09:48 AM

Malware Threatens Medical Device Security

Hospitals must contend with older operating systems that lack the latest security patches, and cope with the convergence of medical devices, EHRs, and mobile apps.

Health Data Security: Tips And Tools
Health Data Security: Tips And Tools
(click image for larger view and for slideshow)
Malware increasingly is infecting hospital systems and the software that runs in-patient monitoring devices, according to government panelists cited in MIT Technology Review. Despite concerns, however, there is no public evidence that patients have been harmed.

At the recent session sponsored by the National Institute of Standards and Technology's Information Security & Privacy Board in Washington, D.C., the article said, panelists blamed much of the security vulnerability on hospitals' use of older Microsoft operating systems that have not been updated with security patches. In some cases, hospitals have been unable to modify the systems or even add anti-virus software because the software manufacturers were unsure whether such modifications would violate FDA regulations.

The FDA in 2009 issued guidance urging hospitals and medical device manufacturers to work together to eliminate security risks. But in September, the Government Accountability Office issued a report warning that implantable medical devices could be vulnerable to hacking, posing a safety threat, and asked the FDA to address the issue.

There's also evidence that malware interferes with other kinds of devices. For example, malware slowed down fetal monitors in an ICU at Beth Israel Deaconess Medical Center in Boston, according to the MIT Technology Review piece.

The FDA is now reviewing its regulations. But the article quotes Brian Fitzgerald, an FDA deputy director, as saying that the regulatory review would be gradual, "because it involves changing the culture, changing the technology, bringing in new staff, and making a systematic approach to this."

[ Looking for a PACS platform to replace an outdated system? See 9 Must-See Picture Archiving/Communication Systems. ]

Medical device software increasingly is interconnected with electronic health records systems in hospitals, which themselves are vulnerable to attack. And the issue has been complicated by the widespread adoption of smartphones and other mobile devices, some of them personal devices that clinicians bring from home.

Ken Kleinberg, a health IT consultant with the Advisory Board Co., told InformationWeek Healthcare that the operating systems of these mobile devices have more robust security features than the legacy Windows systems found in many hospitals. But he agrees that hospitals need strong "bring your own device" (BYOD) security policies, including mobile application management tools. "It's not just that you're going to control the configuration on the device, you're also going to control what application can be loaded on that device," he said.

For example, a hospital can give doctors a list of the applications that it has vetted, noted Kleinberg. If a doctor wants to use a document reader, for instance, the hospital might suggest one. If he wants to use a dosing calculator, it might suggest three apps and make them available on its application server.

The operating systems that hospitals use are an even bigger challenge, he said, partly because computer manufacturers upgrade their OS so often. "You used to be able to go for a long time on an operating system, but those time frames are shortened now, and the releases are coming faster," Kleinberg noted. "Now we've got [Microsoft] Windows 8, which came relatively soon after Windows 7. And you've got these new mobile platforms now--mobility is taking off and people want to support it. How long can healthcare organizations hang out on this older stuff? They're probably waiting for the right time to upgrade, but there is no right time."

On the other hand, he pointed out, upgrading to a new operating system is very expensive. First, Microsoft licenses cost a lot of money, and some organizations are looking at alternatives to Microsoft. Also, a new OS might require new computers capable of running it. Much of the software and interfaces already in use must also be upgraded. And from an operational standpoint, "It's a big effort to make these migrations," he said.

Nevertheless, there is no alternative to upgrading, said Kleinberg. "Organizations have to do it, and there's even more reason to do it now. Because if you really want people to use these applications, you have to run them on the devices that clinicians are willing to carry and utilize. That's why BYOD is something that organizations may want to push back on, but they have to embrace it."

Besides BYOD, the other major driver for hospitals to upgrade their computer OS is the prospect that the FDA will tighten its regulations on medical devices, he said. Moreover, other agencies, including the FCC, might also weigh in with new rules "to help monitor the convergence of EHRs and devices and applications."

InformationWeek Healthcare brought together eight top IT execs to discuss BYOD, Meaningful Use, accountable care, and other contentious issues. Also in the new, all-digital CIO Roundtable issue: Why use IT systems to help cut medical costs if physicians ignore the cost of the care they provide? (Free with registration.)

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
10/31/2012 | 1:57:33 PM
re: Malware Threatens Medical Device Security
Medical Device security will be a key element in the development of technology in health care...read more on this topic and the potential risks associated with the security of medical devices: http://lifesciencesnow.com/201...
User Rank: Apprentice
10/30/2012 | 3:18:59 AM
re: Malware Threatens Medical Device Security
@AustinIT: While I agree that updates should be performed, I don't know if I'd recommend having automatic updates turned on in an organization that relies so heavily on security. There has been countless occasions where updates have 0-day security flaws and have been susceptible to attacks, most notably one of the recent Java updates. It seems a balanced update policy is needed; one where systems are maintained through updates, but only after the update has been verified and tested. Another solution is to use a system like Citrix that allows easy management of systems where only thin devices are needed and the majority of the system can be maintained centrally.

Jay Simmons
InformationWeek Contributor
User Rank: Apprentice
10/25/2012 | 2:21:59 PM
re: Malware Threatens Medical Device Security
This is a huge problem for the medical field. Many of the computer systems in use are dedicated to running specialized equipment. Or, they just haven't been updated because of a perceived lack of need.

I have seen countless instances - when starting with a new client - where the clinic is still on XP SP2 and IE6 with Windows Updates having been turned off! This was done because they didn't trust the updates to not break their applications.

Now that everything is getting networked and interfaces to EMR's are rapidly rolling out, I think this will be a huge problem to get all these legacy systems either updated or replaced in order to better secure the computing environment.
8 Ways Hackers Monetize Stolen Data
Steve Zurier, Freelance Writer,  4/17/2018
7 Non-Financial Data Types to Secure
Curtis Franklin Jr., Senior Editor at Dark Reading,  4/14/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.