Identifying and Protecting Yourself from the ‘Funtenna’ Exploit
When you think of endpoint devices, you immediately picture desktop computers, laptops, smartphones and tablets. It’s easy to forget that network-connected printers are, in fact, primary network devices that require appropriate endpoint security. As printer capabilities increase, they become even more accessible, creating new vulnerabilities where bad actors can hijack your sensitive data.
From 2006 to 2016, the average organizational cost of business security breaches in the United States amounted to 7.01 million U.S. dollars. As depicted in Figure 1, below, the likelihood of enterprises experiencing a breach has increased over the past three years.
Part of the problem, according to a 2015 Ponemon Institute study and relayed by SC Media[BD1] , 56% of enterprises ignore printers in their endpoint security strategies, despite 64% of IT managers believing their printers are likely already infected with malware. Another recent survey conducted by Spiceworks reveals that only 18 percent of IT professionals don’t consider printers to be a medium or high risk for malware or breaches. In reality, printers are a tempting gateway for threats such as Funtenna.
How does Funtenna work?
Funtenna was developed by Ang Cui of Red Balloon Security calling on the roots of radio-based espionage employed in the Cold War. The exploit was introduced at the Black Hat Conference in 2015. It only takes seven lines of code to transform a laser printer into a backchannel radio device that transmits data without using the company’s Wi-Fi or Bluetooth infrastructure. Using the UART output with a 10-foot cable enabled the hacker to transmit data in a virtually undetectable fashion from inside a building with concrete walls to a receiver on the outside.
Cui noted at the conference that the same kind of exploit could be launched from Internet of Things (IoT) devices, from your HVAC to your automated lights to your internet-connected fridge.
HP printers help defeat Funtenna.
Simply put, the range and scope of Funtenna make it functionally impossible to track on a proactive basis. So how can you protect yourself? Cui makes it clear that the only real defense against Funtenna is for every single internet-connected device to carry on-board security. When you evaluate IoT devices for your business and your home, make sure to ask about or research embedded security.
When it comes to business printers, HP printers have you covered. HP LaserJet and PageWide Enterprise Printers have impressive built-in security to combat an array of exploits, making them the world’s most secure business printers¹.
- HP Sure Start validates the integrity of the BIOS code. If the BIOS code has been changed or compromised, the printer reboots with the last good ‘golden’ copy of the BIOS.
- Whitelisting compares the firmware of the printer during startup to a list of known-good firmware that’s been digitally signed by HP.
- Run-time intrusion detection monitors complex firmware and memory operations, rebooting the printer if any anomalies are detected.
These features deliver the industry’s deepest printer security1 and the best way to protect your data from malicious exploits like Funtenna. This is not a problem that’s going away, either. More recently, a hacker exploited a vulnerability that found many printers exposed to the internet through port 9100. He then used that exposure to print anti-Semitic fliers to workplaces and homes across North America using a simple Bash script.
Printers are endpoints that need to be secured. Learn more about how you can combat data threats by reading this e-book, your guide to successfully protecting your printer fleet.