Vulnerabilities / Threats

6/8/2015
04:00 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

Hospital Medical Devices Used As Weapons In Cyberattacks

Security firm discovered malware-infected medical devices in three hospitals hit by data breaches.

Insulin pumps, heart monitors, x-ray communications systems and other medical devices already have been proven vulnerable to cyberattack by security researchers, but a new report confirms that hospital medical devices are being abused by cybercriminals and possibly cyberspies as a stepping-stone within healthcare networks to nab valuable healthcare identities and information.

A report by TrapX scheduled to publish next week reveals three cases where hospitals were hit by data breaches after their medical devices had been infected with malware backdoors to move laterally within the healthcare network. In all three cases, the hospitals were unaware that these devices--a blood gas analyzer, a picture archive and communications system (PACS) and an x-ray system--were infiltrated with malware. The devices were spotted when TrapX installed its sensor-based technology in the hospitals, which TrapX declined to identify by name.

Ransomware, as well as Zeus, Citadel, and even Conficker, malware were discovered on the devices. While none of these real-world hacks of the medical devices appeared to be used for sabotage per se, TrapX says the malware on them indeed could be used for remote control of the devices.  

"We did see multiple types of malware and ransomware resident on these [medical] devices," says Greg Enriquez, CEO of TrapX. The hospital's security teams were unable to see the malware themselves via their traditional security scans and tools because the systems are closed devices, he says.

"They're not open to security teams to scan or to use typical security products on," he says. "That's the challenge hospital professionals have in security: often these devices are behind secondary firewalls managed by the manufacturer of the device, and the security team doesn't have access."

Billy Rios, a security researcher who has studied various types of consumer and medical system vulnerabilities, says malware attacks on medical devices are "pretty common."

Some of these devices are based on Windows, for example, Rios says, so they are often susceptible to Windows exploits. "There have been previously reported cases where these devices have become infected by run-of-the-mill malware.  While this malware isn't custom-made for medical devices, it shows that the devices are vulnerable to exploitation," says Rios, who is founder of Laconicly LLC.

The attacks on the three hospitals were targeted in nature. In one case, three blood-gas analyzers were infected with malware within the hospital, which had in place a firewall, heuristics-based intrusion detection, endpoint security, and antivirus tools, as well as an experienced security team. The hospital had no clue of the infections until TrapX installed its sensors, and noticed several alerts about malicious activity in the hospital network. Each system had a backdoor that gave them access to the internal network, and hospital data records had been exfiltrated to somewhere in the European Community, TrapX says.

Zeus and Citadel Trojans were in place to grab passwords, and a worm was also found to spread and propagate the malware. "The devices had an early version of Windows," Enriquez says, which made them more vulnerable.

In the second case, a hospital's picture archive and communications system (PACS) used to share imaging records from MRI, CT, ultrasound, x-ray systems with physicians and others, was infected with malware.

As with the other hacked hospital, this one also had the proper security tools and staff in place, but had no clue that the PACS had been compromised. In this case, data was being siphoned out and sent to a location in Guiyang, China, via an SSL-encrypted port 443, suggesting a possible cyber espionage attack.

"We clearly saw it going to China," Enriquez says. "Where it goes from there, how it gets routed … that's unknown at this point."

The attack began with a user at the hospital visiting a malicious website that injected a Java exploit into the user's browser and provided remote access to the attackers, and ultimately, the injection of malware backdoor on the PACS, according to TrapX.

[Public safety may finally force Internet of Things manufacturers to start taking security seriously. Read Internet Of Things Security Reaches Tipping Point.]

In the third hospital, one of the x-ray systems was found harboring a backdoor for a "pivot" attack on the hospital network, the company said.

"I believe these medical providers were targeted. They are being targeted for a number of reasons: personal information is worth ten times more on the black market than a credit card number, and the personal information they have may have value to a nation-state," Enriquez says.

TrapX's "Anatomy of an Attack – Medical Device Hijack (MEDJACK)," will be released on June 15. The company says hospitals should include language in their contracts with medical equipment makers that covers malware infections. "They must include very specific language about the detection, remediation and refurbishment of the medical devices sold to the hospitals which are infected by the malware. They must have a documented test process to determine if they are infected, and a documented standard process to remediate and rebuild them when malware and cyber attackers are using the devices," says Mosh Ben Simon, co-founder and vice president of TrapX Security and general manager of TrapX Labs, in the report.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
KennedyAngel
0%
100%
KennedyAngel,
User Rank: Apprentice
7/3/2015 | 8:29:45 AM
Re: Surprised I'm surprised
Computer malware and viruses are rapidly setting their sights on medical devices. Many medical devices like fetal monitors, pacemakers, insulin pump and many more dependent on networks, always have the possibility to face cyber attack. Patients remain at risk, thus to prevent this condition, FDA officials have announced new guidelines to medical device manufacturers like present at ilexmedical.com for outlining the cyber security issues. If the manufacturers don't adequately overcome cyber threat concerns, then devices might be blocked for practical use.
dieselnerd
50%
50%
dieselnerd,
User Rank: Strategist
6/11/2015 | 1:12:38 PM
Re: Surprised I'm surprised
Another wake-up call, another slap to the Snooze button. We are masters of denial - and masters of avoiding investment in maintenance/protection.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
6/9/2015 | 8:00:28 AM
Re: Surprised I'm surprised
Isolating these systems comes with the same challenges as critical systems in the ICS/SCADA world...even if you think you've air-gapped them (which you can't really do with an x-ray imaging system, anyway, because docs need to access the images), there's always a way to infect them as soon as someone plugs a laptop or tablet in, or even a USB stick. What needs to happen is better built-in security and forensics capabilities, as well as more good 'ol defense-in-depth.
Whoopty
50%
50%
Whoopty,
User Rank: Ninja
6/9/2015 | 7:55:18 AM
Surprised I'm surprised
I'm surprised by this, though considering the security in many other industries, its shouldn't come as such. Still, this should act as a big wake up call as we move towards a future with lots of wearable data being used in the medical fields, that better security is required. 

Keeping all of it on its own network seems like a good place to start. 
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-9978
PUBLISHED: 2019-03-24
The social-warfare plugin before 3.5.3 for WordPress has stored XSS via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, as exploited in the wild in March 2019. This affects Social Warfare and Social Warfare Pro.
CVE-2019-9977
PUBLISHED: 2019-03-24
The renderer process in the entertainment system on Tesla Model 3 vehicles mishandles JIT compilation, which allows attackers to trigger firmware code execution, and display a crafted message to vehicle occupants.
CVE-2019-9962
PUBLISHED: 2019-03-24
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to VCRUNTIME140!memcpy.
CVE-2019-9963
PUBLISHED: 2019-03-24
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to ntdll!RtlFreeHeap.
CVE-2019-9964
PUBLISHED: 2019-03-24
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to ntdll!RtlpNtMakeTemporaryKey.