top of page

3 Trojan Horses that Target Network Printers: Protecting Your Devices from Malware Attacks

Printers are essential to any modern office, but they can also be vulnerable to malware attacks, including Trojan horses. Trojan horses are malware that disguises itself as legitimate software, but once installed on a computer or networked device, it can give hackers unauthorized access to the system.

In this blog, we'll take a look at the top three Trojan horses that have been known to target networked printers.


CrossRAT is a notorious Trojan horse that was discovered in 2017. It targets various platforms, including Windows, Linux, and Mac OS, and it can spread to printers and other networked devices.

Once installed on a printer, CrossRAT can give hackers access to sensitive information, including passwords and other credentials, allowing them to execute code and take control of the printer remotely.


LoJax is a Trojan horse that was discovered in 2018. It's known for its persistence, as it can survive even if the infected device is wiped or reformatted. LoJax can infect printers and other networked devices, allowing hackers to steal data, including sensitive company information.


GPlayed is a Trojan horse that was discovered in 2019. It targets Android devices, including printers that run on the Android operating system. Once installed on a printer, GPlayed can give hackers access to the printer's administrative features, including the ability to add or remove users, install additional malware, and even lock the printer's screen.


Protecting your networked printers from Trojan horse attacks requires a combination of strategies, including regular software updates, strong passwords, and user training. It's also important to work with trusted vendors who prioritize security and offer solutions designed to protect against malware attacks on printers and other IoT devices.

By taking a proactive approach to security, you can help protect your organization's sensitive information and keep your printers and other networked devices safe from Trojan horses and other malware attacks.

Recent Posts

See All


bottom of page