A mobile device is used to access a printer and inject malware that serves as a “man-in-the-middle” to intercept and read data sent to the MFP.
Printer WiFi or Bluetooth is on/open without requiring user authentication. Data files are not encrypted.
Use printers (such as HP Enterprise and selected Pro printers & MFPs) with built-in features that would stop the malware. Also, apply a mobile authentication and encryption solution such as HP JetAdvantage Connect or HP Access Control, to ensure only authorized mobile users can connect to the printers.
Part 2: Party Time
A user inadvertently sends malicious code to the printer hidden within a seemingly innocent print file received in a "phishing" email.
Printers don’t have the ability to detect an injection of malware code.
Use printers (such as HP Enterprise and selected Pro printers & MFPs) with built-in features that would stop the malware. Also, educate end users to be wary of opening and printing suspicious files.
Part 3: Let's Dance
The malicious code is spread to the PC devices and resides at the Basic Input/Output System (BIOS) level giving it the ability to continually supply data and even reinstate itself after network defenses deploy.
PC’s don’t have BIOS level malware protection, thus the malware is able to reinstate itself.
HP Elite PC’s (and HP Enterprise printers) include HP SureStart which can automatically restore productivity after a BIOS attack without IT intervention.
Part 4: Making It Rain
The wrong person discovers a very sensitive hardcopy document left behind in the output tray of a MFP.
Accidental mishandling of sensitive information by users.
Deploy a pull print solution so users must authenticate at the device to retrieve their sensitive documents.
HP - The Fixer
Epizoda 1 - Prevara
Epizoda 2 - Ali Slišite?
Epizoda 3 - Povračilni Udarec
HP - The wolf 2
The hunt continues
If you're not taking your device security seriously,
someone else might be.
Customer Testimonial - Portland, Oregon USA
HP Business Printing Reinvented: It's Our Operating System