Threat Spotlight: Clever Cybercriminals Spoof Scanners by the Millions
In this Threat Spotlight, we take a look at how criminals are using common spoofing techniques to launch attacks containing malicious attachments that appear to be coming from your network printer. The attackers have chosen PDF generating devices because PDF files can be weaponized to deliver active contents which can be harmful to users. Receiving a PDF attachment in an email sent by a printer is so commonplace that many users assume the document is completely safe. From a social engineering perspective, this is exactly the response that the cybercriminals want.