Monday, November 25, 2024
HomeCyber Security NewsHackers Hijack Anycubic 3D Printers to Display Warning Messages

Hackers Hijack Anycubic 3D Printers to Display Warning Messages

Published on

Anycubic 3D printer owners have been caught off guard by a series of unauthorized messages warning them of a critical security flaw.

The incident has raised concerns about the safety of internet-connected devices and the potential for exploitation.

You can analyze a malware file, network, module, and registry activity with the ANY.RUN malware sandbox and the Threat Intelligence Lookup that will let you interact with the OS directly from the browser.

- Advertisement - SIEM as a Service

Reddit Reports of Hacked Anycubic 3D Printers

Users on Reddit began reporting unusual activity on their Anycubic 3D printers, with many finding a text file named “hacked_machine_readme” unexpectedly appearing on their devices. 

This file contained a message alerting them to a “critical vulnerability” and advising immediate action to prevent potential exploitation.

Techcrunch has recently released an article to show that Anycubic customers are reporting that their 3D printers have been hacked and now display a message warning of an alleged security flaw in the company’s systems.

Content of the Hacked_machine_readme File

The message within the text file was clear and alarming: “Your machine has a critical vulnerability, posing a significant threat to your security.

Immediate action is strongly advised to prevent potential exploitation”. It also suggested that users disconnect their printers from the internet to avoid being hacked.

The vulnerability mentioned pertains to Anycubic’s MQTT service, a messaging protocol used for device communication.

The text file claimed this service could be exploited to “connect and control” customer 3D printers remotely.

In light of these events, the text file urged users to disconnect their printers from the internet until Anycubic addresses the issue.

The broader community echoed this advice as users shared their experiences and recommendations on various forums.

Company Response

At the time of the reports, Anycubic’s app was down, and users attempting to log in were met with a “network unavailable” error message. 

Anycubic’s representative, James Ouyang, acknowledged the situation, stating, “We are investigating very carefully. There will be an official announcement very soon,” but did not provide further details.

The individual behind the text file claimed the message had been sent to 2.9 million Anycubic 3D printers3. 

This figure is significant, considering Anycubic’s reported cumulative sales of 3 million printers, as mentioned by James Ouyang in a previous interview.

Implications for Anycubic and Its Users

This hacking incident not only exposes potential security risks for Anycubic’s products but also puts the company’s reputation on the line.

Users are now waiting for a comprehensive response from Anycubic and a resolution to the vulnerability that has put their devices at risk.

Hacking Anycubic 3D printers is a stark reminder of the vulnerabilities inherent in internet-connected devices.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are incredibly harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...