Fax machines, very much still a thing, can be used as an entry point into an enterprise’s IT network, according to new research from Israeli cybersecurity company Check Point. In a report released Monday, Check Point details an exploit whereby an attacker can infiltrate using only a fax number associated with a machine on a target network. Attacks can then move across a network, even if it’s not connected to the internet, according to the report. As demonstrated by Check Point in the video below, the hacker can execute script that targets the victim’s fax number in order to obtain network access. The attacker can then use EternalBlue, a NSA-developed exploit leaked by the Shadow Brokers hacker group, to further infiltrate the network and execute malware. In Check Point’s video, the hacker uses malware to locate a file on the victim network and send it back to the hacker’s fax […]
The post Report: ‘Faxploit’ hack can penetrate networks with just a fax number appeared first on Cyberscoop.
Continue reading Report: ‘Faxploit’ hack can penetrate networks with just a fax number→