際際滷

際際滷Share a Scribd company logo
Phillip LiPari, Writing for Intelligence
4 December 2015
Cyber-ThreatPosed by IncreasingMedicalDeviceConnectivity
Executive Summary:
Increasing internet connectivity of medical devices is likely to increase the vulnerability of
medical centers to cyber-attacks through 31 December 2015. Threat actors target intellectual
property (IP) including the IP stored on medical devices and personal data on hospital networks
considered useful in targeted spear-phishing attacks. This personal data includes sensitive
healthcare information which draws attention and gives a phishing email legitimacy.
Discussion:
Medical devices often run on outdated operating systems (OSs) due to their and lack of prior
connectivity to the internet.1 Since these devices were designed for internet connectivity they
often operate on Windows XP or other systems outdated systems. These OSs were not
designed to counter current cyber-threats and are more
vulnerable than updated versions.2 The FDA has
expressed concern of the rapid increase in medical
device connectivity using off the shelf (OTS)
software.3
IP stored on medical devices includes research data
and device designs.4 Threat actors infiltrating these
devices gain access to their functionality as well as
academic or medical research they are used for.
Pictured right is a diagram illustrating a threat actor
gaining access to a hospital network and IP stored
there through a medical device.
Sensitive personal information is often stored on
medical devices as well as the networks these devices
are connected to. Healthcare information contains
patient treatment files as well as data on the doctor
treating the patient.5 Threat actors can use this
information to craft detailed spear-phishing attacks. A
threat actor may include new treatment plans or other sensitive information in the subject line
in order to give the email a sense of urgency and legitimacy.
Two cybersecurity researchers revealed they had used the vulnerability search engine Shodan
to expose over 68,000 medical devices from an unnamed organization. These researchers also
posted false advertisements for medical device vulnerabilities and received a number of
potential bidding offers.6 These researchers illustrated the ease of compromising medical
devices and that there is a community interested in this.
Personal IP Research data
Source Reliability: High
Analytic Confidence: Medium
Analytic Confidence: The analyst worked with a small group to compile this information. The
deadline was reasonable and the information was simple to find. The analyst did not use
structured analytic methods.
With questions and comments, please contact the author:
Phillip LiPari
1 http://gizmodo.com/thousands-of-medical-devices-are-open-to-hacking-over-t-1733961503 (M)
2 https://blogs.microsoft.com/cybertrust/2013/08/15/the-risk-of-running-windows-xp-after-support-ends-april-
2014/ (L)
3 http://www.fda.gov/RegulatoryInformation/Guidances/ucm077812.htm (H)
4 http://www.pabstpatent.com/medical-devices (H)
5 http://www.forbes.com/sites/bernardmarr/2015/04/21/how-big-data-is-changing-healthcare/ (M)
6 http://www.bbc.com/news/technology-34390165 (M)

More Related Content

What's hot (20)

A Proposed Blueprint of a privacy first Pan Canadian Disease Contact Tracin...
A Proposed Blueprint of a privacy first Pan Canadian Disease Contact Tracin...A Proposed Blueprint of a privacy first Pan Canadian Disease Contact Tracin...
A Proposed Blueprint of a privacy first Pan Canadian Disease Contact Tracin...
Hisham Al Zanoon
11 Most Common HIPAA Violations
11 Most Common HIPAA Violations 11 Most Common HIPAA Violations
11 Most Common HIPAA Violations
MariaClark32
SeaCat: and SDN End-to-end Application Containment ArchitecTure
SeaCat: and SDN End-to-end Application Containment ArchitecTureSeaCat: and SDN End-to-end Application Containment ArchitecTure
SeaCat: and SDN End-to-end Application Containment ArchitecTure
US-Ignite
Understanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and ApplicationsUnderstanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and Applications
EMMAIntl
011918 espionage health_check_fact_sheet_rs
011918 espionage health_check_fact_sheet_rs011918 espionage health_check_fact_sheet_rs
011918 espionage health_check_fact_sheet_rs
Richard Smiraldi
INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?
INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?
INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?
Diaspark
Risk management in Healthcare on Cloud
Risk management in Healthcare on CloudRisk management in Healthcare on Cloud
Risk management in Healthcare on Cloud
Sandeep Sharma IIMK Smart City,IoT,Bigdata,Cloud,BI,DW
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
dbpublications
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.com
Baileyaby
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.com
jonhson199
Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank Siepmann
Frank Siepmann
CSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comCSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.com
McdonaldRyan78
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.com
jonhson198
Csec 610 Enhance teaching / snaptutorial.com
Csec 610  Enhance teaching / snaptutorial.comCsec 610  Enhance teaching / snaptutorial.com
Csec 610 Enhance teaching / snaptutorial.com
Baileyabv
Cyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comCyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.com
McdonaldRyan80
Cyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comCyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.com
robertlesew8
Cyb 610 Believe Possibilities / snaptutorial.com
Cyb 610  Believe Possibilities / snaptutorial.comCyb 610  Believe Possibilities / snaptutorial.com
Cyb 610 Believe Possibilities / snaptutorial.com
Davis12a
CST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.comCST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.com
claric240
Csec 610 Believe Possibilities / snaptutorial.com
Csec 610  Believe Possibilities / snaptutorial.comCsec 610  Believe Possibilities / snaptutorial.com
Csec 610 Believe Possibilities / snaptutorial.com
Davis10a
Medical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory PerspectiveMedical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory Perspective
Jon Lendrum
A Proposed Blueprint of a privacy first Pan Canadian Disease Contact Tracin...
A Proposed Blueprint of a privacy first Pan Canadian Disease Contact Tracin...A Proposed Blueprint of a privacy first Pan Canadian Disease Contact Tracin...
A Proposed Blueprint of a privacy first Pan Canadian Disease Contact Tracin...
Hisham Al Zanoon
11 Most Common HIPAA Violations
11 Most Common HIPAA Violations 11 Most Common HIPAA Violations
11 Most Common HIPAA Violations
MariaClark32
SeaCat: and SDN End-to-end Application Containment ArchitecTure
SeaCat: and SDN End-to-end Application Containment ArchitecTureSeaCat: and SDN End-to-end Application Containment ArchitecTure
SeaCat: and SDN End-to-end Application Containment ArchitecTure
US-Ignite
Understanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and ApplicationsUnderstanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and Applications
EMMAIntl
011918 espionage health_check_fact_sheet_rs
011918 espionage health_check_fact_sheet_rs011918 espionage health_check_fact_sheet_rs
011918 espionage health_check_fact_sheet_rs
Richard Smiraldi
INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?
INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?
INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?
Diaspark
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
dbpublications
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.com
Baileyaby
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.com
jonhson199
Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank Siepmann
Frank Siepmann
CSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comCSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.com
McdonaldRyan78
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.com
jonhson198
Csec 610 Enhance teaching / snaptutorial.com
Csec 610  Enhance teaching / snaptutorial.comCsec 610  Enhance teaching / snaptutorial.com
Csec 610 Enhance teaching / snaptutorial.com
Baileyabv
Cyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comCyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.com
McdonaldRyan80
Cyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comCyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.com
robertlesew8
Cyb 610 Believe Possibilities / snaptutorial.com
Cyb 610  Believe Possibilities / snaptutorial.comCyb 610  Believe Possibilities / snaptutorial.com
Cyb 610 Believe Possibilities / snaptutorial.com
Davis12a
CST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.comCST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.com
claric240
Csec 610 Believe Possibilities / snaptutorial.com
Csec 610  Believe Possibilities / snaptutorial.comCsec 610  Believe Possibilities / snaptutorial.com
Csec 610 Believe Possibilities / snaptutorial.com
Davis10a
Medical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory PerspectiveMedical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory Perspective
Jon Lendrum

Viewers also liked (13)

La descentralizaci坦nLa descentralizaci坦n
La descentralizaci坦n
leonelcamacaro
6xi5c.pdf
6xi5c.pdf6xi5c.pdf
6xi5c.pdf
Jeff Smith
Quanta voglia hai di correre?
Quanta voglia hai di correre?Quanta voglia hai di correre?
Quanta voglia hai di correre?
Chiesa Cristiana Evangelica della Vera Vite
PLC BASICPLC BASIC
PLC BASIC
Ideji Collins
Boletim 27 05-2016Boletim 27 05-2016
Boletim 27 05-2016
Thiago Tavares
EDEHA-IDEJI EMAMEZI C. GHSE CERTIFICATE
EDEHA-IDEJI EMAMEZI C. GHSE CERTIFICATEEDEHA-IDEJI EMAMEZI C. GHSE CERTIFICATE
EDEHA-IDEJI EMAMEZI C. GHSE CERTIFICATE
Ideji Collins
Final
FinalFinal
Final
Anne-Stuart Teter
Sisense and Simba MongoDB Analytics Webinar
Sisense and Simba MongoDB Analytics WebinarSisense and Simba MongoDB Analytics Webinar
Sisense and Simba MongoDB Analytics Webinar
Simba Technologies
Mali ulke raporu_2013
Mali ulke raporu_2013Mali ulke raporu_2013
Mali ulke raporu_2013
UlkeRaporlari2013
ALFA ROMEO ALFETTA: AN INCREDIBLE ADVENTURE IN 1973!
ALFA ROMEO ALFETTA: AN INCREDIBLE ADVENTURE IN 1973!ALFA ROMEO ALFETTA: AN INCREDIBLE ADVENTURE IN 1973!
ALFA ROMEO ALFETTA: AN INCREDIBLE ADVENTURE IN 1973!
Maurizio Sala
Ingiltere ulke raporu_2013
Ingiltere ulke raporu_2013Ingiltere ulke raporu_2013
Ingiltere ulke raporu_2013
UlkeRaporlari2013
Pakistan ulke raporu_2013
Pakistan ulke raporu_2013Pakistan ulke raporu_2013
Pakistan ulke raporu_2013
UlkeRaporlari2013
La descentralizaci坦nLa descentralizaci坦n
La descentralizaci坦n
leonelcamacaro
PLC BASICPLC BASIC
PLC BASIC
Ideji Collins
Boletim 27 05-2016Boletim 27 05-2016
Boletim 27 05-2016
Thiago Tavares
EDEHA-IDEJI EMAMEZI C. GHSE CERTIFICATE
EDEHA-IDEJI EMAMEZI C. GHSE CERTIFICATEEDEHA-IDEJI EMAMEZI C. GHSE CERTIFICATE
EDEHA-IDEJI EMAMEZI C. GHSE CERTIFICATE
Ideji Collins
Sisense and Simba MongoDB Analytics Webinar
Sisense and Simba MongoDB Analytics WebinarSisense and Simba MongoDB Analytics Webinar
Sisense and Simba MongoDB Analytics Webinar
Simba Technologies
ALFA ROMEO ALFETTA: AN INCREDIBLE ADVENTURE IN 1973!
ALFA ROMEO ALFETTA: AN INCREDIBLE ADVENTURE IN 1973!ALFA ROMEO ALFETTA: AN INCREDIBLE ADVENTURE IN 1973!
ALFA ROMEO ALFETTA: AN INCREDIBLE ADVENTURE IN 1973!
Maurizio Sala
Ingiltere ulke raporu_2013
Ingiltere ulke raporu_2013Ingiltere ulke raporu_2013
Ingiltere ulke raporu_2013
UlkeRaporlari2013
Pakistan ulke raporu_2013
Pakistan ulke raporu_2013Pakistan ulke raporu_2013
Pakistan ulke raporu_2013
UlkeRaporlari2013

Similar to LiPari_MedicalDevices (20)

Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
Unisys Corporation
Threatsploit Adversary Report January 2019
Threatsploit Adversary Report January  2019Threatsploit Adversary Report January  2019
Threatsploit Adversary Report January 2019
Briskinfosec Technology and Consulting Pvt Ltd
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity Guidance
Pam Gilmore
Hot Topics in Privacy and Security
Hot Topics in Privacy and SecurityHot Topics in Privacy and Security
Hot Topics in Privacy and Security
PYA, P.C.
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Christopher Daza
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gkoIoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
Glen Koskela
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
mosmedicalreview
The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity GuidanceThe FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
Valdez Ladd MBA, CISSP, CISA,
Safety of protected health information (phi)
Safety of protected health information (phi)Safety of protected health information (phi)
Safety of protected health information (phi)
Josette Pribilla
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITALINCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
IJNSA Journal
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
wlynn1
Data Breach: It Can Happen To You
Data Breach: It Can Happen To YouData Breach: It Can Happen To You
Data Breach: It Can Happen To You
Cooperative of American Physicians, Inc.
Cybers辿curit辿 des dispositifs m辿dicaux
Cybers辿curit辿 des dispositifs m辿dicauxCybers辿curit辿 des dispositifs m辿dicaux
Cybers辿curit辿 des dispositifs m辿dicaux
Market iT
Ivanti threat thursday deck october v2
Ivanti threat thursday deck october v2Ivanti threat thursday deck october v2
Ivanti threat thursday deck october v2
Ivanti
Digital Health Data
Digital Health DataDigital Health Data
Digital Health Data
Shahidul Islam Khan Nayeem
Systems Thinking on a National Level, Part 2Drew David.docx
Systems Thinking on a National Level, Part 2Drew David.docxSystems Thinking on a National Level, Part 2Drew David.docx
Systems Thinking on a National Level, Part 2Drew David.docx
perryk1
Top 5 Challenges in Healthcare Data Security & Their Solutions
Top 5 Challenges in Healthcare Data Security & Their SolutionsTop 5 Challenges in Healthcare Data Security & Their Solutions
Top 5 Challenges in Healthcare Data Security & Their Solutions
Saad Sarwar
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
EMC
TIPPSS for Enabling & Securing our Increasingly Connected World Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World  Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World  Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World Trust, Iden...
PacificResearchPlatform
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in Healthcare
Doug Copley
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
Unisys Corporation
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity Guidance
Pam Gilmore
Hot Topics in Privacy and Security
Hot Topics in Privacy and SecurityHot Topics in Privacy and Security
Hot Topics in Privacy and Security
PYA, P.C.
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gkoIoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
Glen Koskela
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
mosmedicalreview
The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity GuidanceThe FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
Valdez Ladd MBA, CISSP, CISA,
Safety of protected health information (phi)
Safety of protected health information (phi)Safety of protected health information (phi)
Safety of protected health information (phi)
Josette Pribilla
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITALINCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
IJNSA Journal
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
wlynn1
Cybers辿curit辿 des dispositifs m辿dicaux
Cybers辿curit辿 des dispositifs m辿dicauxCybers辿curit辿 des dispositifs m辿dicaux
Cybers辿curit辿 des dispositifs m辿dicaux
Market iT
Ivanti threat thursday deck october v2
Ivanti threat thursday deck october v2Ivanti threat thursday deck october v2
Ivanti threat thursday deck october v2
Ivanti
Systems Thinking on a National Level, Part 2Drew David.docx
Systems Thinking on a National Level, Part 2Drew David.docxSystems Thinking on a National Level, Part 2Drew David.docx
Systems Thinking on a National Level, Part 2Drew David.docx
perryk1
Top 5 Challenges in Healthcare Data Security & Their Solutions
Top 5 Challenges in Healthcare Data Security & Their SolutionsTop 5 Challenges in Healthcare Data Security & Their Solutions
Top 5 Challenges in Healthcare Data Security & Their Solutions
Saad Sarwar
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
EMC
TIPPSS for Enabling & Securing our Increasingly Connected World Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World  Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World  Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World Trust, Iden...
PacificResearchPlatform
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in Healthcare
Doug Copley

LiPari_MedicalDevices

  • 1. Phillip LiPari, Writing for Intelligence 4 December 2015 Cyber-ThreatPosed by IncreasingMedicalDeviceConnectivity Executive Summary: Increasing internet connectivity of medical devices is likely to increase the vulnerability of medical centers to cyber-attacks through 31 December 2015. Threat actors target intellectual property (IP) including the IP stored on medical devices and personal data on hospital networks considered useful in targeted spear-phishing attacks. This personal data includes sensitive healthcare information which draws attention and gives a phishing email legitimacy. Discussion: Medical devices often run on outdated operating systems (OSs) due to their and lack of prior connectivity to the internet.1 Since these devices were designed for internet connectivity they often operate on Windows XP or other systems outdated systems. These OSs were not designed to counter current cyber-threats and are more vulnerable than updated versions.2 The FDA has expressed concern of the rapid increase in medical device connectivity using off the shelf (OTS) software.3 IP stored on medical devices includes research data and device designs.4 Threat actors infiltrating these devices gain access to their functionality as well as academic or medical research they are used for. Pictured right is a diagram illustrating a threat actor gaining access to a hospital network and IP stored there through a medical device. Sensitive personal information is often stored on medical devices as well as the networks these devices are connected to. Healthcare information contains patient treatment files as well as data on the doctor treating the patient.5 Threat actors can use this information to craft detailed spear-phishing attacks. A threat actor may include new treatment plans or other sensitive information in the subject line in order to give the email a sense of urgency and legitimacy. Two cybersecurity researchers revealed they had used the vulnerability search engine Shodan to expose over 68,000 medical devices from an unnamed organization. These researchers also posted false advertisements for medical device vulnerabilities and received a number of potential bidding offers.6 These researchers illustrated the ease of compromising medical devices and that there is a community interested in this. Personal IP Research data
  • 2. Source Reliability: High Analytic Confidence: Medium Analytic Confidence: The analyst worked with a small group to compile this information. The deadline was reasonable and the information was simple to find. The analyst did not use structured analytic methods. With questions and comments, please contact the author: Phillip LiPari 1 http://gizmodo.com/thousands-of-medical-devices-are-open-to-hacking-over-t-1733961503 (M) 2 https://blogs.microsoft.com/cybertrust/2013/08/15/the-risk-of-running-windows-xp-after-support-ends-april- 2014/ (L) 3 http://www.fda.gov/RegulatoryInformation/Guidances/ucm077812.htm (H) 4 http://www.pabstpatent.com/medical-devices (H) 5 http://www.forbes.com/sites/bernardmarr/2015/04/21/how-big-data-is-changing-healthcare/ (M) 6 http://www.bbc.com/news/technology-34390165 (M)