Check out the on-demand sessions from the Low-Code/No-Code Summit to learn how to successfully innovate and achieve efficiency by upskilling and scaling citizen developers. Watch now.

Check Point Research has shown that hackers can infiltrate any home or corporate network by exploiting weaknesses in all-in-one printer fax machines.

Dubbed the Faxploit, the attack can be carried out using only a fax number, according to a paper Check Point presented at the Defcon hacker event in Las Vegas today.

The team used an HP all-in-one printer fax machine as the test case, and close cooperation with the company ensured a patch for the vulnerability was provided for HP’s products. But similar attacks could apply to other vendors, as the vulnerability lies in the fax protocol itself.

Check Point researchers illustrated how organizations of all sizes, as well as consumers, could be exposed to infiltration by hackers looking to exploit vulnerabilities in fax machine communication protocols. The scary thing is that fax numbers, the only thing needed to carry out the attack, are readily available in public on business cards or websites.


Intelligent Security Summit

Learn the critical role of AI & ML in cybersecurity and industry specific case studies on December 8. Register for your free pass today.

Register Now

While fax machines were once standalone devices, the machines of today are typically connected devices that combine fax, printer, and photocopier. And almost every company has them. By exploiting vulnerabilities inherent in the fax protocol, the researchers were able to gain access to an entire IT network.

Popular online fax services, such as fax2email, are using the same protocol, which means the vulnerability may apply to them as well.

The researchers said that if you penetrate a single access point on a network you can compromise everything connected to it via “lateral movement.” The attacker hops from one part of the network to the next within seconds, as illustrated at the top of the story.

Above: Cheesy hacker photograph

Image Credit: GlebStock/Shutterstock

This means networks that are not connected to the internet are also vulnerable. Attackers could steal documents and do other damage, such as stealing a customer’s account number from a document.

Check Point said there are around 46.3 million fax machines still in use, with 17 million of them in the U.S. alone. Surprisingly, some countries, like Japan, have a particular affinity for the fax machine, with 100 percent of its businesses and 45 percent of private homes still owning a fax machine.

The health care industry, governed by HIPAA regulations, is still a big player when it comes to sending faxes and is the main customer behind worldwide fax sales. In addition, the legal Industry argues that fax machines offer legal professionals convenience when sending documents to clients and getting confirmation that the message was received.

So while the use of fax machines has radically subsided over the last 15 years, due to the rise of email and other electronic communication applications, it is still very much the norm for the many industries that consider it a more secure or legally binding form of doing business.

To protect against attacks, Check Point recommends segmenting your network, which sadly negates the advantage of networking fax machines and other devices together.

“It is a policy that should be implemented to minimize the level of access to sensitive information for those applications, servers, and people who don’t need it, while enabling access for those that do,” Check Point said. “Once unauthorized access is gained, network segmentation can provide effective measures to mitigate the next stage of intrusion into a network and limit the spread of the attack by lateral movement across it.”

Check Point also suggests you regularly patch your fax devices.

VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Discover our Briefings.