Vulnerabilities / Threats

6/8/2015
04:00 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

Hospital Medical Devices Used As Weapons In Cyberattacks

Security firm discovered malware-infected medical devices in three hospitals hit by data breaches.

Insulin pumps, heart monitors, x-ray communications systems and other medical devices already have been proven vulnerable to cyberattack by security researchers, but a new report confirms that hospital medical devices are being abused by cybercriminals and possibly cyberspies as a stepping-stone within healthcare networks to nab valuable healthcare identities and information.

A report by TrapX scheduled to publish next week reveals three cases where hospitals were hit by data breaches after their medical devices had been infected with malware backdoors to move laterally within the healthcare network. In all three cases, the hospitals were unaware that these devices--a blood gas analyzer, a picture archive and communications system (PACS) and an x-ray system--were infiltrated with malware. The devices were spotted when TrapX installed its sensor-based technology in the hospitals, which TrapX declined to identify by name.

Ransomware, as well as Zeus, Citadel, and even Conficker, malware were discovered on the devices. While none of these real-world hacks of the medical devices appeared to be used for sabotage per se, TrapX says the malware on them indeed could be used for remote control of the devices.  

"We did see multiple types of malware and ransomware resident on these [medical] devices," says Greg Enriquez, CEO of TrapX. The hospital's security teams were unable to see the malware themselves via their traditional security scans and tools because the systems are closed devices, he says.

"They're not open to security teams to scan or to use typical security products on," he says. "That's the challenge hospital professionals have in security: often these devices are behind secondary firewalls managed by the manufacturer of the device, and the security team doesn't have access."

Billy Rios, a security researcher who has studied various types of consumer and medical system vulnerabilities, says malware attacks on medical devices are "pretty common."

Some of these devices are based on Windows, for example, Rios says, so they are often susceptible to Windows exploits. "There have been previously reported cases where these devices have become infected by run-of-the-mill malware.  While this malware isn't custom-made for medical devices, it shows that the devices are vulnerable to exploitation," says Rios, who is founder of Laconicly LLC.

The attacks on the three hospitals were targeted in nature. In one case, three blood-gas analyzers were infected with malware within the hospital, which had in place a firewall, heuristics-based intrusion detection, endpoint security, and antivirus tools, as well as an experienced security team. The hospital had no clue of the infections until TrapX installed its sensors, and noticed several alerts about malicious activity in the hospital network. Each system had a backdoor that gave them access to the internal network, and hospital data records had been exfiltrated to somewhere in the European Community, TrapX says.

Zeus and Citadel Trojans were in place to grab passwords, and a worm was also found to spread and propagate the malware. "The devices had an early version of Windows," Enriquez says, which made them more vulnerable.

In the second case, a hospital's picture archive and communications system (PACS) used to share imaging records from MRI, CT, ultrasound, x-ray systems with physicians and others, was infected with malware.

As with the other hacked hospital, this one also had the proper security tools and staff in place, but had no clue that the PACS had been compromised. In this case, data was being siphoned out and sent to a location in Guiyang, China, via an SSL-encrypted port 443, suggesting a possible cyber espionage attack.

"We clearly saw it going to China," Enriquez says. "Where it goes from there, how it gets routed … that's unknown at this point."

The attack began with a user at the hospital visiting a malicious website that injected a Java exploit into the user's browser and provided remote access to the attackers, and ultimately, the injection of malware backdoor on the PACS, according to TrapX.

[Public safety may finally force Internet of Things manufacturers to start taking security seriously. Read Internet Of Things Security Reaches Tipping Point.]

In the third hospital, one of the x-ray systems was found harboring a backdoor for a "pivot" attack on the hospital network, the company said.

"I believe these medical providers were targeted. They are being targeted for a number of reasons: personal information is worth ten times more on the black market than a credit card number, and the personal information they have may have value to a nation-state," Enriquez says.

TrapX's "Anatomy of an Attack – Medical Device Hijack (MEDJACK)," will be released on June 15. The company says hospitals should include language in their contracts with medical equipment makers that covers malware infections. "They must include very specific language about the detection, remediation and refurbishment of the medical devices sold to the hospitals which are infected by the malware. They must have a documented test process to determine if they are infected, and a documented standard process to remediate and rebuild them when malware and cyber attackers are using the devices," says Mosh Ben Simon, co-founder and vice president of TrapX Security and general manager of TrapX Labs, in the report.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
KennedyAngel
0%
100%
KennedyAngel,
User Rank: Apprentice
7/3/2015 | 8:29:45 AM
Re: Surprised I'm surprised
Computer malware and viruses are rapidly setting their sights on medical devices. Many medical devices like fetal monitors, pacemakers, insulin pump and many more dependent on networks, always have the possibility to face cyber attack. Patients remain at risk, thus to prevent this condition, FDA officials have announced new guidelines to medical device manufacturers like present at ilexmedical.com for outlining the cyber security issues. If the manufacturers don't adequately overcome cyber threat concerns, then devices might be blocked for practical use.
dieselnerd
50%
50%
dieselnerd,
User Rank: Strategist
6/11/2015 | 1:12:38 PM
Re: Surprised I'm surprised
Another wake-up call, another slap to the Snooze button. We are masters of denial - and masters of avoiding investment in maintenance/protection.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
6/9/2015 | 8:00:28 AM
Re: Surprised I'm surprised
Isolating these systems comes with the same challenges as critical systems in the ICS/SCADA world...even if you think you've air-gapped them (which you can't really do with an x-ray imaging system, anyway, because docs need to access the images), there's always a way to infect them as soon as someone plugs a laptop or tablet in, or even a USB stick. What needs to happen is better built-in security and forensics capabilities, as well as more good 'ol defense-in-depth.
Whoopty
50%
50%
Whoopty,
User Rank: Ninja
6/9/2015 | 7:55:18 AM
Surprised I'm surprised
I'm surprised by this, though considering the security in many other industries, its shouldn't come as such. Still, this should act as a big wake up call as we move towards a future with lots of wearable data being used in the medical fields, that better security is required. 

Keeping all of it on its own network seems like a good place to start. 
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
How Well Is Your Organization Investing Its Cybersecurity Dollars?
Jack Jones, Chairman, FAIR Institute,  12/11/2018
The Case for a Human Security Officer
Ira Winkler, CISSP, President, Secure Mentem,  12/5/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-18397
PUBLISHED: 2018-12-12
The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/us...
CVE-2018-20094
PUBLISHED: 2018-12-12
An issue was discovered in XXL-CONF 1.6.0. There is a path traversal vulnerability via ../ in the keys parameter that can download any configuration file, related to ConfController.java and PropUtil.java.
CVE-2018-20095
PUBLISHED: 2018-12-12
An issue was discovered in EnsureCapacity in Core/Ap4Array.h in Bento4 1.5.1-627. Crafted MP4 input triggers an attempt at excessive memory allocation, as demonstrated by mp42hls.
CVE-2018-20096
PUBLISHED: 2018-12-12
There is a heap-based buffer over-read in the Exiv2::tEXtToDataBuf function of pngimage.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.
CVE-2018-20097
PUBLISHED: 2018-12-12
There is a SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroups of tiffimage_int.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.