Many companies still provide their fax number in the contact information section on their websites. After all, it is considered quite harmless to share the fax number along with other data, such as email addresses or company phone numbers. However, cyber security experts found that fax machines could be exploited by hackers.
According to research conducted by the experts of the electronic security organization, "Faxploit", if one of the attackers got the fax number of the institution, it is possible to send an image file is specifically designed to the target device and can encrypt anything in this file, such as malware or mining programs or ransom or Spying programs. The device will decrypt the file and load this program into your device's memory. In this way, attackers can easily obtain sensitive data or can change the entire network that the fax machine is connected to.
Researchers claim that some of the weak communication protocols used by most fax machines around the world are responsible for attacks, if vulnerabilities are exploited, an attacker can control any network, whether for private or commercial use. The defective protocols are installed not only on widely used fax machines, but also on multifunction printer models.
Researchers claim that some of the weak communication protocols used by most fax machines around the world are responsible for attacks, if vulnerabilities are exploited, an attacker can control any network, whether for private or commercial use. The defective protocols are installed not only on widely used fax machines, but also on multifunction printer models.
The research shows that the gaps in the protocols used by all fax machines and multifunction printers allow hackers to inject malware into the company's network in a very simple way. "Using only the phone line, we were able to send a fax that can fully control the printer, and then launch our load within the network that can be accessed from the device."
This was tested on HP Officejet Pro 6830 fax printers. However, the researchers say that this flaw can be exploited in any fax machine because the vulnerabilities are present in their communication protocols.
Online fax services such as fax2email are also susceptible to similar types of attacks. HP quickly corrected the gap in the above model by launching a patch program, which is now available for download on the company's website.
Cybersecurity experts from the International Institute of Cyber Security believe that the rest of the manufacturers must address this loophole as soon as possible and adjust how modern network protocols are handled with fax machines and multifunction printers. They also stated that as of today, companies must remain on alert and consider fax machines as a possible means of attack for intruders.
This was tested on HP Officejet Pro 6830 fax printers. However, the researchers say that this flaw can be exploited in any fax machine because the vulnerabilities are present in their communication protocols.
Online fax services such as fax2email are also susceptible to similar types of attacks. HP quickly corrected the gap in the above model by launching a patch program, which is now available for download on the company's website.
Cybersecurity experts from the International Institute of Cyber Security believe that the rest of the manufacturers must address this loophole as soon as possible and adjust how modern network protocols are handled with fax machines and multifunction printers. They also stated that as of today, companies must remain on alert and consider fax machines as a possible means of attack for intruders.