Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

- 102846565 dee956ac 21d0 45d0 8ad3 6034045413c1 - Malicious faxes leave firms ‘open’ to cyber-attack –

Credits: BBC

A customised image sent by fax can let hackers sneak into corporate networks, researchers have found.

In a presentation at the Def Con hacker conference, two researchers showed how to craft the booby-trapped images.

The malicious message exploits the protocols used to define the format of fax messages.

The pair said millions of companies could be at risk because they currently did little to secure fax lines.

No security

“Fax has no security measures built in – absolutely nothing,” security researcher Yaniv Balmas, from Check Point software, told the BBC.

Mr Balmas uncovered the security holes in the fax protocols with the help of colleague Eyal Itkin and said they were “surprised” by the extent to which fax was still used.

“There seems to be a lot of organisations, government agencies, and others that are still using fax,” said Mr Balmas.

He added that there were historical and legal reasons why the aging technology was still so prevalent.

“Fax is still considered as visual evidence in court but an email is not,” he said. “That’s why some government agencies require you to send a fax.”

England’s NHS is known to be a big user of fax machines. About 9,000 of them were recently found to still be in use in the service.

Organisations were vulnerable to a fax , said Mr Balmas, because often the machines that received fax messages were also printers and copiers that typically had a connection to an organisation’s internal network.

Gaining control of the machine that handles faxes, copying and printing can give attackers a foothold on a vulnerable network. They could then use this access to explore and attack the larger organisation, said Mr Balmas.

The weakness emerges in the protocols that define the way the data making up fax messages should be prepared.

“The protocols we use for fax were standardised in the 1980s and have not been changed since,” Mr Balmas said.

This weakness let the pair craft an image that harboured a malicious payload.

For their test case, the payload used was a software exploit known as Eternal Blue, which was behind the massive WannaCry attack last year.

The fax protocols were poorly worded, which had led to them being interpreted in different ways by different manufacturers, said Mr Balmas.

And this had contributed to the vulnerabilities in the fax system.

In particular, the researchers found problems with the way the protocols were used in some multi-purpose printers made by HP that are widely used in the business world.

HP has now issued a patch for its printers, which will close the loopholes found by the pair.

But, said Mr Balmas, because fax numbers were very widely shared, they could be an easy-to-find attack route for malicious hackers who targeted different machines.

So far, there is no evidence that malicious hackers are using the booby-trapped images to penetrate otherwise well defended networks.

- logo16 - Malicious faxes leave firms ‘open’ to cyber-attack –

www.extremehacking.org

Sadik Shaikh | Cyber Suraksha Abhiyan, Ethical Hacking Training Institute, CEHv10,CHFI,ECSAv10,CAST,ENSA, CCNA, CCNA SECURITY,MCITP,RHCE,CHECKPOINT, ASA FIREWALL,VMWARE,CLOUD,ANDROID,IPHONE,NETWORKING HARDWARE,TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking,Center For Advanced Security Training in India, ceh v10 course in Pune-India, ceh certification in pune-India, ceh v10 training in Pune-India, Ethical Hacking Course in Pune-India

 



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here