Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


A Most Personal Threat: Implantable Devices in Secure Spaces

Do implantable medical devices pose a threat to secure communication facilities? A Virginia Tech researcher says they do, and the problem is growing.

Nearly a decade ago, researchers made international news by demonstrating that an implantable medical device — an insulin pump — could be hacked via radio and controlled to the detriment of its user. Even earlier research indicated that heart monitors could be hacked to provide incomplete or erroneous data from their sensors. These two cases shared a trait also shared by most of the implantable medical device security research that has followed.

Most of the research has been focused on how the devices could be manipulated to harm the user. Alan Michaels tries to answer a very different question with his research: Could an implantable medical device be hacked to harm a third party?

Michaels, director of the Electronic Systems Lab at the Virginia Tech Hume Center, has a very specific third party in mind. He's interested in the threat a "rogue" implantable device might pose to a Sensitive Compartmented Information Facility (SCIF) — a special facility where sensitive and classified information can be worked on and discussed. 

The issue, Michaels says, is that insulin pumps, continuous glucose monitors, heart monitors, and more are electronic devices that have radio communications capabilities. From the viewpoint of the SCIF, the fact that they're involved with human health is almost irrelevant.

"We're all paranoid, you know. I mean, we can pick up what could happen," Michaels explains, "but we also have to be practical about the true risk." And calculating that true risk is the focus of his research.

Part of that risk begins when the devices are manufactured. "We're most interested in the fact that devices are mostly not manufactured in the United States," Michaels says. For the reason location matters, he turns to the example of the popular DJI drones, which were found to have encrypted tunnels back to the manufacturer in China, through which the drones' telemetry data was communicated. "Why would I not believe that the same thing is occurring [in implantable devices]?" he asks.

Michaels is most interested in the possibility that a third party might hack into a user's device and use it as a point of entry for the SCIF — a point of entry that would then allow the third party to pivot to other, much more sensitive systems.

Attack pivots become more of a concern as devices become more capable. Michaels points to fitness trackers and similar devices as wearable systems that some SCIFs now allow because of the health benefits. And yet, "Basically it is a smartwatch that starts to look a lot like a personal computer. It really is very capable," he says.

And some of these wearables are more than just step counters that can easily be removed at the SCIF's door. "We found one called 'Adam' that's an asthma monitor," Michaels says. "And it basically gives you a predictive warning that you're about to have a major asthma attack." He points out, "That's harder to take off because you're not worried about your 10,000 steps — you may actually have an asthma attack while in the facility."

So far, SCIF administrators have dealt with implantable devices through one-off waivers for the wearers. That may be fine for a single employee in a single facility, but Michaels says his team has calculated that there could easily be more than 100,000 individuals with implantable devices who have a regular need to access a SCIF. That's a lot of waivers, he believes.

So far, Michaels says, there has been relatively little recognition of this as an issue in secure facilities, with existing rules driven by HR as much as cybersecurity. "We want to protect the information and support the individual. Yet there comes a point which you probably deny entry," he adds, and that point may be coming sooner than many people think.

The reason for the rapid arrival rests on medical devices in the research pipeline. Michaels mentions a "bionic eyeball" that might provide sight but also have sufficient intelligence to pose a threat.

Michaels' research points him to a broad conclusion: "Make sure you give the support to the individual to do their work, but we think there needs to be a balance with mitigations."

Michaels will be presenting results of his research at Black Hat, in a session titled "Carrying Our Insecurities with Us: The Risks of Implanted Medical Devices in Secure Spaces" at 10:00 a.m. on Wednesday, August 5.

Related content:

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
When It Comes To Security Tools, More Isn't More
Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-15
An issue was discovered in Malwarebytes before 4.0 on macOS. A malicious application was able to perform a privileged action within the Malwarebytes launch daemon. The privileged service improperly validated XPC connections by relying on the PID instead of the audit token. An attacker can construct ...
PUBLISHED: 2021-01-15
Docker Desktop Community before on macOS mishandles certificate checking, leading to local privilege escalation.
PUBLISHED: 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which can lead to pre-auth remote code execution. AttachmentUploadServlet deserializes untrusted data from the `Attachment-Support` header. This Servlet does not enforce any authentication or a...
PUBLISHED: 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, AttachmentUploadServlet also saves user controlled data (`request.getInputStream()`) to a user specified location (`request.getHeader("File-Name")`). This issue may lead to arbitrary file upload which can be used to u...
PUBLISHED: 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, the REST UserResource endpoint performs a security check to make sure that only administrators can list user details. However for the `/users/` endpoint there are no security checks enforced so it is possible to retrieve ar...