Keep The Wolf away

Firewalls alone cannot withstand sophisticated attacks from hackers like The Wolf. You must apply multiple layers of protection at every infrastructure endpoint. Help protect your devices, data, identities, and documents with security solutions from HP.

Season 1 The Wolf
The Wolf brings down a global financial institution by exploiting its vulnerable endpoints. He uses a mobile device to access a printer and inject malware to intercept and read data. The Wolf’s “phishing” email then tricks a user into sending malicious code hidden within a PDF to a printer.
The malware on the printer breaches the firewall and reaches the BIOS level of the company’s PCs, so it can collect data and even reinstate itself after network defences deploy.
The Wolf takes an abandoned print from a printer output tray and sabotages the firm’s next stock deal—which devastates stockholder confidence.

• Printer Wi-Fi or Bluetooth® is open without requiring user authentication
• Printer data files are not encrypted
• Users do not recognize suspicious emails or print files
• Printers and PCs do not have BIOS-level malware protection
• Sensitive documents are exposed in output trays

Season 2 The Hunt Continues

The Wolf targets patient records stored by one of the medical world’s biggest records management companies. He hacks into a PC, then uses a printer’s USB port to upload malware behind the firewall to search for connected devices to compromise.
Because the printer resides on an unsegmented network, The Wolf can access servers connected to databases filled with sensitive information. He steals millions of confidential patient records, which are readable because the data is not encrypted.
Both the hospital and the software company are liable and face significant fines and damage to their reputation.

• Printer USB port does not require authentication
• Data files are not encrypted
• Printers do not have malware protection
• Printers are not monitored for security incidents

Season 3 True Alpha

The Wolf disrupts operations at one of the world’s largest shipping companies and at an international airport.
By emailing an innocent-looking PDF, he gets an office clerk at the shipping company to send a weaponized Postscript file to a printer. Hidden malware spreads throughout the network when the file is sent to the printer, where it remains undiscovered. Soon, The Wolf has access to the CEO’s high-profile conference presentation, cranes loading cargo at a port, and the autopilot software of vessels at sea.
Next, The Wolf focuses on a major airport, showing off his ability to control the lights—and potentially multiple critical systems in the airport’s network. HP printers helped IT staff investigate and stop the attack.

• Printers in temporary locations are added to the network without adequately configuring for security
• PCs do not have web-browsing protections against accidental downloads
•IoT devices are not monitored and do not include malware detection capabilities
• Printer
syslogs are not connected to threat monitoring tools

How can you protect against similar attacks?
Protect identity: Improve login security with hardened multi-factor authentication on HP Elite PCs.
Protect the data: Apply a printer authentication and encryption solution, such as HP Access Control. Require user authentication and encrypt data when using Wi-Fi and Bluetooth printer features. Deploy a mobile authentication and encryption solution, such as Printer On Enterprise. Encrypt data at rest and in transit.
Protect the document: Deploy a pull-print solution, such as HP Access Control.
Improve monitoring and management: Automatically configure fleet security policies with HP JetAdvantage Security Manager3 or HP Printer Security Plug-in for Microsoft® SCCM for printers and HP Manageability Integration Kit (MIK)4 for PCs. Enable syslogs to track security events and connect devices to Security Information and Event Management (SIEM) tools for real-time alerts. Turn to an HP security trained MPS provider for configuring and maintaining printers for security.


Protect your business with comprehensive security from HP


The world’s most secure printing
HP Enterprise printers and MFPs can automatically detect, stop, and recover from an attack without IT intervention, with features like run-time intrusion detection, HP Sure Start, and HP Connection Inspector. Other protections include encrypted hard drives, upgradeable firmware, and the ability to send security alerts to SIEM tools.

The world’s most secure and manageable PCs

HP Elite PCs help protect against the most common threats by securing below, in, and above the OS. Multi-factor authentication strengthens identity protection, and the HP Manageability Integration Kit4 makes it simpler to manage security across the PC fleet. Other protections include hard drive encryption, HP Sure Recover, HP Sure Click, and HP Sure View.


PrinterOn Enterprise

Get dependable, secure in-network mobile printing for enterprise. Connect virtually any desktop or mobile device to printers from multiple vendors both on and off the trusted network.



HP Access Control

Restore control, reinforce security, and reduce costs by providing role-based print authentication, authorization, and secure pull printing capabilities across your organization.



HP JetAdvantage Security Manager

Reduce cost and resources to maintain fleet security with a comprehensive policy-based print security compliance tool. Establish a fleet-wide security policy, automate device settings remediation, install and renew unique certificates, and create fleet-wide compliance reports.

Learn more at