1. Moscone West 2009

This session will show how attackers can exploit the light sensitivity of a multifunction printer for infiltrating commands to a malware installed on an isolated organization. It will demonstrate the attack on a real organization using (1) a laser attached to a tripod stand; (2) a laser carried by a drone; and (3) a hijacked smart bulb.

Download pdf
  • Ben Nassi