Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

7/28/2017
05:00 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
100%
0%

Lethal Dosage of Cybercrime: Hacking the IV Pump

At DEF CON, a researcher demonstrated how to attack a popular model of infusion pump used in major hospitals around the world.

DEF CON - Las Vegas - The dangers of medical device hacking can be severe, and potentially lethal, when conducted by cybercriminals with the means and motivation to cause physical harm.

Dan Regalado, principal security researcher for IoT firm Zingbox, demonstrated how an attacker could break into a medical infusion pump during a presentation at DEF CON's IoT Village. IV pumps are sensitive and pricey medical devices used to deliver medications, fluids, blood, and blood products to adult, pediatric, and neonatal patients.

Infusion pumps present a growing attack surface for hackers to break into at hospitals. The market is expected to hit $10.84 billion by 2021, he said, citing a "Market and Markets" forecast.

Why would someone hack an IV pump? There are several reasons, Regalado pointed out. If successful, an attacker could steal personally identifiable information (PII), hijack hospital devices and demand ransom, corrupt the device in a denial-of-service attack, or use the pump as an entryway into the broader corporate network. 

For his educational research, Regalado chose to break into the Alaris PC Unit and IV Pump module manufactured by Bectron. The pump is a market-leading brand used at several hospitals around the world, he said.

His presentation dug into details of the device's internal components and their vulnerabilities. 

Flash FX, the generic block device driver, links the system and hardware. It lets the OS access the internal flash memory as if it were a hard drive or RAM disk, and stores sensitive information like credentials for accessing network systems. The compact Flash card inside the pump, used to boot the ENEA OSE system, stores patient profiles and is easy to retrieve and alter.

Regalado demonstrated onstage how an attacker could bypass the image integrity check, and gain access to the restricted configuration by changing the machine's PIN number.

"You can modify the integrity of the system," he explained. "The infusion pump will do whatever you want."

From there, a hacker could conduct a man-in-the-middle attack by impersonating the access point and server to manipulate pumps. Each hospital can have up to 400-1,000 pumps, said Regalado, each of which could have its settings configured to administer dangerously low or high dosages to its patient.

An attacker could also use this level of access to reconfigure the pump's network properties and overwrite the internal flash with new wifi configurations, or execute commands from the internal shell to destroy critical files or collect sensitive data.

"We need to assume a physical attack will happen and work towards asset protection," said Regalado, adding that internal attacks are more common than external ones.

While this demonstration required physical access to the pump, he warned remote attacks would be next. Regalado also noted that the vendor was notified of the pump's vulnerabilities and committed to a 30-60 day policy to address them.

His presentation ties in with the broader growth of cybercrime on healthcare organizations. Major cyberattacks on the industry grew 63%. Researchers discovered an increase in medical device hijacking, which involves the use of backdoors in medical devices to load malware tools and exfiltrate intellectual property. 

The same year, a record-breaking 328 healthcare businesses reported data breaches. Experts say attackers are becoming more confident as breaches are increasingly publicized. It's becoming clearer that healthcare targets aren't as security-savvy as once believed, and the industry has consistently seen more breaches year after year.

Related Content:

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RetiredUser
50%
50%
RetiredUser,
User Rank: Ninja
7/31/2017 | 12:16:25 PM
Risk Versus Benefit Analysis
This is an excellent example of automation where the question of risk versus benefit really needs to be called out.  Do we need software in everything?  In terms of lives saved, are we really saving more lives through IV automation than without?  Or is money that is being saved?  Because in healthcare IT all that (should) matter is whether lives are being saved or health promoted.  If these IVs are automated due only to some perception money is being saved, think again.  Consider the millions needed to firewall and protect your IV pumps, to address intrusions and potential ransom demands.  I think every piece of automation that puts lives at risk should be re-examined and a determination made whether just returning to low-tech methods isn't more sensible in the long run.
Tor Weaponized to Steal Bitcoin
Dark Reading Staff 10/18/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
State of SMB Insecurity by the Numbers
Ericka Chickowski, Contributing Writer,  10/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-9501
PUBLISHED: 2019-10-22
The Artificial Intelligence theme before 1.2.4 for WordPress has XSS because Genericons HTML files are unnecessarily placed under the web root.
CVE-2019-16971
PUBLISHED: 2019-10-22
In FusionPBX up to 4.5.7, the file app\messages\messages_thread.php uses an unsanitized "contact_uuid" variable coming from the URL, which is reflected on 3 occasions in HTML, leading to XSS.
CVE-2019-16972
PUBLISHED: 2019-10-22
In FusionPBX up to 4.5.7, the file app\contacts\contact_addresses.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS.
CVE-2019-16973
PUBLISHED: 2019-10-22
In FusionPBX up to 4.5.7, the file app\contacts\contact_edit.php uses an unsanitized "query_string" variable coming from the URL, which is reflected in HTML, leading to XSS.
CVE-2015-9496
PUBLISHED: 2019-10-22
The freshmail-newsletter plugin before 1.6 for WordPress has shortcode.php SQL Injection via the 'FM_form id=' substring.