Vulnerabilities / Threats

6/28/2016
07:35 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Attackers Wrapping New Tools In Old Malware To Target Medical Devices

Hospital equipment running old operating systems providing safe harbor for data theft, TrapX says.

Medical devices running outdated operating systems like Windows XP and Windows 7 are giving attackers safe harbors within hospital networks for carrying out data theft in a nearly undetectable manner, a new report from TrapX Security warned this week.

The report is based on the security vendor’s analysis of data associated with an ongoing series of attacks against three healthcare institutions that are its customers. All of the attacks involve equipment running older, non-supported versions of Windows installed within the hospital networks.

The most significant takeaway from the analysis, according to TrapX, is the manner in which the attackers in each case intentionally repackaged and embedded sophisticated new malware tools in extremely old malware wrappers in an apparent bid to avoid detection.

One of the malware samples used in the attack, for instance, was designed to take advantage of a remote code execution vulnerability in Microsoft Server Service dating back to 2008. The attackers used the worm to compromise a radiation oncology system running Windows XP and a fluoroscopy workstation also running Windows XP in one of the hospitals. That access then allowed the attackers to install backdoors and botnet connections within the hospital network in order to exfiltrate data, though they could have easily caused significant damage to the equipment as well.

Since endpoints running newer Windows versions are not vulnerable to the threat, they did not either detect the malware or ignored it completely. “This ensured that the worm would go undetected while it sought out older Windows systems,” TrapX said in its report.

In another hospital, the attackers compromised a Windows XP-based MRI system and installed a Remote Access Trojan on the device using malware tools packaged inside an out-of-date wrapper for network32.kido.ib. The malware sample is ignored by patched Windows 7 and Windows 8 platforms and newer operating system and therefor managed to evade detection, the security vendor said.

According to TrapX, its analysis showed clear evidence that attackers are intentionally packaging their tools in a manner so to target medical equipment running Windows XP, Windows 7 and other older operating systems.

“The most interesting approach we discovered was the utilization of self-spreading malware that use old exploits that would compromise medical devices only,” says Moshe Ben-Simon, co-founder and vice president of services at TrapX.

Medical devices provide a tempting target for attackers because many of them run old, no-longer supported operating systems. So long as the equipment works as intended, hospitals are often reluctant to update the operating systems on these devices, Ben-Simon says

“Also, they are closed turnkey systems and hospitals are generally not allowed to install cyber defense software on them because of legal and risk issues.” Unlike typical desktop systems, medical devices do not get updated often and some equipment can remain in place for years after their operating systems have become obsolete. As a result, the corrections and fixes that are available on newer operating systems are not present in these medical devices making them vulnerable to attacks, Ben-Simon says.

Even when an organization makes the effort to keep their systems patched, all it takes for an attacker to break into them is to repackage the malware slightly using easily available tools.

“Once a backdoor is established in one machine, they can move into other machines under the control of the human attacker,” Ben-Simon says. “These medical devices create a huge series of safe harbors within the hospital network, not easily detected, and very difficult to remediate and remove.”

Related stories: 

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada July 30 through Aug. 4, 2016. Click for information on the conference schedule and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
1.9 Billion Data Records Exposed in First Half of 2017
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/20/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Jan, check this out! I found an unhackable PC.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.