📜 ⬆️ ⬇️

Hacked printers in German universities printed many anti-Semitic leaflets



Hacking a remote printer, as far as can be judged, is not particularly difficult. Millions of different devices are now connected to the network, and most of these connections are not protected. The fact is that manufacturers of many IoT devices take care of the design and functionality of their products, but security is seen as something secondary.

That is why Andrew Orenheimer (Andrew Auernheimer) was previously able to send homemade leaflets to thousands of printers around the world to print. It seems that this story has not taught anyone anything. The hacking of remote printers that printed thousands of flyers with a swastika was continued. The fact is that exactly the same thing happened in Germany - on the birthday of Hitler hundreds of printers in universities in the country printed many leaflets with anti-Semitic texts and protests against migrants.

Printers from at least 6 universities were involved in this story (which became known through the stories of employees of these organizations). So, the University of Hamburg received leaflets with the slogan "Europe, wake up!". The text of the leaflet considered (if you can call it that) the issue of migrants. The text also referred to the “former Fuhrer of Europe”, etc. There is no point in discussing the text, because of its content, it remains only to be surprised (again) the defenselessness of the equipment of many organizations.
')
The incident has already been reported to the police, which is investigating.

Let me remind you that Orenheimer collected IP of devices connected to the Network from North America and Australia with an open port 9100. You can do something similar without much difficulty using Shodan or masscan services . Further, the material is printed out using a special PostScript file.

#! / bin / bash
for i in `cat printers`
do
cat payload.ps | netcat -q 0 $ i 9100
done

The mailing script consists of just a few lines (plus another file with previously collected IP addresses). Plus, the cracker used the while true line; do killall --older-than 1m netcat; sleep 1; done to remove hung connections.

By the way, Orenheimer announced that he was going to hold a second action in Europe. Maybe he realized the promise?

Source: https://habr.com/ru/post/393265/


All Articles