Online:
Visits:
Stories:
Profile image
By Alton Parrish (Reporter)
Contributor profile | More stories
Story Views

Now:
Last Hour:
Last 24 Hours:
Total:

Desktop Scanners Can Be Hijacked to Perpetrate Cyberattacks

Tuesday, March 28, 2017 13:09
% of readers think this story is Fact. Add your two cents.

(Before It's News)

A typical office scanner can be infiltrated and a company’s network compromised using different light sources, according to a new paper by researchers from Ben-Gurion University of the Negev and the Weizmann Institute of Science.

“In this research, we demonstrated how to use a laser or smart bulb to establish a covert channel between an outside attacker and malware installed on a networked computer,” says lead author Ben Nassi, a graduate student in the BGU Department of Software and Information Systems Engineering as well as a researcher at the BGU Cyber Security Research Center (CSRC). “A scanner with the lid left open is sensitive to changes in the surrounding light and might be used as a back door into a company’s network.”

B4INREMOTE-aHR0cHM6Ly8yLmJwLmJsb2dzcG90LmNvbS8tUGFKSkdYaXQ5enMvV05yQXFiSUMxN0kvQUFBQUFBQUJXcGMvcEUyYXdwREl6cHNhRFQ5NXVYd0VreW10eTg5QzlGYTBnQ0xjQi9zNjQwL2Rvd25sb2FkJTJCJTI1Mjg3JTI1MjkuanBn
Credit:  Max Pixel

The researchers conducted several demonstrations to transmit a message into computers connected to a flatbed scanner. Using direct laser light sources up to a half-mile (900 meters) away, as well as on a drone outside their office building, the researchers successfully sent a message to trigger malware through the scanner.

In another demonstration, the researchers used a Galaxy 4 Smartphone to hijack a smart lightbulb (using radio signals) in the same room as the scanner. Using a program they wrote, they manipulated the smart bulb to emit pulsating light that delivered the triggering message in only seconds.

To mitigate this vulnerability, the researchers recommend organizations connect a scanner to the network through a proxy server — a computer that acts as an intermediary — which would prevent establishing a covert channel. This might be considered an extreme solution, however, since it also limits printing and faxing remotely on all-in-one devices.

“We believe this study will increase the awareness to this threat and result in secured protocols for scanning that will prevent an attacker from establishing such a covert channel through an external light source, smart bulb, TV, or other IoT (Internet of Things) device,” Nassi says.

Prof. Adi Shamir of the Department of Applied Mathematics at the Weizmann Institute conceived of the project to identify new network vulnerabilities by establishing a clandestine channel in a computer network.

Ben Nassi’s Ph.D. research advisor is Prof. Yuval Elovici, a member of the BGU Department of Software and Information Systems Engineering and director of the Deutsche Telekom Laboratories@BGU. Prof. Elovici is also director of the CSRC.

Contacts and sources:
Andrew Lavin
American Associates, Ben-Gurion University of the Negev 



Source: http://www.ineffableisland.com/2017/03/desktop-scanners-can-be-hijacked-to.html

Report abuse

Comments

Your Comments
Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

Total 1 comment
  • it’s a cat and mouse game and as we learn to block “X” then devices will be installed with “Y” which is just what happens with windows updates that don’t get turned off even if you stop the windows service that takes a lot of doing.

    China is getting a safe version of windows 10 after they told microsoft to get lost and MS is working with China to provide a version that the government is happy with but everyone else can get stuffed.

    Printers also leave a hidden sigiture on paper that looks like ink splashes so any document thats printed can be traced back to the printer that printed it and this goes back well over ten years.

    Host process are used in windows to hide what Dll’s they are runnng and to make it impossible to stop because if you kill SrvHost, ConHost every time it cranks up then windows won’t run and this is all by design and yet MS wants to bang on about security, yes security to stop you from seeing whats going on

Top Stories
Recent Stories

Register

Newsletter

Email this story
Email this story

If you really want to ban this commenter, please write down the reason:

If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.