Saturday, January 11, 2025
HomeCyber Security NewsHackers Hijack Anycubic 3D Printers to Display Warning Messages

Hackers Hijack Anycubic 3D Printers to Display Warning Messages

Published on

Anycubic 3D printer owners have been caught off guard by a series of unauthorized messages warning them of a critical security flaw.

The incident has raised concerns about the safety of internet-connected devices and the potential for exploitation.

You can analyze a malware file, network, module, and registry activity with the ANY.RUN malware sandbox and the Threat Intelligence Lookup that will let you interact with the OS directly from the browser.

Reddit Reports of Hacked Anycubic 3D Printers

Users on Reddit began reporting unusual activity on their Anycubic 3D printers, with many finding a text file named “hacked_machine_readme” unexpectedly appearing on their devices. 

This file contained a message alerting them to a “critical vulnerability” and advising immediate action to prevent potential exploitation.

Techcrunch has recently released an article to show that Anycubic customers are reporting that their 3D printers have been hacked and now display a message warning of an alleged security flaw in the company’s systems.

Content of the Hacked_machine_readme File

The message within the text file was clear and alarming: “Your machine has a critical vulnerability, posing a significant threat to your security.

Immediate action is strongly advised to prevent potential exploitation”. It also suggested that users disconnect their printers from the internet to avoid being hacked.

The vulnerability mentioned pertains to Anycubic’s MQTT service, a messaging protocol used for device communication.

The text file claimed this service could be exploited to “connect and control” customer 3D printers remotely.

In light of these events, the text file urged users to disconnect their printers from the internet until Anycubic addresses the issue.

The broader community echoed this advice as users shared their experiences and recommendations on various forums.

Company Response

At the time of the reports, Anycubic’s app was down, and users attempting to log in were met with a “network unavailable” error message. 

Anycubic’s representative, James Ouyang, acknowledged the situation, stating, “We are investigating very carefully. There will be an official announcement very soon,” but did not provide further details.

The individual behind the text file claimed the message had been sent to 2.9 million Anycubic 3D printers3. 

This figure is significant, considering Anycubic’s reported cumulative sales of 3 million printers, as mentioned by James Ouyang in a previous interview.

Implications for Anycubic and Its Users

This hacking incident not only exposes potential security risks for Anycubic’s products but also puts the company’s reputation on the line.

Users are now waiting for a comprehensive response from Anycubic and a resolution to the vulnerability that has put their devices at risk.

Hacking Anycubic 3D printers is a stark reminder of the vulnerabilities inherent in internet-connected devices.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are incredibly harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the...

Weaponized LDAP Exploit Deploys Information-Stealing Malware

Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake...

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files

A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has...

Hackers Targeting Users Who Lodged Complaints On Government portal To Steal Credit Card Data

Fraudsters in the Middle East are exploiting a vulnerability in the government services portal....

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the...

Weaponized LDAP Exploit Deploys Information-Stealing Malware

Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake...

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files

A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has...