• Categories
    Category
  • Categories
    Category
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
News Comments FAQ Related Articles

Malware threats doing the rounds in flatbed scanners

3119

A team of three Israeli security researchers released a proof concept about the possibility of remote attackers exploiting the vulnerabilities in scanners to deliver malware. Using the light sensitivity of the scanner, the researchers devised several methods to deliver data through nearby lasers to another drone or even a passing car within an environment in a clear line of sight. This could well be the start of ransom ware attacks.

Their paper, “ Oops!...I think I scanned a malware” , explains how attackers exploit the devices like sheet fed scanners, integrated scanners, drum scanners and also portable scanners which is mostly used in offices worldwide.

The researchers demonstrated this by using the light in the flatbed scanner to infiltrate the air gapped systems. An air gap is a network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecured network. This method reflects the loopholes in the organization scanner which serves as a gateway to the organization’ s sensitive information and it remains as a tunnel or a channel between the attacker and the organization.

“ This research highlights that even the process of air-gapping devices does not guarantee that breaches can be prevented," says Michael Patterson, CEO of Plixer. He further added, " Any form of data communication that does not require a physical connection becomes a point of vulnerability."

Organizations need to scrutinize the traffic flow between these air gapped network using traffic analysis and behavior analysis tools to gain visibility over the networks. There is some possible precaution that can be taken against these malware, it involves closing the scanner so light cannot be projected on the pane when the scanner is closed and a covert channel cannot be created.

Tags:
levi
Author: 

Comments ( 0 )

No comments available

Add a comment

Frequently asked questions ( 5 )

Q

What are the information that gather malicious code?

A

The malicious code gathers information from the visitor, such as:

User Agent
IP Address
Referrer
HTTP Accept-Language

Q

How to protect the site?

A

Here are some good security practices to protect your website moving forward:
1.Update your software. This includes your CMS (WordPress, Joomla, etc.), plugins, themes, and server software.
2.Use strong passwords. From your administrator login page to FTP users, always choose long, complex, and unique passwords for your website management accounts.
3.Use a Web Application Firewall. A WAF will filter all HTTP/HTTPS traffic between your server and your visitors, blocking known attacks and virtually patching your site even if you forget to update.

Q

What is malware?

A

Malware is shorthand for malicious software. It is software developed by cyber attackers with the intention of gaining access or causing damage to a computer or network, often while the victim remains oblivious to the fact there's been a compromise. A common alternative description of malware is 'computer virus' -- although are big differences between these types malicious programs.

Q

What was the first computer virus?

A

The origin of the first computer virus is hotly debated: For some, the first instance of a computer virus -- software that moves from host to host without the input from an active user -- was Creeper, which first appeared in the early 1970s, 10 years before the actual term 'computer virus' was coined by American computer scientist Professor Leonard M. Adleman.

Q

What is trojan malware?

A

One of the most common forms of malware -- the Trojan horse -- is a form of malicious software which often disguises itself as a legitimate tool that tricks the user into installing it so it can carry out its malicious goals.

Related News in Malware threats doing the rounds in flatbed scanners

Related News in Malware threats doing the rounds in flatbed scanners

Chrome extension Trojan tricks victims in an endless malware loop
Chrome extension Trojan tricks victims in an endless malware loop
Apr 29, 2017
Dridex rears its ugly head again.
Dridex rears its ugly head again.
Apr 6, 2017
Threat actors abuse Microsoft Azure cloud services to host malware and as command and control (C&C) servers.
Threat actors abuse Microsoft Azure cloud services to host malware and as command and control (C&C) servers.
Jun 12, 2019
WordPress and Joomla websites infected by new backdoor malware
WordPress and Joomla websites infected by new backdoor malware
May 31, 2019
Free malware-as-a-service MacSpy hits Mac OS
Free malware-as-a-service MacSpy hits Mac OS
Jun 14, 2017
A New Linux malware strain could morph into serious threat
A New Linux malware strain could morph into serious threat
Apr 26, 2017
CrySIS ransomware targeting businesses is on the rise
CrySIS ransomware targeting businesses is on the rise
May 28, 2019
Malware threats doing the rounds in flatbed scanners
Malware threats doing the rounds in flatbed scanners
Apr 1, 2017
Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Luke ?
workbench for debian

I am using workbench in CentOS whereas now I need to use Debian Operating system so could you please help to install and use in Debian?

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.