Anon on Nostr: I’m not particularly tech savvy and am unfamiliar with Linux but, if I understand ...
I’m not particularly tech savvy and am unfamiliar with Linux but, if I understand the article correctly, wouldn’t you have to (1) expose print services directly to the Internet and (2) wait for a server operator to intentionally try and send a job to the newly created bogus printer (which he doesn’t even know exists) in order to execute the malicious payload? Seems like pretty low probability of being able to pull that off without an insider on the victim’s network to cooperate, no? Not impossible, of course. But seems like the attacker would have to be pretty lucky.
Published at
2024-09-27 00:05:07Event JSON
{
"id": "54e6a8e679c65e2df81b924bf0fe08ab3661006f1f930f259d32ec7587a7caf4",
"pubkey": "b5424c8ecb75bb282679cd0d5cb09a879153e61753bbe929a7a64ca45c3cd534",
"created_at": 1727395507,
"kind": 1,
"tags": [
[
"e",
"6b8d12d03099b1191bf337d7316800c2bd4cd1ae4a0f9571dd9abaf389f6c9f1",
"",
"root"
],
[
"p",
"ac3f6afe17593f61810513dac9a1e544e87b9ce91b27d37b88ec58fbaa9014aa"
]
],
"content": "I’m not particularly tech savvy and am unfamiliar with Linux but, if I understand the article correctly, wouldn’t you have to (1) expose print services directly to the Internet and (2) wait for a server operator to intentionally try and send a job to the newly created bogus printer (which he doesn’t even know exists) in order to execute the malicious payload? Seems like pretty low probability of being able to pull that off without an insider on the victim’s network to cooperate, no? Not impossible, of course. But seems like the attacker would have to be pretty lucky.",
"sig": "5aa084547024053dd886698b8d5c027930dd86bf0519ea78da230cb2dafd6fbc50b77f180d9224429f9a9aa58e12bcc23779010995ac773f7590a1057ec484df"
}