这家打印机公司给你推送了数月的恶意软件,他们却称之为误报。
`This Printer company served you malware for months, called them false positives

原始链接: https://www.neowin.net/news/this-printer-company-served-you-malware-for-months-and-dismissed-it-as-false-positives/

UV打印机制造商Procolored在其打印机软件中意外分发了恶意软件,这些恶意软件通过U盘和在线下载传播,主要影响过去六个月的用户。YouTube评论员“Serial Hobbyism”首先发现了这个问题,之后网络安全公司G Data也证实了这一点。 恶意软件包括Win32.Backdoor.XRedRAT.A后门程序和更活跃的MSIL.Trojan-Stealer.CoinStealer.H(SnipVex),后者是一种窃取加密货币的剪贴板窃取器和文件感染程序。SnipVex在2024年3月停止活动前,曾窃取了大约10万美元的比特币。 Procolored最初否认了这些报道,但后来承认软件传输过程中可能引入了病毒。他们随后删除并重新扫描了他们的软件,声称提供了干净的版本。 G Data建议受影响软件的用户删除为打印机软件设置的任何杀毒软件排除项,并且由于可能造成广泛的系统文件损坏,建议考虑完全格式化系统并重新安装操作系统。他们没有发现Procolored故意分发恶意软件的证据,Procolored承诺改进内部流程。

Hacker News discusses malware found in Procolored printer drivers. Users highlight the broader issue of hardware vendors treating software as a secondary concern, leading to poor security practices. One commenter pointed out that even open source is not always perfect, printer stacks are a legacy mess, there are vulnerabilities almost every year. Some speculate the malware was unintentionally included due to lax security during software compilation, while others criticize Procolored's dismissal of initial reports. The discussion also touches on the practice of hosting driver downloads on less reputable platforms like mega.co.nz, further eroding trust. A suggested solution to wallet clipjacking is two-factor authentication, the conversation pointed to hardware wallets as a good way to avoid this type of malware. Overall, the thread underscores the need for improved security hygiene in the hardware industry and better user awareness.

原文

Skull and bones image on Procolored printer

If you own a Procolored inkjet printer, particularly one of the UV models, you might want to check your system for malware, especially if you downloaded the companion software within the past six months, since Procolored was recently found to be distributing malicious software.

The first alarm came from Cameron Coward, the creator behind the YouTube channel "Serial Hobbyism." Known for his DIY electronics and tech reviews, Coward was in the middle of reviewing a $6,000 Procolored UV printer and attempting to install its companion software from the included USB drive when his antivirus flagged malware. The threats identified were a USB-spreading worm and a Floxif file infector. When Coward reported the issue to Procolored, the company initially dismissed it as a case of false positives.

Still unconvinced by Procolored's assurances, Coward turned to Reddit in search of expert insight. That post caught the attention of cybersecurity firm G Data, which decided to investigate further. One of their analysts examined Procolored's publicly available software downloads, hosted on mega.nz, and mostly last updated around October 2023.

The investigation confirmed the presence of malware not just on Coward's USB drive but also within official downloads for several printer models. G Data identified two main threats: Win32.Backdoor.XRedRAT.A, a Delphi-based backdoor, and MSIL.Trojan-Stealer.CoinStealer.H, a cryptocurrency stealer written in .NET. Although Floxif didn't appear in the website downloads G Data reviewed, its presence on Coward's USB points to the possibility of a more compromised environment at some earlier stage.

According to G Data, citing an earlier analysis by eSentire, the XRedRAT backdoor is an older strain of malware, and its command and control server URLs were reportedly already offline when eSentire documented them in February 2024. This particular instance also seemed to have been inactive since at least that time. The coin stealer, named "SnipVex" by G Data, is a particularly troublesome threat. It operates as a clipbanker, swapping copied cryptocurrency addresses with one controlled by the attacker, and also functions as a file infector by attaching itself to executable files. Here's the code responsible for replacing Bitcoin addresses in the clipboard with the attacker's:

G Data's research showed that the Bitcoin address linked to SnipVex had received about 9.3 BTC, roughly $100,000, before activity stopped on March 3, 2024. The widespread infection found across Procolored's downloadable files means it's plausible that the malware spread through a developer's workstation or the company's build servers.

After G Data presented its detailed findings, Procolored offered a more substantial response than its initial denial to Coward. The company stated:

The software hosted on our website was initially transferred via USB drives. It is possible that a virus was introduced during this process. Additionally, as the PrintEXP software is in Chinese by default, some international operating systems may incorrectly flag or misinterpret it as malicious, especially if the system does not handle non-English programs well.

Procolored also mentioned that it had temporarily removed all software from its website around May 8th, 2024, for comprehensive scanning and that new, clean software packages were being provided, a claim G Data confirmed by checking the new files.

For customers who might have been affected, G Data recommends checking for any antivirus exclusions made for the printer software, as official vendor software is often trusted implicitly. Because file infectors like Floxif and SnipVex can extensively damage system files, the cybersecurity firm advises that the safest course of action is often a full reformat of all drives and a fresh operating system installation.

Although the XRedRAT backdoor was likely rendered ineffective by its offline command and control server, SnipVex remained a serious concern thanks to its ability to infect files, even though it had stopped siphoning Bitcoin. G Data found no evidence that Procolored had intentionally distributed the malware, and the company has since pledged to improve its internal processes. If you're curious, Coward's review of the Procolored UV printer is available on Hackster.io.

联系我们 contact @ memedata.com