{"id":22593,"date":"2018-08-31T15:17:21","date_gmt":"2018-08-31T19:17:21","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=22593"},"modified":"2021-07-06T17:17:03","modified_gmt":"2021-07-06T21:17:03","slug":"hp-leaves-mac-users-vulnerable-to-fax-hacks","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2018\/08\/31\/hp-leaves-mac-users-vulnerable-to-fax-hacks\/","title":{"rendered":"HP Leaves Mac Users Vulnerable to Fax Hacks"},"content":{"rendered":"<p><a href=\"https:\/\/www.cnbc.com\/2018\/08\/13\/fax-machines-could-be-the-next-target-for-hackers-researchers-warn.html\">Saheli Roy Choudhury<\/a>:<\/p>\n<blockquote cite=\"https:\/\/www.cnbc.com\/2018\/08\/13\/fax-machines-could-be-the-next-target-for-hackers-researchers-warn.html\"><p>Researchers at Nasdaq-listed <a href=\"https:\/\/www.cnbc.com\/quotes\/?symbol=CHKP\">Check Point Software Technologies<\/a> said that fax machines &mdash; which still reside in many offices &mdash; have serious security flaws. Those vulnerabilities could potentially allow an attacker to steal sensitive files through a company&rsquo;s network using just a phone line and a fax number.<\/p><p>In a <a href=\"https:\/\/research.checkpoint.com\/sending-fax-back-to-the-dark-ages\/#qa\">report<\/a> released on Sunday, Check Point researchers showed how they were able to exploit security flaws present in a <a href=\"https:\/\/www.cnbc.com\/quotes\/?symbol=HPQ\">Hewlett Packard<\/a> all-in-one printer. Standalone fax machines are a rarity in companies today, but the fax function is still present in commonplace all-in-one printers.<\/p><p>They faxed over lines of malicious code disguised as an image file to the printer, relying on the fact that no one usually checks the contents received over a fax. The file was decoded and stored in the printer&rsquo;s memory, which allowed the researchers to take over the machine. From there, they were able to infiltrate the entire computer network to which the printer was connected.<\/p><\/blockquote>\n\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/\">Joshua Long<\/a>:<\/p>\n<blockquote cite=\"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/\"><p>Oftentimes when HP releases firmware updates for printers and multifunction devices, the company only makes the firmware available in the form of an EXE file &mdash; a Windows application. In spite of the severity of the Faxploit bugs, HP has not made an exception to this unfortunate practice.<\/p><p>Of the more than <a href=\"https:\/\/support.hp.com\/us-en\/document\/c06097712\">150 affected models<\/a> for which HP released firmware updates, approximately one quarter of them do not have a Mac-compatible firmware update installer available to download through HP&rsquo;s support site.<\/p><\/blockquote>","protected":false},"excerpt":{"rendered":"<p>Saheli Roy Choudhury: Researchers at Nasdaq-listed Check Point Software Technologies said that fax machines &mdash; which still reside in many offices &mdash; have serious security flaws. Those vulnerabilities could potentially allow an attacker to steal sensitive files through a company&rsquo;s network using just a phone line and a fax number.In a report released on Sunday, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2018-08-31T19:17:23Z","apple_news_api_id":"e0cdbf1e-4c5a-46f9-915f-25b177534d62","apple_news_api_modified_at":"2021-07-06T21:17:06Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAAAA==","apple_news_api_share_url":"https:\/\/apple.news\/A4M2_HkxaRvmRXyWxd1NNYg","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[2095,1520,30,504,476,695,48],"class_list":["post-22593","post","type-post","status-publish","format-standard","hentry","category-technology","tag-exploit","tag-hp","tag-mac","tag-malware","tag-networking","tag-printing","tag-security"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/22593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=22593"}],"version-history":[{"count":1,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/22593\/revisions"}],"predecessor-version":[{"id":22594,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/22593\/revisions\/22594"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=22593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=22593"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=22593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}