AI-Powered Cyberattacks: How to Detect, Prevent & Defend Against Intelligent Threats

Read Now
We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.

Infected Printer USB Software: A Wake-Up Call for Removable Media Protection

by OPSWAT
Share this Post

Malware Discovered in Printer Software Exposes Removable Media Risks

While attention is focused on ransomware, phishing campaigns, and nation-state threats, often overlooked attack vectors, like USB drives, continue to pose a threat to critical infrastructure. A recent incident involving malware-infected printer software from Procolored is a reminder of the dangers of peripheral and removable media-borne threats.

When Your Printer Becomes a Threat

A recent investigation by G DATA revealed that a malware-infected printer software package was inadvertently distributed by the printer manufacturer, Procolored, via its official site and other associated third-party platforms. The malicious package included a USB-spreading worm, a type of clipbanker malware designed to target crypto wallets, and XRedRAT backdoor, which enables full remote system access.

It is an attack vector that most users would not see coming. What made this incident especially dangerous is that the malware was embedded in a trusted installation software distributed directly by the manufacturer. As a result, anyone using a printer with the exploited software or a USB drive carrying its embedded software is at risk.

Such an infection opens the door for malware to silently spread across systems via USB drives, bypassing traditional network-based defenses, especially in organizations that rely on removable media for device setup or perform data transfer between air-gapped operations. This is not just an isolated incident by a vendor. It highlights a broader, underestimated risk in enterprise environments.

Why USB-Based Attacks Still Work

The 2025 SANS ICS/OT Cybersecurity Budget survey revealed that 15.2% of the initial attack vectors on OT and control systems originate from removable media. While USB-based attacks are not new, they remain highly effective for multiple reasons:

  • Air-gapped and OT systems often rely on USB drives to deliver software updates and patches
  • Users often trust vendor-provided media without validating it
  • Malware can execute automatically or trick users into clicking infected installers
icon quote

The infected printer USB isn’t an isolated case. We can no longer assume that physical media is safe if it’s official. This incident is not just a vendor oversight. If a simple printer driver can compromise an enterprise, imagine what’s possible with more complex attacks. Peripheral and removable media protection is no longer optional; It's foundational.

Headshot of Itay Glick, VP of Products at OPSWAT
Itay Glick
VP of Products, OPSWAT

Effective Solutions to Prevent USB-Based Infections

To defend against risks like the Procolored malware, OPSWAT offers two critical layers of protection:

MetaDefender Kiosk: Secure Removable Media Threats at the Point of Entry 

To defend against USB-based attack vectors, MetaDefender Kiosk™ acts as a physical scanning station to safeguard organizations’ assets. It integrates with proven, industry-leading solutions and technologies to sanitize data before entering critical environments. Combined with solutions like MetaDefender Managed File Transfer™ and MetaDefender Media Firewall™, other layers of defense can be added to help with safe file transfers and scan policy enforcement.

MetaDefender Endpoint: Pre-Run Protection and Device Control

MetaDefender Endpoint™ protects devices inside critical OT networks from peripheral and removable media threats by blocking all removable media usage until security conditions are met. Once a scan is complete and the scanned media is considered safe to use, the user can proceed to access the files within. This process was proven to protect files and data from known, unknown, and AI-generated threats.

Industry-Leading Core Technologies

Both MetaDefender Kiosk and MetaDefender Endpoint utilize proven, globally trusted technologies, like MetaScan™ Multiscanning, that reaches a 99.2% malware detection rate with 30+ anti-malware engines. They also employ the Deep CDR™ technology to proactively remove malicious content from files and regenerate safe, usable versions. Along with performing vulnerability assessments to identify known software flaws in removable media and a robust sensitive data leak protection, both solutions provide deep, multi-layered defense IT/OT networks against peripheral and removable media threats.

icon quote

At OPSWAT, our philosophy is simple: trust no file, trust no device. Even vendor-supplied media can become a threat. That’s why we focus on enforcing security policies at the point of entry, scanning all peripheral and removable media, inspecting every file, and securing every endpoint.

Headshot of Itay Glick, VP of Products at OPSWAT
Itay Glick
VP of Products, OPSWAT

Final Thoughts

The Procolored incident shows that USB-embedded software, even when provided by trusted vendors, can be compromised. Software obtained through official channels can double the impact caused by other malware.

To see how OPSWAT can help protect your organization against downloaded and media-borne threats, even if it comes from a trusted vendor such as the Procolored malware, book a demo today.

Stay Up-to-Date With OPSWAT!

Sign up today to receive the latest company updates, stories, event info, and more.