“The Blaster worm hit McCormick and Co. hard and fast. It entered the famous spice company through a service provider connection and ripped across plants and offices in a matter of hours. What was most vexing, however, was that the virus kept coming back on disinfected network segments.Upon further investigation, it turned out that Blaster, as well as some instances of the Sasser worm, were trying to repropagate from infected network printers.” ?Printers were just one of several types of systems contributing to the nightmare at the time,? says Michael Rossman, who?d just taken over as global director of IT services and information security at McCormick at the time of the worm outbreak in 2003. ?Blaster went to all our PCs, our radio frequency units, our handhelds. And, we learned belatedly, it also spread to our printers.?Blaster and Sasser gave IT execs some religion about the vulnerabilities network printers can introduce to corporate networks, Rossman says. Since then, however, there has been little evidence of printer-based attacks spreading across large networks. Corporate IT shops haven?t been concerned about printer security. Instead of patching and hardening printers, they have been complacent. Security experts say that printers are loaded with more complex applications than ever, running every vulnerable service imaginable, with little or no risk management or oversight.If these systems aren?t hardened, users may soon find their printers rendered inaccessible by attackers, their valuable documents heisted or their printers turned into remote-controlled bots ? launching pads for further attacks.
Read more at: ComputerWorld Security
Yes, networked printers can be your weak link…
Scary isn’t it?
The ultimate solution is to turn the printer off when you don’t need it. Make sure that if you share a printer on a network to allow another computer to print something, undo the share once it is no longer needed.