Multiple Vulnerabilities and Mitigation Methods bulletin# 12782

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • minoltaed
    Service Manager
    • Aug 2009
    • 44

    #1

    Multiple Vulnerabilities and Mitigation Methods bulletin# 12782

    Has anyone started updating the Konica Minolta equipment from the attached bulletin? If so how are you tackling it. Any issues or struggles? Just want to see how other dealers are approaching this bulletin. 12782.pdf
  • Synthohol
    Certified Konica Expert

    Site Contributor
    5,000+ Posts
    • Mar 2016
    • 5793

    #2
    Re: Multiple Vulnerabilities and Mitigation Methods bulletin# 12782

    Never saw or heard of a copier being hacked before.
    We know a thing or two because we've seen a thing or two.
    The medication helps though...

    Comment

    • tech51
      Senior Tech

      500+ Posts
      • Jan 2009
      • 846

      #3
      Re: Multiple Vulnerabilities and Mitigation Methods bulletin# 12782

      Originally posted by Synthohol
      Never saw or heard of a copier being hacked before.

      Comment

      • Synthohol
        Certified Konica Expert

        Site Contributor
        5,000+ Posts
        • Mar 2016
        • 5793

        #4
        Re: Multiple Vulnerabilities and Mitigation Methods bulletin# 12782

        its just all so unnecessary.
        if you really care turn on DoD data overwrite.
        We know a thing or two because we've seen a thing or two.
        The medication helps though...

        Comment

        • femaster
          Service Manager

          1,000+ Posts
          • May 2011
          • 1477

          #5
          Re: Multiple Vulnerabilities and Mitigation Methods bulletin# 12782

          Originally posted by Synthohol
          its just all so unnecessary.
          if you really care turn on DoD data overwrite.
          It's not necessarily the copier, or the data on it, they are after. Generally hackers look for any type of device that can be exploited, which gives them a way into the entire network. Once they have something they can exploit, then they use that as a means to go after the big stuff like the local servers, etc.

          Things like that are also why the best security advice at home is to keep all your IOT (Internet of Things ["smart"]) devices off your main home network and on their own separate network (like a guest network). Those "smart" devices in people's homes are almost never updated, and can be a backdoor into anything in your home network. It only takes one little thing (smart bulb, outlet, WiFi camera, etc.) to compromise everything you have...
          A Ricoh Service Tech for 7 year. A Konica Minolta Service Tech for 7 years. Now, KM service manager for 4 years.
          My Ricoh knowledge is slowly dwindling away at this point. Many things have been lost to time...

          Comment

          • Drivee
            Trusted Tech

            250+ Posts
            • Nov 2020
            • 322

            #6
            Re: Multiple Vulnerabilities and Mitigation Methods bulletin# 12782

            Today, most of hack attacks are trough pritner/copyie network. It start before 3 year. Read news.

            Comment

            • Gift
              Service Manager

              1,000+ Posts
              • Mar 2011
              • 2458

              #7
              Re: Multiple Vulnerabilities and Mitigation Methods bulletin# 12782

              Originally posted by Synthohol
              its just all so unnecessary.
              if you really care turn on DoD data overwrite.
              That's not possible for i-series thanks to nVME/solid state storage. I think the initial user manuals stll contained the possibility for that but this as bad copy&paste work. he recent manuals only offers a complet data erase in admin menu you can run as customer before returning an MFP.

              Solid state drives don't like high counts of write processes and thanks to wear leveling algorythms they do not really work with a static file system internally.

              You can still encrypt your data of course.

              Comment

              • junior
                Technician
                • Sep 2008
                • 13

                #8
                Re: Multiple Vulnerabilities and Mitigation Methods bulletin# 12782

                same thoughts, If they are getting to the copier multiple layers of security have already been breached.

                Comment

                Working...