Aside from the coffee maker and the office water cooler, few devices receive the magnitude of use that the corporate printer is subjected to on a daily basis. This is because these machines function way beyond the boundaries of a simple printer; in fact, they're commonly used to scan and copy pages and can even be called upon to send emails of scans as an easy way to receive PDF versions of documents.
In this Threat Spotlight, we take a look at how criminals are using common spoofing techniques to launch attacks containing malicious attachments that appear to be coming from your network printer. The attackers have chosen PDF generating devices because PDF files can be weaponized to deliver active contents which can be harmful to users. Receiving a PDF attachment in an email sent by a printer is so commonplace that many users assume the document is completely safe. From a social engineering perspective, this is exactly the response that the cybercriminals want.These attacks spoof your network printer and deliver weaponized pdf files to your inboxes. Click To Tweet