{"id":24842,"date":"2018-12-05T12:05:55","date_gmt":"2018-12-05T17:05:55","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=24842"},"modified":"2019-11-15T06:31:05","modified_gmt":"2019-11-15T11:31:05","slug":"hacked-printer-pewdiepie","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/hacked-printer-pewdiepie\/24842\/","title":{"rendered":"Printers gone mad"},"content":{"rendered":"<p>One quiet evening, you suddenly hear a sound. It\u2019s the printer in the next room, and it\u2019s furiously printing something no one requested. You take a look and see that it\u2019s printed a leaflet urging you to subscribe to a well-known YouTube channel.<\/p>\n<p>A few hours later, the printer suddenly spits out an ad from a company promising to advertise goods through printers, and then starts incessantly printing all kinds of gobbledygook, mostly of extremely dubious content. What the hell is going on? Your printer\u2019s been hacked, that\u2019s what. And not only yours.<\/p>\n<h2>Printers like PewDiePie<\/h2>\n<p>The above case is real, and quite recent: Last week <a href=\"https:\/\/www.theverge.com\/2018\/11\/30\/18119576\/pewdiepie-printer-hack-t-series-youtube\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">50,000 printers worldwide suddenly became fans of PewDiePie<\/a>, the youtuber in question. One of them was even a receipt printer at a police station, which probably raised a few eyebrows.<\/p>\n<p>Here\u2019s how it happened: Somewhere, a hacker was bored \u2014 and a bored hacker means trouble. It seems he had just spent four hours playing Destiny\u00a02 nonstop. If you\u2019ve ever played this game, you can imagine his frame of mind. After Destiny\u00a02-ing, he was itching to hack something, and with that in mind, he logged into Shodan, a service that allows you <a href=\"https:\/\/www.kaspersky.com\/blog\/shodan-censys\/11430\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">to search for Internet-connected devices<\/a>, also known as the world\u2019s first search engine for the <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/internet-of-things\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">Internet of Things<\/a>.<\/p>\n<p>The hacker decided that he would target printers and get them to print something funny (in his opinion), and so that\u2019s what he did. According to the hacker (who told the whole story himself on Twitter, where his handle is <a href=\"https:\/\/twitter.com\/HackerGiraffe\/status\/1068714506770149376\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">@HackerGiraffe<\/a>), he skimmed through the available information on printer protocols and the corresponding ports, and then looked for the ports on Shodan. There, he discovered more than 800,000 devices online with these ports open. He selected the first 50,000.<\/p>\n<p>He decided it would be funny to print a leaflet in support of famous vlogger PewDiePie, whose YouTube channel is in a battle with another channel, T-Series, for the title of most popular in the world. The message urged recipients to subscribe to PewDiePie and unsubscribe from T-Series.<\/p>\n<p>In the wilds of the Internet, the hacker found a program for hacking printers, wrote a simple script to run the hacking tool and send a command to the printers to print the leaflet, and then executed the script. As a result, 50,000 printers worldwide churned out the following:<\/p>\n<p>https:\/\/twitter.com\/TFGHighlights\/status\/1067472069850390529<\/p>\n<h3>Partisan printer marketing<\/h3>\n<p>Such news could hardly be missed by the media \u2014 and soon millions of people around the world knew that hundreds of thousands of printers were hijackable.<\/p>\n<p>They included some enterprising minds, who promptly set up an <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/zmdy7y\/someone-is-selling-mass-print-hijacking-hacking-service\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">agency offering to print ads on other people\u2019s printers<\/a> \u2014 apparently using the same method employed by @HackerGiraffe, after he kindly tweeted how to do it.<\/p>\n<p>To illustrate the service, information about the agency was disseminated through the same printers as before (the owners of which must have been delighted, especially the police station). The advertising brochures dropping into the printer trays boasted that the agency could hack absolutely any printer in the world. That\u2019s probably a slight exaggeration: If they use the very technique described by @HackerGiraffe, they can reach only network printers.<\/p>\n<h3>A brief history of printer attacks<\/h3>\n<p>In fact, attacks on printers are nothing new, and it is somewhat surprising that the idea has only recently entered the mainstream. Back in the fax age, for example, fax spam was popular with all kinds of mischief-makers eager to distribute ads and other materials by fax. In 1991, a law was passed in the US to prohibit the practice, which also coincided with a general decline in faxes worldwide (although you won\u2019t believe <a href=\"https:\/\/www.kaspersky.com\/blog\/fax-fun-facts\/23716\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">in which country they are still alive and kicking<\/a>!).<\/p>\n<p>Speaking of printers, in 2008 researcher Aaron Weaver <a href=\"http:\/\/aaron.weaver2.googlepages.com\/CrossSitePrinting.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">published an article<\/a> describing how a Web page can be created for launching print jobs on any visitors\u2019 printers. There have also been cases of mass attacks on printers \u2014 for example, in 2016 a hacker <a href=\"https:\/\/www.timesofisrael.com\/white-supremacist-claims-swastika-printing-hack-at-us-colleges\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">hacked network printers<\/a> at more than a dozen US colleges and printed racist leaflets on them.<\/p>\n<h3>How to prevent your printer from going postal<\/h3>\n<p>Most users probably don\u2019t need their printer to be hooked up to the Internet. And only network printers can be hacked using the method described above, so it is better simply to disconnect your printer from the Internet, in which case it will still be accessible through the local network.<\/p>\n<ul>\n<li>Disable any printer settings that involve printing over the Internet.<\/li>\n<li>Change your username and password (if your printer uses login credentials); never keep the default values.<\/li>\n<li>Close router ports 9100, 515, and 721\u2013731. See your router\u2019s user manual to find out how.<\/li>\n<li>Turn off your printer when it\u2019s not in use.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-cyberattacks\">\n","protected":false},"excerpt":{"rendered":"<p>50,000 printers worldwide suddenly printed a leaflet in support of youtuber PewDiePie. How can you protect your printer from hackers?<\/p>\n","protected":false},"author":675,"featured_media":24843,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2683],"tags":[82,658,794,3093,1460],"class_list":{"0":"post-24842","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-hacking","10":"tag-internet-of-things","11":"tag-iot","12":"tag-printer","13":"tag-shodan"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/hacked-printer-pewdiepie\/24842\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/hacked-printer-pewdiepie\/14752\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/hacked-printer-pewdiepie\/12356\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/hacked-printer-pewdiepie\/16668\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/hacked-printer-pewdiepie\/14859\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/hacked-printer-pewdiepie\/13843\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/hacked-printer-pewdiepie\/17475\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/hacked-printer-pewdiepie\/16684\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/hacked-printer-pewdiepie\/21829\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/hacked-printer-pewdiepie\/5479\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/hacked-printer-pewdiepie\/11165\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/hacked-printer-pewdiepie\/10122\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/hacked-printer-pewdiepie\/18236\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/hacked-printer-pewdiepie\/22114\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/hacked-printer-pewdiepie\/17717\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/hacked-printer-pewdiepie\/21601\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/hacked-printer-pewdiepie\/21599\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/internet-of-things\/","name":"Internet of things"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/675"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=24842"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24842\/revisions"}],"predecessor-version":[{"id":29576,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24842\/revisions\/29576"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/24843"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=24842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=24842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=24842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}