Not a day goes by that I don’t see some sort of scam or attack. Awareness of the latest scams it key to staying safe — here are some new scams you should be aware of.
The latest in ransomware techniques is to target vulnerable printers inside networks. As noted in a recent article, the attack takes advantage of a network if port 9100 is open. While in a small network behind a router provided by your Internet Service provider, the chances are small that port 9100 will be open if you’d like to make sure you can perform the following steps.
From a computer inside your network go to the ShieldsUP website.
- Click on proceed to begin the process
- In the box, enter 9100
- Click on user specified custom port probe
The test will indicate if the port is open or closed. Chances are very good that the port will be closed. If so, you will not be at risk to this attack from external sources. However, I have seen several firms impacted by this attack because the malware entered into the network into a workstation and was able to attack vulnerable printers. In one case it was an email attachment that had been opened up to inject the malware into the network.
It would be wise to investigate if there is a firmware update for the printer you have. You will need to visit the manufacturer’s web site and see if they have provided updated firmware for your device. If there is no firmware update and you are still concerned about risks of printer based attacks, just be vigilant in your normal anti malware processes.
Malware Gets Personal With Emails
The other day, every single user in my network received a scam email. It appeared to be from DocuSign, a company that we use to be able to sign documents. The email was sent from email@example.com. That one additional letter was hard to spot. The intent of the attack was to get our email addresses and credentials.