https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/footer-logo.png
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Architecture
  • Engineering/Development
  • Security
ioti.com

Connected Health Care


Getty Images

medical device cybersecurity

Hacker Wannabes and Other Medical Device Security Worries

Medical device security could be a potentially life or death matter, but a typical black hat targeting the sector is looking for financial gain.  
  • Written by Brian Buntz
  • 26th June 2019

In the cybersecurity domain, the threat of ill-intentioned hackers gaining a foothold into connected medical records and medical devices has captivated the media’s attention. The risk has also spooked a number of patients with connected medical devices and clinicians. Last year, for instance, an event known as the CyberMed Summit in Phoenix helped prep doctors for how to deal with breached medical devices. 

But it is often difficult to gauge the true level of threat because the popular narrative tends to overstate the risk of medical devices as a vehicle for intentionally maiming patients. 

“I don’t believe [hackers will target individual patients] anytime soon unless it is a well-organized nation-state,” said Safi Oranski, vice president of business development for CyberMDX, a health care cybersecurity startup based in New York City.  

A larger medical devices security threat, however, in terms of hackers are less experienced so-called script kiddies who tend to be financially motivated. And in their zeal to launch an attack to provide valuable information, these “pseudo or wannabe hackers” could inadvertently cause problems, Oranski said. They could “just find some vulnerability and just play with it without having any intention of launching some kind of terrorist attack,” he said. “I don’t think this is something that will happen a lot, but it could happen.” 

The 2017 WannaCry ransomware attack is an example of malware that caused chaos in several industries, including in the medical realm where it disrupted patient care — especially in the United Kingdom’s National Health Service, where it caused £92 million worth of damage will leading to 19,000 appointment cancellations. While it is possible the malware played a role in patient injuries and deaths, there isn’t direct evidence of that, according to Tony Bleetman, a physician quoted in The Parallax. But the malware led to delays in treatment. 

Especially in cases such as heart attack patients, even a delay of a few minutes can lead to worse patient outcomes and lower survivability. A 2018 European study found every 10-minute delay for heart attack patients suffering from cardiogenic shock led to an uptick in 3.3 deaths per 100 patients. 

While hackers targeting medical devices could theoretically target them anywhere with medical devices — including in public and private settings — hospitals continue to be the most target-rich environment from an attacker’s perspective. “Medical devices can be reached from many points in a hospital’s network and these devices’ are often not updated or patched regularly,” said Amit Bareket, chief executive officer of Perimeter 81, a Tel Aviv-based cybersecurity firm, which is focused on the cybersecurity in health care and several other industries. “Also, many medical devices [in hospitals] run outdated operation systems, like Windows XP that have a lot of security vulnerabilities.”

Another driver of cyber risk is the fact that medical device manufacturers and hospitals don’t collaborate as well as they should when it comes to devising and orchestrating an aligned defense strategy, according to Oranski. 

Black hat hackers targeting medical devices tend to do so as a gateway to other resources on the network. “The main reason for hacking these devices is to get through them into the hospital [network],” Oranski said. 

A hacked hospital network offers a potentially wide open vista of opportunities to hackers — with the vast majority having some sort of economic basis. “With nation-states, it’s still based on economics but in a different manner,” Oranski explained. “They are often looking for technology and IP. Hospitals are a great place to find such information because they tend to be less protected than other networks and a lot of inherent vulnerabilities.” 

Medical networks are often not segmented, Bareket said. “Basically, you can go through the hospital and connect to one of the internet connections and start sniffing the network and connect to medical devices,” he said. You could alter the data. Steal the information. You could even sabotage test results.” 

Hackers accessing patient records are often looking for data to pilfer on the dark web, where there are experts in committing niche types of fraud. “You could have experts who are just focused on social security numbers for tax fraud,” Oranski said. So the hackers who gain access to medical records often split their data trove apart and sell what they’ve found as a bundle. 

And while the stereotype of a hacker may be a hoodie-clad basement-dwelling individual, the concept gives short shrift to the reality of groups of hackers, whether they are informal online groups or criminal syndicates. As for the latter, “some of them are supported by nation states, but not officially,” Oranski said. “But we know, within places like China, Russia or Iran, these [hackers] are often somehow connected to a nation-state somehow.”

Hospital networks have historically not been as stringently guarded as those in other industries. In 2018, health care providers spent roughly 5% of their IT budgets on cybersecurity, according to Gartner research the Chicago Tribune summarized. That’s less than the corresponding 7.3% the financial services sector spent and the 6.1% the retail and wholesale industry budgeted. 

Connected medical devices using common operating systems as well as wireless wide area networks such as Wi-Fi or cellular create a potentially greater attack surface than narrower alternatives. 

Buggy medical device software is another risk factor. Software-related problems have long been a leading cause of medical device recalls in the United States. A 2018 article in Medtech Intelligence concluded “software-related recalls are on the rise due to the increasing sophistication of medical device technology.”

The situation is leading to an uptick in interest in the concept of Zero Trust in the medical realm, which assumes all networks are potentially hostile. Originally developed by Forrester, interest in the Zero Trust model is growing, but adoption of it remains at an early stage overall in medical contexts. 

While the Zero Trust model can’t provide perfect security, it does provide solid defense, if well orchestrated, against commodity attacks that can put organizations — medical or not — in the headlines. 

“You have to create a model that basically isolate the different medical devices and any personal devices from the network itself,” Bareket said. “You are wrapping each in a protective bubble.” 

Tags: Connected Health Care Features

Related


  • Digital health
    Unlocking Telehealth Benefits Hinges on Data Integration 
    Expanded remote patient monitoring is needed to amplify telehealth benefits. 
  • Telehealth Providers Should Move Beyond Teleconferencing
    Many telehealth providers have limited experience with the technology.
  • Creating Proactive Health Care Practices Through Data
    Connected devices and artificial intelligence are starting to get at the heart of proactive health care by developing healthy habits.
  • Image of a pile of coins
    IoT Salary Survey Report
    Our inaugural IoT Salary Survey report reveals average IoT-related salaries segmented by job role, job level and company size, plus bonus information, expectations for 2020 and more.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • Exploring the Roots of Health Care Cybersecurity 
  • What Is Real Artificial Intelligence in Health Care?
  • AI, IoT and the Prospect of ‘Nudging’ People to Be Healthier
  • ICS Security, Medical Devices and the Accidental Bogeyman

News

View all

Private LTE Market Projected to Grow to $13 Billion

12th January 2021

IoT World Announces 2021 IoT World Advisory Board

9th December 2020

White Papers

View all

The eSIM Cookbook – Towards the Next Generation of Connected Devices

22nd February 2021

eSIM Delivers Greater Freedom for OEMs – by Beecham Research and Truphone

22nd February 2021

Special Reports

View all

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

Webinars

View all

Weber’s Journey: How a Top Grill Maker Serves Up Connected Cooking

25th February 2021

From Insights to Action: Best Practices for Implementing Connected Device Security

15th December 2020

Galleries

View all

Top IoT Trends to Watch in 2020

26th January 2020

Five of the Most Promising Digital Health Technologies

14th January 2020

Industry Perspectives

View all

IoT Spending Holds Firm — Tempered by Dose of ‘IoT Pragmatism’

1st December 2020

The Great IoT Connectivity Lockdown

11th May 2020

Events

View all

IoT at the Edge

17th March 2021

Embedded IoT World 2021

28th April 2021 - 29th April 2021

IoT World 2021

2nd November 2021 - 4th November 2021

Twitter

IoTWorldToday, IoTWorldSeries

IoT Remote Monitoring Helps Enterprises Traverse COVID-19 and Beyond dlvr.it/RtZ3K5 https://t.co/owJXYf1gkO

26th February 2021
IoTWorldToday, IoTWorldSeries

Securing the Industrial Internet of Things dlvr.it/RtYfYk https://t.co/khUn79dvQD

26th February 2021
IoTWorldToday, IoTWorldSeries

📢 Announcing #EIOTWORLD sponsor, @BluetoothSIG — the global standard for simple, secure wireless connections. ➕ Le… twitter.com/i/web/status/1…

26th February 2021
IoTWorldToday, IoTWorldSeries

How IoT Devices Can Enhance the Connected Customer Experience dlvr.it/RtPcvS

24th February 2021
IoTWorldToday, IoTWorldSeries

🤝 Meet #EIOTWORLD speaker Ingo Feldner, Project Lead for Virtual #Hardware Platforms at @RobertBoschGmbH 📅 Join hi… twitter.com/i/web/status/1…

24th February 2021
IoTWorldToday, IoTWorldSeries

Developing IoT Applications with Rust: Using a Rust Development Environment dlvr.it/RtNqrk https://t.co/wOmnoz2UVT

24th February 2021
IoTWorldToday, IoTWorldSeries

Chip-Enabled Edge AI Drives Next-Gen IoT dlvr.it/RtKcMQ https://t.co/dLjBzE6Qei

23rd February 2021
IoTWorldToday, IoTWorldSeries

The eSIM Cookbook – Towards the Next Generation of Connected Devices dlvr.it/RtG5bB https://t.co/5kXa8Pnv4T

22nd February 2021

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X