Thousands of printers at risk of denial of service attacks
Attackers can easily manipulate the 9100 port to hijack hardware and steal data, researchers claim
Researchers have highlighted a trio of potential attacks against printers that could allow denial of service, information theft, or botnet compromise.
The collection of attacks, labeled Printjack, appeared in a paper from researchers Giampaolo Bella and Pietro Biondi at the Universit`a di Catania and Istituto di Informatica e Telematica in Italy.
The attacks all focus on the 9100 port, which printers commonly use to accept print jobs. Printers frequently expose this port to the open internet, which can render them vulnerable to attack, the paper warns.
"Raw port 9100 printing is massively used worldwide. For example, we observe that it is the default print method that the Common UNIX Printing System (CUPS) leverages, and that CUPS is vastly used in modern Linux distributions and Apple systems," it said. However, it noted that this didn't seem to be the case on Windows systems.
The researchers noted three possible attacks. These include a 'paper DoS', in which attackers send print jobs in an infinite loop until a printer exhausts its paper supply. This attack is effectively a modern version of an old hack in which attackers send an endless loop of paper to a fax machine. The researchers successfully tested the hack on 20 of their own printers using a 12-line Python script.
Another attack threatens the confidentiality of data sent to a printer across the network. The researchers used the Ettercap network traffic interception suite, along with the Wireshark network traffic analysis tool to analyze printer jobs sent across a network, and found that they were sent in plain text. They speculated that an intruder could launch a man in the middle (MITM) attack and intercept that job, potentially putting confidential information at risk.
RELATED RESOURCE
 
The top three IT pains of the new reality and how to solve them
Driving more resiliency with unified operations and service management
"Because printing is still common practice today, we cannot fully justify why data stored on a server would normally be protected and, by contrast, data sent off for printing would not," they said. They added that this might put companies in violation of the GDPR privacy regulation.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Finally, Bella and Biondi note the possibility of a botnet-style attack in which printers could be compromised en masse, although they did not test this attack in practice. Instead, they pointed to several known vulnerabilities that allow remote code execution.
Using the Shodan IoT search engine to search for printers with open 9100 ports, researchers found the largest percentage in Germany, with the second biggest collection in Russia, closely followed by France.
Danny Bradbury has been a print journalist specialising in technology since 1989 and a freelance writer since 1994. He has written for national publications on both sides of the Atlantic and has won awards for his investigative cybersecurity journalism work and his arts and culture writing.
Danny writes about many different technology issues for audiences ranging from consumers through to software developers and CIOs. He also ghostwrites articles for many C-suite business executives in the technology sector and has worked as a presenter for multiple webinars and podcasts.
- 
What does modern security success look like for financial services?Sponsored As financial institutions grapple with evolving cyber threats, intensifying regulations, and the limitations of ageing IT infrastructure, the need for a resilient and forward-thinking security strategy has never been greater
 - 
Yes, legal AI. But what can you actually do with it? Let’s take a look…Sponsored Legal AI is a knowledge multiplier that can accelerate research, sharpen insights, and organize information, provided legal teams have confidence in its transparent and auditable application
 
- 
Cisco ASA customers urged to take immediate action as NCSC, CISA issue critical vulnerability warningsNews Cisco customers are urged to upgrade and secure systems immediately
 - 
Edge devices are now your weakest link: VPNs, firewalls, and routers were the leading source of initial compromise in 30% of incidents last year – here’s whyNews Compromised network edge devices have rapidly emerged as one of the biggest attack points for small and medium businesses.
 - 
Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to successNews Researchers have warned more than 28 billion IoT devices will need to be secured by 2028 as attacks on connected devices surge.
 - 
Cisco claims new smart switches provide next-level perimeter defenseNews Cisco’s ‘security everywhere’ mantra has just taken on new meaning with the launch of a series of smart network switches.
 - 
Five Eyes cyber agencies issue guidance on edge device vulnerabilitiesNews Cybersecurity agencies including the NCSC and CISA have issued fresh guidance on edge device security.
 - 
T-Mobile security chief insists its defenses stood up to attacks linked to Salt TyphoonNews No T-Mobile customers or services were affected after its security teams detected suspicious activity on their routers
 - 
Securing your network in every direction with zero trustWhitepaper Webinar on the evolution of network security
 - 
Turning your log and incident data into real-time security insightsWhitepaper Integrate multiple data sources for a comprehensive security view
 
