Home > Technology News > This Guy Hacked 50,000 Printers to Promote PewDiePie YouTube Channel.

This Guy Hacked 50,000 Printers to Promote PewDiePie YouTube Channel.

Yes, This may Sound Crazy, but it’s True.

This war for “Most Subscribed Youtube Channel” between T-Series and PewDiePie is getting out of control, as on November 29 a hacker hijacked an estimated 50,000 printers which were connected to the Internet to print out pamphlets asking people to Subscribe PewDiePie.

If you still aren’t aware of this feud, PewDiePie is a Worldwide Famous YouTuber from Sweden with the most number of Subscribers on Youtube since 2013. On the Other Hand, T-Series is also a well known Music Production House in India.



If you are the guy that is interested in Numbers than Currently PewDiePie and T-Series both have around 72.5 Million Subscribers with PewDiePie being ahead by some Subscribers.

You can Watch Live Subscriber Count of PewDiePie Vs T-Series Here

Back to the Topic, since T-Series is catching up on PewDiePie rapidly, PewDiePie has asked his fans for help by telling them to get their friends and family Subscribe to PewDiePie. Fans being “Fans” took this as their own fight and did many things to Promote PewDiePie. The List Goes Below…

1] Buying Roadside Banners in Their City, asking people to Subscribe to PewDiePie.
2] Running TV Advertisements.
3] Distributing Pamphlets in public, asking people to Subscribe to PewDiePie.
4] Running Giveaways for People that Subscribe to PewDiePie.

And this one Went Too Far to Hack 50,000 Printer for Printing Pamphlets.



See the Pamphlets Images Below.

The Hacker 

Now Let’ talk about the Hacker. The hacker is an Anonymous person and goes by Twitter Username “TheHackerGiraffe”. Nothing more is known about this hacker. Here is the Tweet from a person that works for an IT company whose Printers Were Hacked.

The Hacker “TheHackerGiraffe” scanned the Internet to find the list of vulnerable printers with port 9100 open using Shodan, a search engine for internet-connected devices and exploited them to spew out a message, saying:


“PewDiePie is in trouble, and he needs your help to defeat T-Series!”

“PewDiePie, the currently most subscribed to channel on YouTube, is at stake of losing his position as the number one position by an Indian company called T-Series that simply uploads videos of Bollywood trailers and campaigns”

This message led hacked victims to unsubscribe from T-Series channel and subscribe to PewDiePie instead.

The hacker used an open-source hacking tool to exploit vulnerable printers. This tool is called Printer Exploitation Toolkit (PRET), which has been designed for testing printers against various known vulnerabilities. But this also allows attackers to capture or manipulate print jobs.

The Hacker also Tweeted

“Spread the word with your friends about printers and printer security! This is actually a scary matter,”

Click Here to Read it on Tweeter…

Thought it is good to spread Cyber Awareness but this types of tactics are bad enough to land you in some trouble. So we suggest you stay away from such tactics and don’t be a part of any such activity.

Well, the difference between the Subscriber Count is decreasing(about 10,000 Subscribers) so let’s see who wins. Even if T-Series Overtakes PewDiePie then also PewDiePie will remain “Most Subscriber Individual YouTuber”. Go Here to Check the Live Subscriber Count between PewDiePie and T-Series. Comment Down your thoughts below.

Have a Nice Day, See you Soon.

GiveAway Below

Here is a Giveaway by PewDiePie. Go to the Link and Sign Up and make your entry by various actions provided there. The more number of entries the more chances of winning.

Link : https://wn.nr/bU7nSg

Manish Garhwal
Manish is Article writer at Global Technology Updates. Loves Programming and Xiaomi. He is Xiaomi Software Repairer. Gaming is one of main part of his daily routine. He is currently Studying Computer Science Engineering in Thakur Shivkumar Singh Memorial Engineering College.
http://globaltech2u.com

Leave a Reply

Your email address will not be published. Required fields are marked *