Andrew “Weev” Auernheimer, one of the two men who were prosecuted and convicted for harvesting e-mails and authentication IDs of 114,000 early-adopters of Apple’s iPad from AT&T’s servers, is back to his old tricks: using publicly accessible assets for furthering his own goals. As described in an extensive blog post, he discovered a great number of printers accessible (without authentication) through port 9100 open to the Internet, and fed them a simple Bash script that would instruct them to repeatedly print an anti-Semitic flier sent in the form of a PostScript file. To find these printers he used port scanning software masscan, but noted that the Shodan search engine could be used as well. The contents of the flier point to a neo-Nazi website. Auernheimer didn’t target specific printers, but apparently sent the instruction to every publicly accessible printer in North America.
View full story
ORIGINAL SOURCE: Help Net Security