{"id":1235,"date":"2020-06-02T14:42:28","date_gmt":"2020-06-02T14:42:28","guid":{"rendered":"https:\/\/efaxstg.wpengine.com\/uk\/?p=1235"},"modified":"2023-03-17T21:33:10","modified_gmt":"2023-03-17T21:33:10","slug":"fax-machine-exploit","status":"publish","type":"post","link":"https:\/\/ww2.efax.com\/uk\/blog\/fax-machine-exploit","title":{"rendered":"Can Fax Machines Be Hacked and What Is Faxploit"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1235\" class=\"elementor elementor-1235\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b44141b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b44141b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d557321\" data-id=\"d557321\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-595b560 elementor-widget elementor-widget-text-editor\" data-id=\"595b560\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>There are very few\u00a0<a href=\"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-threats-to-businesses\">cyber security<\/a>\u00a0scandals that caught the headlines like the\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Sony_Pictures_hack\" target=\"_blank\" rel=\"noopener\">Sony Pictures Hack<\/a>. Thousands of documents were stolen and displayed online, including emails and messages between executives. In the wake of the hacks, Sony\u2019s management team sought a way to avoid the vulnerabilities of email that caused such great problems. The result was they\u00a0<a href=\"https:\/\/www.businessinsider.com\/sony-execs-use-fax-machines-after-hack-wiped-out-email-2014-12?r=US&amp;IR=T\" target=\"_blank\" rel=\"noopener\">turned to fax machines<\/a>.<\/p><p>While Sony might have been alone in the scale of the security attacks against them, they were not alone looking for ways to protect their data from hackers and thieves. With data protection becoming more and more important to businesses, and the vulnerabilities of platforms like email becoming more and more obvious, companies are starting to seek other ways of protecting their data, and that has led them to fax.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3bc004b\" data-id=\"3bc004b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a1f4657 elementor-widget elementor-widget-image\" data-id=\"a1f4657\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"333\" src=\"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/fax-machine-exploit.jpeg\" class=\"attachment-large size-large wp-image-1255\" alt=\"Front close up inside of a office copier machine.\" srcset=\"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/fax-machine-exploit.jpeg 500w, https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/fax-machine-exploit-300x200.jpeg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d18762 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"5d18762\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/uk\/signup\/pricing\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">eFax Free Trial <\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f77dae8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f77dae8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e64b5df\" data-id=\"e64b5df\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1f54ae4 elementor-widget elementor-widget-heading\" data-id=\"1f54ae4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What Makes People Convinced Fax Machines Are Safe?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-169e1a1 elementor-widget elementor-widget-text-editor\" data-id=\"169e1a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The concern about email comes from its access to the internet, and how hackers can access accounts that should be protected. The technology is also widespread, which means it\u2019s well-known to many hackers, with a near-endless volume of attempts to find weaknesses to take advantage of.<\/p><p>Fax machines, however, are old-fashioned pieces of technology not connected to the internet in the same way. They are analogue devices that transmit data through phone lines instead of over the internet. Fax machines have also fallen out of favour, which means they don\u2019t provide the same value to hackers, resulting in the hardware falling under the radar.<\/p><p>Fax machines are essential \u201coff-the-grid\u201d devices that can safely transfer sensitive data. At least, that is the theory.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-321284d elementor-widget elementor-widget-heading\" data-id=\"321284d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Can Fax Machines Be Hacked?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-255c283 elementor-widget elementor-widget-text-editor\" data-id=\"255c283\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Yes, fax machines can be hacked \u2014 well, kind of.<\/p><p>Fax machines are digital devices, which means they have programmable computer elements that can be manipulated by external sources. However, there is a major difference between fax machines and emails, resulting in a misconception that they are safe for data transmission. You cannot hack into a fax machine and access what\u2019s on it like you can an email. The fax machine as a unit is not what is vulnerable to hackers. Instead, it\u2019s those pieces of technology connected to it that are hackable.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3330d8 elementor-widget elementor-widget-heading\" data-id=\"c3330d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What Hacking Threats Are Fax Machines Vulnerable To?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-401ce77 elementor-widget elementor-widget-text-editor\" data-id=\"401ce77\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThere are two major hacking threats not often considered by those who use fax machines as a method of increasing security:\n<ul style=\"padding:15px 0 0 0;\">\n \t<li><strong>Interception<\/strong>\u00a0\u2014 It\u2019s true that while on a fax machine, your data is secure. Why? Because a digital hacker cannot get the data from the machine as they would with an email portal. However, once that data is sent, it becomes vulnerable. Fax machines do not encrypt information; they are old-fashioned machines that don\u2019t possess the ability to scramble and unscramble messages. That means the data is transmitted without any protection. Because it is sent using analogue lines, it\u2019s not as easy to get hold of. But if a hacker were to intentionally infiltrate the line, they could access the data sent without any problems.<\/li>\n \t<li><strong>Faxploit<\/strong>\u00a0\u2014 Modern technology has become very good at protecting against malicious attacks through the use of firewalls. It doesn\u2019t always work, as Sony proved, but it often takes very persistent and sustained attackers using sophisticated techniques to get past. This is not a problem for most small businesses. Fax machines, however, do not have firewalls protecting them \u2014 but they connect to your IT network, often through the internet or cables. Hackers can actually use fax machines as an unprotected backdoor to your computer network, using elementary, malicious programs to bypass the systems protecting your more advanced hardware and causing nightmare problems.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-613e98e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"613e98e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-44569ee\" data-id=\"44569ee\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ab13851 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"ab13851\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">No obligation. No set-up fees. No risk. <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fad1c22 elementor-align-center elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"fad1c22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/uk\/signup\/pricing\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Start Free Trial <i class=\"fa fa-angle-double-right fa-lg\"><\/i><\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7fcb925 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7fcb925\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9bae4a3\" data-id=\"9bae4a3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b6c4b6 elementor-widget elementor-widget-heading\" data-id=\"4b6c4b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">An Introduction to Faxploit<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0876c31 elementor-widget elementor-widget-text-editor\" data-id=\"0876c31\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Faxploit is a method of computer network infiltration. It uses programs similar to other methods of hacking \u2014 such as malicious files \u2014 to gain unsolicited access to computers for criminal activity. This may be stealing data, conducting blackmail activities, or data manipulation. Only fax machines are vulnerable to faxploit, hence the name.<\/p><p>The discovery of faxploit was made by\u00a0<a href=\"https:\/\/blog.checkpoint.com\/2018\/08\/12\/faxploit-hp-printer-fax-exploit\/\" target=\"_blank\" rel=\"noopener\">Checkpoint Software Technologies<\/a>\u00a0back in 2018, who also coined the term. Despite being a serious vulnerability, it failed to gain much media coverage \u2014 especially in the areas potentially most affected, such as within business communities.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc08739 elementor-widget elementor-widget-heading\" data-id=\"cc08739\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What Is Faxploit?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d007d0 elementor-widget elementor-widget-text-editor\" data-id=\"7d007d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>When a hacker attempts to infiltrate your system, he or she normally meets a firewall. A firewall protects against unwanted access and stops programs that could harm your network from getting onto your business computers. The keyword here is \u2018normally\u2019.<\/p><p>A fax machine does not have a firewall. Fax machines are old technology and aren\u2019t built to fight digital threats. This is because they\u2019ve never needed to, so investment in this technology seems superfluous. However, hackers have become aware of this. They\u2019ve learned that fax machines are unprotected \u2014 yet they are often linked to IT networks of an entire business using the internet or cable connectivity because they connect to a multifunction printer or wifi. Since there is no protection here, hacks can launch an attack on the fax machine, gain entry and then access your computer network, spreading malicious files by hopping around using internal connections.<\/p><p>Imagine your computers are all locked front doors, but your fax machine is an unlocked backdoor. You\u2019re all tightly sealed up where you think you\u2019re going to be targeted, but people have worked out that backdoor is unprotected, and can just slip right in, gaining the same access as if they managed to break down the locked entrance.<\/p><p>This is faxploit.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-557cc00 elementor-widget elementor-widget-heading\" data-id=\"557cc00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Does Faxploit Work?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b4e34b elementor-widget elementor-widget-text-editor\" data-id=\"3b4e34b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Your fax machine connects to your phone line, which has no protection. Your fax machine is then connected to your IT network, which has protection from external threats \u2014 but not internal threats, as once something is in the system, it is trusted. Hackers can send malicious attacks through the phone line to your fax machine in the form of a script that runs on the device. The hardware has no way of stopping this happening, as there isn\u2019t a function to prevent the script activating when the fax machine receives the message.<\/p><p>Why is that? Because when a fax machine receives data, it is programmed by design to take the information and turn it into a file without testing what it receives. The is supposed to be an image file, but hackers have found a way to get it to run scripts that aren&#8217;t just images; programming scripts that let them take control of the hardware. The script then allows the hacker to gain access to the fax machine and search for available networks connected. The hacker can then move through the network to remotely control computers on the system and engage their malicious files.<\/p><p>What happens after that is not ever going to be good news.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db9f64e elementor-widget elementor-widget-heading\" data-id=\"db9f64e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Can Your Business Protect against Faxploit?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-547520c elementor-widget elementor-widget-text-editor\" data-id=\"547520c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>There is only one way to really protect against the faxploit, and that is to ditch fax machines.<\/p><p>The core problem behind faxploit is phone lines just don\u2019t have built-in protection to stop emerging digital threats, and nor do fax machines. It would take a total reinvention of the technology to secure the platform completely. While the faxploit tested by Checkpoint was patched, that only protected from a very specific piece of code working. The basic flaw still exists in the fax machine, in that nothing is stopping it executing malicious scripts because it is designed to do what it\u2019s told without question.<\/p><p>But this then creates another nightmare scenario. Fax machines might be old-fashioned and out-dated, but any successful business knows it\u2019s still a significant player in the world of communication. Fax is still a major part of trade and relationships for many. Ditching the fax machine isn\u2019t really an option.<\/p><p>Or is it?<\/p><p><a href=\"https:\/\/ww2.efax.com\/uk\/\">eFax<\/a>\u00a0lets you ditch the fax machine without axing the fax. Our solutions enable fax transmission to continue through digital platforms. You can still communicate with old-fashioned fax machines, but all your documents and data transmit through computers or smartphones, not centuries-old hardware.<\/p><p>Make sure your business isn\u2019t faxploited, but can still send and receive fax! With eFax, you lose absolutely none of the functionality of the fax but gain much-needed security.\u00a0<a href=\"https:\/\/secure.efax.com\/uk\/step1\">Sign up today<\/a>\u00a0and protect your business immediately.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>There are very few cyber security scandals that caught the headlines like the Sony Pictures Hack. Thousands of documents were stolen and displayed online, including emails and messages between executives. In the wake of the hacks, Sony\u2019s management team sought a way to avoid the vulnerabilities of email that caused such great problems. The result was they turned to fax machines.<\/p>\n","protected":false},"author":1,"featured_media":1255,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1235","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Can Fax Machines Be Hacked and What Is Faxploit | eFax<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ww2.efax.com\/uk\/blog\/fax-machine-exploit\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Can Fax Machines Be Hacked and What Is Faxploit | eFax\" \/>\n<meta property=\"og:description\" content=\"There are very few cyber security scandals that caught the headlines like the Sony Pictures Hack. Thousands of documents were stolen and displayed online, including emails and messages between executives. In the wake of the hacks, Sony\u2019s management team sought a way to avoid the vulnerabilities of email that caused such great problems. The result was they turned to fax machines.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ww2.efax.com\/uk\/blog\/fax-machine-exploit\" \/>\n<meta property=\"og:site_name\" content=\"eFax UK\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-02T14:42:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-17T21:33:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/fax-machine-exploit.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Scott Schweigert\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Schweigert\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/fax-machine-exploit#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/fax-machine-exploit\"},\"author\":{\"name\":\"Scott Schweigert\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#\\\/schema\\\/person\\\/cb3188fe7d58cc629d3a2f5ce3b4f3ec\"},\"headline\":\"Can Fax Machines Be Hacked and What Is Faxploit\",\"datePublished\":\"2020-06-02T14:42:28+00:00\",\"dateModified\":\"2023-03-17T21:33:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/fax-machine-exploit\"},\"wordCount\":1395,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/fax-machine-exploit#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/06\\\/fax-machine-exploit.jpeg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/fax-machine-exploit#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/fax-machine-exploit\",\"url\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/fax-machine-exploit\",\"name\":\"Can Fax Machines Be Hacked and What Is Faxploit | eFax\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/fax-machine-exploit#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/fax-machine-exploit#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/06\\\/fax-machine-exploit.jpeg\",\"datePublished\":\"2020-06-02T14:42:28+00:00\",\"dateModified\":\"2023-03-17T21:33:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/fax-machine-exploit#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/fax-machine-exploit\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/fax-machine-exploit#primaryimage\",\"url\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/06\\\/fax-machine-exploit.jpeg\",\"contentUrl\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/06\\\/fax-machine-exploit.jpeg\",\"width\":500,\"height\":333,\"caption\":\"Front close up inside of a office copier machine. Electronic parts and fans. Standing on a desk with a talbe lamp.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/fax-machine-exploit#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Can Fax Machines Be Hacked and What Is Faxploit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#website\",\"url\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/\",\"name\":\"eFax UK\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#organization\",\"name\":\"eFax UK\",\"url\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/01\\\/logo-efax.png\",\"contentUrl\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/01\\\/logo-efax.png\",\"width\":2370,\"height\":749,\"caption\":\"eFax UK\"},\"image\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#\\\/schema\\\/person\\\/cb3188fe7d58cc629d3a2f5ce3b4f3ec\",\"name\":\"Scott Schweigert\",\"sameAs\":[\"https:\\\/\\\/ww2.efax.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Can Fax Machines Be Hacked and What Is Faxploit | eFax","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ww2.efax.com\/uk\/blog\/fax-machine-exploit","og_locale":"en_US","og_type":"article","og_title":"Can Fax Machines Be Hacked and What Is Faxploit | eFax","og_description":"There are very few cyber security scandals that caught the headlines like the Sony Pictures Hack. Thousands of documents were stolen and displayed online, including emails and messages between executives. In the wake of the hacks, Sony\u2019s management team sought a way to avoid the vulnerabilities of email that caused such great problems. The result was they turned to fax machines.","og_url":"https:\/\/ww2.efax.com\/uk\/blog\/fax-machine-exploit","og_site_name":"eFax UK","article_published_time":"2020-06-02T14:42:28+00:00","article_modified_time":"2023-03-17T21:33:10+00:00","og_image":[{"width":500,"height":333,"url":"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/fax-machine-exploit.jpeg","type":"image\/jpeg"}],"author":"Scott Schweigert","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Schweigert","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ww2.efax.com\/uk\/blog\/fax-machine-exploit#article","isPartOf":{"@id":"https:\/\/ww2.efax.com\/uk\/blog\/fax-machine-exploit"},"author":{"name":"Scott Schweigert","@id":"https:\/\/ww2.efax.com\/uk\/#\/schema\/person\/cb3188fe7d58cc629d3a2f5ce3b4f3ec"},"headline":"Can Fax Machines Be Hacked and What Is Faxploit","datePublished":"2020-06-02T14:42:28+00:00","dateModified":"2023-03-17T21:33:10+00:00","mainEntityOfPage":{"@id":"https:\/\/ww2.efax.com\/uk\/blog\/fax-machine-exploit"},"wordCount":1395,"commentCount":0,"publisher":{"@id":"https:\/\/ww2.efax.com\/uk\/#organization"},"image":{"@id":"https:\/\/ww2.efax.com\/uk\/blog\/fax-machine-exploit#primaryimage"},"thumbnailUrl":"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/fax-machine-exploit.jpeg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ww2.efax.com\/uk\/blog\/fax-machine-exploit#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ww2.efax.com\/uk\/blog\/fax-machine-exploit","url":"https:\/\/ww2.efax.com\/uk\/blog\/fax-machine-exploit","name":"Can Fax Machines Be Hacked and What Is Faxploit | eFax","isPartOf":{"@id":"https:\/\/ww2.efax.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ww2.efax.com\/uk\/blog\/fax-machine-exploit#primaryimage"},"image":{"@id":"https:\/\/ww2.efax.com\/uk\/blog\/fax-machine-exploit#primaryimage"},"thumbnailUrl":"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/fax-machine-exploit.jpeg","datePublished":"2020-06-02T14:42:28+00:00","dateModified":"2023-03-17T21:33:10+00:00","breadcrumb":{"@id":"https:\/\/ww2.efax.com\/uk\/blog\/fax-machine-exploit#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ww2.efax.com\/uk\/blog\/fax-machine-exploit"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ww2.efax.com\/uk\/blog\/fax-machine-exploit#primaryimage","url":"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/fax-machine-exploit.jpeg","contentUrl":"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/fax-machine-exploit.jpeg","width":500,"height":333,"caption":"Front close up inside of a office copier machine. Electronic parts and fans. Standing on a desk with a talbe lamp."},{"@type":"BreadcrumbList","@id":"https:\/\/ww2.efax.com\/uk\/blog\/fax-machine-exploit#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ww2.efax.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Can Fax Machines Be Hacked and What Is Faxploit"}]},{"@type":"WebSite","@id":"https:\/\/ww2.efax.com\/uk\/#website","url":"https:\/\/ww2.efax.com\/uk\/","name":"eFax UK","description":"","publisher":{"@id":"https:\/\/ww2.efax.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ww2.efax.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ww2.efax.com\/uk\/#organization","name":"eFax UK","url":"https:\/\/ww2.efax.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ww2.efax.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/01\/logo-efax.png","contentUrl":"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/01\/logo-efax.png","width":2370,"height":749,"caption":"eFax UK"},"image":{"@id":"https:\/\/ww2.efax.com\/uk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ww2.efax.com\/uk\/#\/schema\/person\/cb3188fe7d58cc629d3a2f5ce3b4f3ec","name":"Scott Schweigert","sameAs":["https:\/\/ww2.efax.com"]}]}},"_links":{"self":[{"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/posts\/1235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/comments?post=1235"}],"version-history":[{"count":0,"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/posts\/1235\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/media\/1255"}],"wp:attachment":[{"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/media?parent=1235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/categories?post=1235"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/tags?post=1235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}