An anonymous hacker hijacked over 50,000 internet-connected printers worldwide to print out messages promoting the subscription to the PewDiePie YouTube channel. Felix Arvid Ulf Kjellberg, aka PewDiePie, is a popular Swedish Youtuber, comedian, and video game commentator, formerly best known for his Let’s Play commentaries and now mostly known for his comedy and vlogs.
This is the last act of disputed for the “most-subscribed Youtube channel” crown between T-Series and PewDiePie.
The PewDiePie has more than 73 million YouTube subscribers.
Now a hacker with the Twitter account TheHackerGiraffe decided to promote his favourite YouTube channel in his way, he hacked tens of thousands of printers exposed online.
The hacker scanned the Internet for printers with port 9100 open using Shodan and hacked them publishing a message that invited the victims to unsubscribe from T-Series channel and subscribe to PewDiePie instead.
“PewDiePie is in trouble, and he needs your help to defeat T-Series!”
“PewDiePie, the currently most subscribed to channel on YouTube, is at stake of losing his position as the number one position by an Indian company called T-Series that simply uploads videos of Bollywood trailers and campaigns,”
The TheHackerGiraffe used the Printer Exploitation Toolkit (PRET) to compromise vulnerable printers. The PRET is a legitimate developed by researchers from Ruhr-Universität Bochum in Germany for testing purposes.
Don’t forget that every device in your organization that is exposed online enlarges your attack surface.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.