Risk
10/19/2012
09:48 AM
Connect Directly
RSS
E-Mail
50%
50%

Malware Threatens Medical Device Security

Hospitals must contend with older operating systems that lack the latest security patches, and cope with the convergence of medical devices, EHRs, and mobile apps.

Health Data Security: Tips And Tools
Health Data Security: Tips And Tools
(click image for larger view and for slideshow)
Malware increasingly is infecting hospital systems and the software that runs in-patient monitoring devices, according to government panelists cited in MIT Technology Review. Despite concerns, however, there is no public evidence that patients have been harmed.

At the recent session sponsored by the National Institute of Standards and Technology's Information Security & Privacy Board in Washington, D.C., the article said, panelists blamed much of the security vulnerability on hospitals' use of older Microsoft operating systems that have not been updated with security patches. In some cases, hospitals have been unable to modify the systems or even add anti-virus software because the software manufacturers were unsure whether such modifications would violate FDA regulations.

The FDA in 2009 issued guidance urging hospitals and medical device manufacturers to work together to eliminate security risks. But in September, the Government Accountability Office issued a report warning that implantable medical devices could be vulnerable to hacking, posing a safety threat, and asked the FDA to address the issue.

There's also evidence that malware interferes with other kinds of devices. For example, malware slowed down fetal monitors in an ICU at Beth Israel Deaconess Medical Center in Boston, according to the MIT Technology Review piece.

The FDA is now reviewing its regulations. But the article quotes Brian Fitzgerald, an FDA deputy director, as saying that the regulatory review would be gradual, "because it involves changing the culture, changing the technology, bringing in new staff, and making a systematic approach to this."

[ Looking for a PACS platform to replace an outdated system? See 9 Must-See Picture Archiving/Communication Systems. ]

Medical device software increasingly is interconnected with electronic health records systems in hospitals, which themselves are vulnerable to attack. And the issue has been complicated by the widespread adoption of smartphones and other mobile devices, some of them personal devices that clinicians bring from home.

Ken Kleinberg, a health IT consultant with the Advisory Board Co., told InformationWeek Healthcare that the operating systems of these mobile devices have more robust security features than the legacy Windows systems found in many hospitals. But he agrees that hospitals need strong "bring your own device" (BYOD) security policies, including mobile application management tools. "It's not just that you're going to control the configuration on the device, you're also going to control what application can be loaded on that device," he said.

For example, a hospital can give doctors a list of the applications that it has vetted, noted Kleinberg. If a doctor wants to use a document reader, for instance, the hospital might suggest one. If he wants to use a dosing calculator, it might suggest three apps and make them available on its application server.

The operating systems that hospitals use are an even bigger challenge, he said, partly because computer manufacturers upgrade their OS so often. "You used to be able to go for a long time on an operating system, but those time frames are shortened now, and the releases are coming faster," Kleinberg noted. "Now we've got [Microsoft] Windows 8, which came relatively soon after Windows 7. And you've got these new mobile platforms now--mobility is taking off and people want to support it. How long can healthcare organizations hang out on this older stuff? They're probably waiting for the right time to upgrade, but there is no right time."

On the other hand, he pointed out, upgrading to a new operating system is very expensive. First, Microsoft licenses cost a lot of money, and some organizations are looking at alternatives to Microsoft. Also, a new OS might require new computers capable of running it. Much of the software and interfaces already in use must also be upgraded. And from an operational standpoint, "It's a big effort to make these migrations," he said.

Nevertheless, there is no alternative to upgrading, said Kleinberg. "Organizations have to do it, and there's even more reason to do it now. Because if you really want people to use these applications, you have to run them on the devices that clinicians are willing to carry and utilize. That's why BYOD is something that organizations may want to push back on, but they have to embrace it."

Besides BYOD, the other major driver for hospitals to upgrade their computer OS is the prospect that the FDA will tighten its regulations on medical devices, he said. Moreover, other agencies, including the FCC, might also weigh in with new rules "to help monitor the convergence of EHRs and devices and applications."

InformationWeek Healthcare brought together eight top IT execs to discuss BYOD, Meaningful Use, accountable care, and other contentious issues. Also in the new, all-digital CIO Roundtable issue: Why use IT systems to help cut medical costs if physicians ignore the cost of the care they provide? (Free with registration.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
lifesciencesnow
50%
50%
lifesciencesnow,
User Rank: Apprentice
10/31/2012 | 1:57:33 PM
re: Malware Threatens Medical Device Security
Medical Device security will be a key element in the development of technology in health care...read more on this topic and the potential risks associated with the security of medical devices: http://lifesciencesnow.com/201...
jaysimmons
50%
50%
jaysimmons,
User Rank: Apprentice
10/30/2012 | 3:18:59 AM
re: Malware Threatens Medical Device Security
@AustinIT: While I agree that updates should be performed, I don't know if I'd recommend having automatic updates turned on in an organization that relies so heavily on security. There has been countless occasions where updates have 0-day security flaws and have been susceptible to attacks, most notably one of the recent Java updates. It seems a balanced update policy is needed; one where systems are maintained through updates, but only after the update has been verified and tested. Another solution is to use a system like Citrix that allows easy management of systems where only thin devices are needed and the majority of the system can be maintained centrally.

Jay Simmons
InformationWeek Contributor
AustinIT
50%
50%
AustinIT,
User Rank: Apprentice
10/25/2012 | 2:21:59 PM
re: Malware Threatens Medical Device Security
This is a huge problem for the medical field. Many of the computer systems in use are dedicated to running specialized equipment. Or, they just haven't been updated because of a perceived lack of need.

I have seen countless instances - when starting with a new client - where the clinic is still on XP SP2 and IE6 with Windows Updates having been turned off! This was done because they didn't trust the updates to not break their applications.

Now that everything is getting networked and interfaces to EMR's are rapidly rolling out, I think this will be a huge problem to get all these legacy systems either updated or replaced in order to better secure the computing environment.
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0103
Published: 2014-07-29
WebAccess in Zarafa before 7.1.10 and WebApp before 1.6 stores credentials in cleartext, which allows local Apache users to obtain sensitive information by reading the PHP session files.

CVE-2014-0475
Published: 2014-07-29
Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.

CVE-2014-2226
Published: 2014-07-29
Ubiquiti UniFi Controller before 3.2.1 logs the administrative password hash in syslog messages, which allows man-in-the-middle attackers to obtains sensitive information via unspecified vectors.

CVE-2014-3541
Published: 2014-07-29
The Repositories component in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to conduct PHP object injection attacks and execute arbitrary code via serialized data associated with an add-on.

CVE-2014-3542
Published: 2014-07-29
mod/lti/service.php in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) is...

Best of the Web
Dark Reading Radio