Procolored Printers Delivered More Than Just Ink to Your PC

Procolored printers shipped malware-infected drivers for 6 months, stealing $950,000 in Bitcoin and compromising PCs worldwide. Learn how to protect yourself.

Ryan Hansen Avatar
Ryan Hansen Avatar

By

Our editorial process is built on human expertise, ensuring that every article is reliable and trustworthy. AI helps us shape our content to be as accurate and engaging as possible.
Learn more about our commitment to integrity in our Code of Ethics.

Image credit: Procolored

Key Takeaways

Key Takeaways

  • Procolored distributed malware-infected drivers for six months, affecting customers in over 31 countries.
  • XRedRAT and SnipVex malware stole cryptocurrency and allowed complete remote control of infected systems.
  • Nearly $950,000 in Bitcoin has been stolen through clipboard address hijacking by the malware.

Remember when the biggest printer problem was paper jams? Those were simpler times. Today, you might plug in your shiny new $7,000 Procolored printer only to discover it’s serving something extra with those color prints—malware that empties your crypto wallet.

For at least six months, Procolored—a Chinese manufacturer making waves with affordable professional printing solutions—has been accidentally shipping malware-laden software with its high-end printers. The infected files came both on USB drives packaged with the hardware and through official downloads on their website. It’s the kind of hidden vulnerability that opens the door to billion-dollar laundering schemes in the crypto world—proof that digital breaches don’t always start with a hack, but often with something as simple as plugging in a printer.

Your PC Never Stood a Chance

If you’re unfamiliar with what XRedRAT and SnipVex can do, imagine giving a stranger the keys to your digital life. These nasty programs capture your keystrokes, take screenshots, manipulate files, and even replace Bitcoin addresses in your clipboard with ones controlled by attackers.

The malware was so effective that security researchers have tracked over 9.3 BTC (nearly $950,000) stolen through this clipboard hijacking technique alone. That’s one expensive printer accessory you never asked for. And it’s just a small piece of a much larger puzzle — one of many stealthy exploits contributing to the staggering wave of crypto losses in 2024, despite supposed advances in cybersecurity.

Caught with their digital pants down, Procolored initially tried the classic “it’s not us, it’s you” defense, suggesting the infections might be from “international OS incompatibility” or “USB cross-contamination.” They might as well have blamed it on solar flares or Mercury retrograde.

Only after tech YouTuber Cameron Coward and security firm G Data published undeniable evidence did the company admit the problem and remove the infected software from their website.

Protecting Your System

The infection has been traced to at least six printer models—the F8, F13, F13 Pro, V6, V11 Pro, and VF13 Pro—with a USB drive reportedly infected by the Floxif USB worm being the source. That’s right, someone at a printer company plugged in an infected USB drive to their production system. It’s like cybersecurity 101 written in crayon.

If you suspect your system is infected, look for unexplained system slowdowns, unusual network activity, or modified Bitcoin addresses when copying and pasting. Multiple security vendors, including Malwarebytes and G Data, now detect these threats, so run a scan with updated definitions immediately.

For Procolored owners, a standard antivirus scan might not be enough. Since SnipVex modifies executable files, you’ll need to delete all Procolored software, download clean versions from their updated website, and perform a full system scan. Security experts recommend using multiple scanning tools like Malwarebytes, HitmanPro, and Windows Defender in sequence to catch everything.

If you’ve handled cryptocurrency on an infected machine, change your wallet passwords immediately and check your transaction history for unauthorized transfers.

Industry Wake-Up Call

This incident represents more than just one company’s embarrassing mistake—it’s a sobering reminder of how fragile our trust in the tech supply chain has become. Even legitimate purchases from established manufacturers can become vectors for attack.

The Procolored case will likely trigger increased scrutiny of smaller hardware manufacturers, especially those from regions with limited regulatory oversight. Expect to see more companies implementing code signing and integrity verification for their drivers as standard practice.

For consumers, this should serve as a wake-up call about the risks that come with niche hardware. That bargain printer might save you a few hundred dollars upfront, but the potential security costs make that “deal” look considerably less attractive.

This incident offers an uncomfortable reminder that even legitimate companies can unknowingly turn your expensive hardware purchase into a Trojan horse. The next time a device asks you to install its proprietary software, maybe take a moment to run it through a virus scanner first.

Share this

At Gadget Review, our guides, reviews, and news are driven by thorough human expertise and use our Trust Rating system and the True Score. AI assists in refining our editorial process, ensuring that every article is engaging, clear and succinct. See how we write our content here →