUPS so I can set it up as a network printer, just have not had a chance. I'm safe as long as it's only on my network right? I don't plan to port forward it or anything like that.
 
Back
Top