Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/5/2018
02:10 PM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail
50%
50%

7 Non-Computer Hacks That Should Never Happen

From paper to IoT, security researchers offer tips for protecting common attack surfaces that you're probably overlooking.
Previous
1 of 8
Next

 Pixabay

Pixabay

You might look at an old fax machine or dusty printer and just see out-of-date technology that you can't even use to send email. You might look at the company mailroom as just a place to collect unsolicited junk mail you'll soon throw in the trash. Attackers may see something different: vulnerabilities, often ignored by your security department. Cyberrattacks on non-computer vectors are more common than you think. 

For example, Check Point Software Technologies research on all-in-one machines this August found vulnerabilities in the popular HP Officejet Pro All-in-One fax printers. According to the Check Point research, the same protocols are also used by many other vendors’ faxes and multi-function printers, and in popular online fax services such as fax2email, so it’s highly possible that these are also vulnerable to attack by the same method. While not the most modern technology, 62 percent of respondents to a Spiceworks survey in 2017 said that they are still supporting physical fax machines, and 82 percent of respondents to an IDC survey reported that their use of faxing actually increased in 2017. Faxes especially are still widely used in the healthcare, legal, banking, and real estate sectors, where organizations store and process vast amounts of highly sensitive personal data. 

That's just one example of the often overlooked attack vectors on systems and environments not used for traditional computing. Read on for more.

In developing this feature, we talked to security researchers at InGuardians and IOActive, two companies that specialize in penetration testing, to help businesses uncover network vulnerabilities. We talked with Tyler Robinson, senior managing security analyst and head of offensive services at InGuardians; and John H. Sawyer, director of red team services at IOActive.

 

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio

Previous
1 of 8
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Big Ralfie
50%
50%
Big Ralfie,
User Rank: Apprentice
12/1/2018 | 2:36:24 PM
Piss-Poor Printouts
Worse yet, when I try to print the article, no matter which page I try to print, all I get is page one. Why are your web designers so lazy?
wperry31
100%
0%
wperry31,
User Rank: Strategist
12/1/2018 | 10:45:11 AM
How about giving us the opportunity to print out the entire article/
When we go through the selection process to view a report - it would be helpful if we could print out the ENTIIRE article rather than one page at a time.  That's a pain.

 

Thanks,

 

 

Bill
jswalsh2000
100%
0%
jswalsh2000,
User Rank: Apprentice
11/12/2018 | 5:24:04 PM
Target breach via HVAC devices?
The information I've read about the Target breach was a Target provided vendor web portal was breached. 

The HVAC service provider's staff had been victims of a phishing attack which allowed for the credentials to be stolen. From there the attackers accessed Target's web portal and hacked into the webserver from there they elevated privileges and started to map Target's north American network which include eftpos endpoints where credit/debit card information was collected. The only reference to HVAC was it happened to be an HVAC company engaged to service HVAC systems for stores in a region.

If the assessment of this breach has changed or been updated, can you please provide urls which descibe Target's HVAC device compromise so I can update my understanding of the breach.

Thanks
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
NetCAT Vulnerability Is Out of the Bag
Dark Reading Staff 9/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16199
PUBLISHED: 2019-09-17
eQ-3 Homematic CCU2 before 2.47.18 and CCU3 before 3.47.18 allow Remote Code Execution by unauthenticated attackers with access to the web interface via an HTTP POST request to certain URLs related to the ReGa core process.
CVE-2019-16391
PUBLISHED: 2019-09-17
SPIP before 3.1.11 and 3.2 before 3.2.5 allows authenticated visitors to modify any published content and execute other modifications in the database. This is related to ecrire/inc/meta.php and ecrire/inc/securiser_action.php.
CVE-2019-16392
PUBLISHED: 2019-09-17
SPIP before 3.1.11 and 3.2 before 3.2.5 allows prive/formulaires/login.php XSS via error messages.
CVE-2019-16393
PUBLISHED: 2019-09-17
SPIP before 3.1.11 and 3.2 before 3.2.5 mishandles redirect URLs in ecrire/inc/headers.php with a %0D, %0A, or %20 character.
CVE-2019-16394
PUBLISHED: 2019-09-17
SPIP before 3.1.11 and 3.2 before 3.2.5 provides different error messages from the password-reminder page depending on whether an e-mail address exists, which might help attackers to enumerate subscribers.