<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Fax attack! in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Fax-attack/m-p/13571#M1413</link>
    <description>&lt;P&gt;Reminds me of a proof of concept I read&amp;nbsp;once where copy machines were exploited through a poorly secured process that was designed to send maintenance and supply information to the vendor.&amp;nbsp; The technical details were interesting but I found&amp;nbsp;the scenario business case interesting as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Company X and Company Y are in competition for a lucrative contract.&amp;nbsp; Both have proposals to the potential customer in the near future.&amp;nbsp; Y exploits the vulnerability in X's copy machine weeks prior to the proposal and programs it to&amp;nbsp;secretly forward digital&amp;nbsp;copies of whatever is scanned by X's machine to Y's proposal development team as valuable intelligence.&amp;nbsp; Then, to further sabotage their victim, Y inserts&amp;nbsp;code to cause X's machine to overheat, begin smoking,&amp;nbsp;and set off the fire sprinklers thereby causing X to miss&amp;nbsp;their proposal.&lt;/P&gt;</description>
    <pubDate>Tue, 14 Aug 2018 02:17:20 GMT</pubDate>
    <dc:creator>DAlexander</dc:creator>
    <dc:date>2018-08-14T02:17:20Z</dc:date>
    <item>
      <title>Fax attack!</title>
      <link>https://community.isc2.org/t5/Industry-News/Fax-attack/m-p/13561#M1411</link>
      <description>&lt;P&gt;When I was doing virus research we were forever getting reports of malware hidden in graphics files.&amp;nbsp; Aside from the fact that it is trivially easy to embed &lt;STRONG&gt;anything&lt;/STRONG&gt; in a Microsoft OLE format file, we generally found that such reports were unfounded: it's just not that easy to put malware into graphics.&amp;nbsp; (Not impossible, mind, just not that easy.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(After a while we tended to file such reports along with &lt;A href="https://blogs.securiteam.com/index.php/archives/2030" target="_blank"&gt;hoax viruses&lt;/A&gt; and &lt;A href="http://catless.ncl.ac.uk/Risks/6.23.html#subj3.1" target="_blank"&gt;metaviruses&lt;/A&gt;.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And, lots of people have had &lt;A href="https://community.isc2.org/t5/Industry-News/Digital-Faxing-amp-Protecting-Data/m-p/10502#M948" target="_blank"&gt;questions about faxes&lt;/A&gt; over time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Turns out that a combination of poor fax protocols (made at a time when fax machines had no other functions) plus the implementation of fax into machines that are computerized mean that you can now craft &lt;A href="https://www.bbc.com/news/technology-45083774" target="_blank"&gt;malicious fax transmissions that will compromise a fax machine&lt;/A&gt;.&amp;nbsp; And, possibly, the network to which it is connected.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 08:53:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Fax-attack/m-p/13561#M1411</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2023-10-09T08:53:50Z</dc:date>
    </item>
    <item>
      <title>Re: Fax attack!</title>
      <link>https://community.isc2.org/t5/Industry-News/Fax-attack/m-p/13571#M1413</link>
      <description>&lt;P&gt;Reminds me of a proof of concept I read&amp;nbsp;once where copy machines were exploited through a poorly secured process that was designed to send maintenance and supply information to the vendor.&amp;nbsp; The technical details were interesting but I found&amp;nbsp;the scenario business case interesting as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Company X and Company Y are in competition for a lucrative contract.&amp;nbsp; Both have proposals to the potential customer in the near future.&amp;nbsp; Y exploits the vulnerability in X's copy machine weeks prior to the proposal and programs it to&amp;nbsp;secretly forward digital&amp;nbsp;copies of whatever is scanned by X's machine to Y's proposal development team as valuable intelligence.&amp;nbsp; Then, to further sabotage their victim, Y inserts&amp;nbsp;code to cause X's machine to overheat, begin smoking,&amp;nbsp;and set off the fire sprinklers thereby causing X to miss&amp;nbsp;their proposal.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Aug 2018 02:17:20 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Fax-attack/m-p/13571#M1413</guid>
      <dc:creator>DAlexander</dc:creator>
      <dc:date>2018-08-14T02:17:20Z</dc:date>
    </item>
    <item>
      <title>Re: Fax attack!</title>
      <link>https://community.isc2.org/t5/Industry-News/Fax-attack/m-p/13580#M1414</link>
      <description>&lt;P&gt;It is very relevant subject indeed:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://faxauthority.com/glossary/black-fax/" target="_blank"&gt;https://faxauthority.com/glossary/black-fax/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.theinquirer.net/inquirer/news/3061034/fax-machine-flaw-leaves-tens-of-millions-of-devices-open-to-attack" target="_blank"&gt;https://www.theinquirer.net/inquirer/news/3061034/fax-machine-flaw-leaves-tens-of-millions-of-devices-open-to-attack&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.computerweekly.com/news/252446742/Millions-of-businesses-vulnerable-to-fax-based-cyber-attack" target="_blank"&gt;https://www.computerweekly.com/news/252446742/Millions-of-businesses-vulnerable-to-fax-based-cyber-attack&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.bbc.com/news/technology-45083774" target="_blank"&gt;https://www.bbc.com/news/technology-45083774&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A very interesting subject, has it been proven in the field or it just a Black Hat conference item?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regareds&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Aug 2018 07:12:26 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Fax-attack/m-p/13580#M1414</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-08-14T07:12:26Z</dc:date>
    </item>
    <item>
      <title>Re: Fax attack!</title>
      <link>https://community.isc2.org/t5/Industry-News/Fax-attack/m-p/13757#M1441</link>
      <description>&lt;P&gt;Additional information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://blog.checkpoint.com/2018/08/12/faxploit-hp-printer-fax-exploit/?utm_source=newsletter&amp;amp;utm_medium=email&amp;amp;utm_campaign=cpnewsletter-18q3-8-15&amp;amp;utm_content=18q3-8-15-faxploitblog&amp;amp;mkt_tok=eyJpIjoiTWpRd1ltRTJOemswWlRobCIsInQiOiJiQnJDeVlUV0l6NTRWRE9CQWFWV2RPY09SS1dhbTVyU1wvbjZYSFEzQUFtMTRiVkdLOWt5ZTBEVUtpXC8wT1VCTzhOY3VmSitBWUhMNnZCd1wvUEtyempBXC9uT3ZoMFwvR01kY0RhYmR3Kzg0d0ZJcjJBWkdtNU5oOEtBdjc0Q1VySjRtIn0%3D" target="_blank"&gt;https://blog.checkpoint.com/2018/08/12/faxploit-hp-printer-fax-exploit/?utm_source=newsletter&amp;amp;utm_medium=email&amp;amp;utm_campaign=cpnewsletter-18q3-8-15&amp;amp;utm_content=18q3-8-15-faxploitblog&amp;amp;mkt_tok=eyJpIjoiTWpRd1ltRTJOemswWlRobCIsInQiOiJiQnJDeVlUV0l6NTRWRE9CQWFWV2RPY09SS1dhbTVyU1wvbjZYSFEzQUFtMTRiVkdLOWt5ZTBEVUtpXC8wT1VCTzhOY3VmSitBWUhMNnZCd1wvUEtyempBXC9uT3ZoMFwvR01kY0RhYmR3Kzg0d0ZJcjJBWkdtNU5oOEtBdjc0Q1VySjRtIn0%3D&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interesting read, a bit like Bruce Schneier's law:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"The term Schneier's law was coined by Cory Doctorow in a 2004 speech.&amp;nbsp; The law is phrased as:&lt;BR /&gt;Any person can invent a security system so clever that he or she can't imagine a way of breaking it. "&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Thu, 16 Aug 2018 20:59:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Fax-attack/m-p/13757#M1441</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-08-16T20:59:50Z</dc:date>
    </item>
  </channel>
</rss>

