β οΈ Months of Silent Infection: Procolored's Malware-Laced Drivers
In a shocking revelation for the cybersecurity community, it has been discovered that Procolored, a popular printer manufacturer, unknowingly distributed malware-infected printer drivers for over six months. These malicious packages were bundled with software for multiple printer models and included Remote Access Trojans (RATs) and a cryptocurrency-stealing malware called SnipVex. π
π’ Who Is Procolored?
Founded in 2018 and headquartered in Shenzhen, China, Procolored specializes in Direct-to-Film (DTF), UV, and Direct-to-Garment (DTG) printers. The company has expanded globally, with active sales in over 31 countries, including a major footprint in the United States. πΊπΈ
Their reputation for cost-effective fabric printing made them a favorite among small businesses and print-on-demand servicesβ¦ until now. π¬
π The Discovery: Hobbyist Turns Detective ππ§
The malware fiasco came to light when Serial Hobbyism, a YouTube tech creator, attempted to install drivers for his $7,000 Procolored UV printer. His security software immediately flagged the files as malicious, citing the Floxif USB worm β a red flag that couldn't be ignored. π¨
Despite reaching out to Procolored, the initial response was dismissive, attributing the alerts to false positives. But the community wasn't buying it.
π¨βπ» Deep Dive by Cyber Experts
In an in-depth analysis by Karsten Hahn, a researcher at G Data, several disturbing findings emerged:
π§« Malware Infected Models:
- F8
- F13 / F13 Pro
- V6
- V11 Pro
- VF13 Pro
The software was hosted on Mega.nz, directly linked from Procolored's official support page. Hahn identified 39 infected files, showing the presence of:
- π XRedRAT: Capable of keylogging, screenshot capture, remote shell, and file manipulation.
- πͺ€ SnipVex: A new and previously undocumented clipper malware that attaches to
.exefiles and replaces copied BTC addresses with an attacker's wallet.
π° The BTC wallet associated with SnipVex has received 9.308 BTC (~$1M) β a testament to how stealthy and effective the malware has been.
π§Ό Clean-Up and Damage Control
Following G Data's investigation and media exposure, Procolored removed the affected software from their site on May 8, 2025, and launched an internal investigation. π§βπΌπ§Ή
The company later admitted that a compromised USB drive might have infected their development systems. They've since pledged to:
β Scan and validate every software package. β Re-upload only after passing strict antivirus checks. β Offer new clean downloads to all customers.
G Data has since confirmed the new drivers are safe.
π§ What You Should Do (If You're a Customer or Pentester) π¨βπ»
If you've used Procolored products recently, take immediate action:
- Uninstall old drivers/software from affected models.
- Run a full malware scan focus on RATs and clipper behavior.
- Check for signs of:
- Keylogging or unauthorized remote access.
- Changed clipboard BTC addresses.
- Replace with verified clean drivers from Procolored's updated links.
π§Ή Due to SnipVex's binary infection behavior, a full system reinstallation may be needed for total safety.
π‘οΈ WireTor Pentest recommends treating all USB-bundled drivers as potential threats and integrating printer and peripheral software into red team exercises and recon workflows.
π Penetration Testing Lessons & Supply Chain Risks
This incident is a textbook example of a supply chain attack β malicious code delivered through trusted software from a hardware vendor. π―
Key takeaways for pentesters and red teamers:
- β Always sandbox third-party device software before installing.
- π§ͺ Include printer drivers in supply chain threat modeling.
- π‘ Monitor for clipboard hijacking and C2 communication patterns.
- π Track previously undetected malware like SnipVex in malware repositories.
π€ Lack of Transparency?
As of now, Procolored hasn't publicly notified affected customers or issued a formal statement acknowledging the breach in full. Silence at this stage could pose further reputation damage and trust issues β especially in Western markets.
π§ Final Thoughts
The Procolored malware scandal underlines the increasing risk of hardware supply chain threats in 2025. It's no longer just about routers or IoT even your printer could be a backdoor. π¨οΈ
Stay alert, scan everything, and never trust unsigned drivers, especially from external USBs.
β For expert penetration testing and malware assessment, contact WireTor at +1β332β267β8457.