Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

10/19/2012
09:48 AM
50%
50%

Malware Threatens Medical Device Security

Hospitals must contend with older operating systems that lack the latest security patches, and cope with the convergence of medical devices, EHRs, and mobile apps.

Health Data Security: Tips And Tools
Health Data Security: Tips And Tools
(click image for larger view and for slideshow)
Malware increasingly is infecting hospital systems and the software that runs in-patient monitoring devices, according to government panelists cited in MIT Technology Review. Despite concerns, however, there is no public evidence that patients have been harmed.

At the recent session sponsored by the National Institute of Standards and Technology's Information Security & Privacy Board in Washington, D.C., the article said, panelists blamed much of the security vulnerability on hospitals' use of older Microsoft operating systems that have not been updated with security patches. In some cases, hospitals have been unable to modify the systems or even add anti-virus software because the software manufacturers were unsure whether such modifications would violate FDA regulations.

The FDA in 2009 issued guidance urging hospitals and medical device manufacturers to work together to eliminate security risks. But in September, the Government Accountability Office issued a report warning that implantable medical devices could be vulnerable to hacking, posing a safety threat, and asked the FDA to address the issue.

There's also evidence that malware interferes with other kinds of devices. For example, malware slowed down fetal monitors in an ICU at Beth Israel Deaconess Medical Center in Boston, according to the MIT Technology Review piece.

The FDA is now reviewing its regulations. But the article quotes Brian Fitzgerald, an FDA deputy director, as saying that the regulatory review would be gradual, "because it involves changing the culture, changing the technology, bringing in new staff, and making a systematic approach to this."

[ Looking for a PACS platform to replace an outdated system? See 9 Must-See Picture Archiving/Communication Systems. ]

Medical device software increasingly is interconnected with electronic health records systems in hospitals, which themselves are vulnerable to attack. And the issue has been complicated by the widespread adoption of smartphones and other mobile devices, some of them personal devices that clinicians bring from home.

Ken Kleinberg, a health IT consultant with the Advisory Board Co., told InformationWeek Healthcare that the operating systems of these mobile devices have more robust security features than the legacy Windows systems found in many hospitals. But he agrees that hospitals need strong "bring your own device" (BYOD) security policies, including mobile application management tools. "It's not just that you're going to control the configuration on the device, you're also going to control what application can be loaded on that device," he said.

For example, a hospital can give doctors a list of the applications that it has vetted, noted Kleinberg. If a doctor wants to use a document reader, for instance, the hospital might suggest one. If he wants to use a dosing calculator, it might suggest three apps and make them available on its application server.

The operating systems that hospitals use are an even bigger challenge, he said, partly because computer manufacturers upgrade their OS so often. "You used to be able to go for a long time on an operating system, but those time frames are shortened now, and the releases are coming faster," Kleinberg noted. "Now we've got [Microsoft] Windows 8, which came relatively soon after Windows 7. And you've got these new mobile platforms now--mobility is taking off and people want to support it. How long can healthcare organizations hang out on this older stuff? They're probably waiting for the right time to upgrade, but there is no right time."

On the other hand, he pointed out, upgrading to a new operating system is very expensive. First, Microsoft licenses cost a lot of money, and some organizations are looking at alternatives to Microsoft. Also, a new OS might require new computers capable of running it. Much of the software and interfaces already in use must also be upgraded. And from an operational standpoint, "It's a big effort to make these migrations," he said.

Nevertheless, there is no alternative to upgrading, said Kleinberg. "Organizations have to do it, and there's even more reason to do it now. Because if you really want people to use these applications, you have to run them on the devices that clinicians are willing to carry and utilize. That's why BYOD is something that organizations may want to push back on, but they have to embrace it."

Besides BYOD, the other major driver for hospitals to upgrade their computer OS is the prospect that the FDA will tighten its regulations on medical devices, he said. Moreover, other agencies, including the FCC, might also weigh in with new rules "to help monitor the convergence of EHRs and devices and applications."

InformationWeek Healthcare brought together eight top IT execs to discuss BYOD, Meaningful Use, accountable care, and other contentious issues. Also in the new, all-digital CIO Roundtable issue: Why use IT systems to help cut medical costs if physicians ignore the cost of the care they provide? (Free with registration.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
lifesciencesnow
50%
50%
lifesciencesnow,
User Rank: Apprentice
10/31/2012 | 1:57:33 PM
re: Malware Threatens Medical Device Security
Medical Device security will be a key element in the development of technology in health care...read more on this topic and the potential risks associated with the security of medical devices: http://lifesciencesnow.com/201...
jaysimmons
50%
50%
jaysimmons,
User Rank: Apprentice
10/30/2012 | 3:18:59 AM
re: Malware Threatens Medical Device Security
@AustinIT: While I agree that updates should be performed, I don't know if I'd recommend having automatic updates turned on in an organization that relies so heavily on security. There has been countless occasions where updates have 0-day security flaws and have been susceptible to attacks, most notably one of the recent Java updates. It seems a balanced update policy is needed; one where systems are maintained through updates, but only after the update has been verified and tested. Another solution is to use a system like Citrix that allows easy management of systems where only thin devices are needed and the majority of the system can be maintained centrally.

Jay Simmons
InformationWeek Contributor
AustinIT
50%
50%
AustinIT,
User Rank: Apprentice
10/25/2012 | 2:21:59 PM
re: Malware Threatens Medical Device Security
This is a huge problem for the medical field. Many of the computer systems in use are dedicated to running specialized equipment. Or, they just haven't been updated because of a perceived lack of need.

I have seen countless instances - when starting with a new client - where the clinic is still on XP SP2 and IE6 with Windows Updates having been turned off! This was done because they didn't trust the updates to not break their applications.

Now that everything is getting networked and interfaces to EMR's are rapidly rolling out, I think this will be a huge problem to get all these legacy systems either updated or replaced in order to better secure the computing environment.
Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: George has not accepted that the technology age has come to an end.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-26814
PUBLISHED: 2021-03-06
Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API to inject arbitrary code within the API service sc...
CVE-2021-27581
PUBLISHED: 2021-03-05
The Blog module in Kentico CMS 5.5 R2 build 5.5.3996 allows SQL injection via the tagname parameter.
CVE-2021-28042
PUBLISHED: 2021-03-05
Deutsche Post Mailoptimizer 4.3 before 2020-11-09 allows Directory Traversal via a crafted ZIP archive to the Upload feature or the MO Connect component. This can lead to remote code execution.
CVE-2021-28041
PUBLISHED: 2021-03-05
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
CVE-2021-3377
PUBLISHED: 2021-03-05
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.