{"id":5361,"date":"2016-03-31T16:51:17","date_gmt":"2016-03-31T16:51:17","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5361"},"modified":"2020-04-10T03:33:20","modified_gmt":"2020-04-10T07:33:20","slug":"healthcare-and-cyberscare","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/healthcare-and-cyberscare\/5361\/","title":{"rendered":"Healthcare and cyberscare: study shows how vulnerable hospitals are"},"content":{"rendered":"<p>Public studies\u00a0aren\u2019t fear-mongering, however some cybersecurity-related news may make one feel uneasy. That\u2019s the case with the Kaspersky Lab\u2019s Global Research &amp; Analysis Team (GReAT)<a href=\"https:\/\/www.kaspersky.com\/about\/news\/virus\/2016\/How-I-Hacked-a-Hospital\" target=\"_blank\" rel=\"noopener nofollow\"> field study of the security of hospitals\u2019 IT systems<\/a>. As one may have already guessed, the situation there is, let\u2019s say, not good.<\/p>\n<p>The reason for this research is practical. As GReAT\u2019s Sergey Lozhkin writes in his report at Securelist, the year 2016 started with a number of security incidents related to hacks of hospitals and medical equipment.<\/p>\n<p>\u201cThey include a ransomware attack on a Los Angeles hospital, the same in two German hospitals, a case of researchers hacking a patient monitor and drug dispense system, an attack on a Melbourne hospital and so on \u2013 in just two months of 2016! This should be a real concern for the security industry.\u201d<\/p>\n<p>Indeed.<\/p>\n<p><strong>One could expect as much<\/strong><\/p>\n<p>Unfortunately, it is not a surprising development. Hospitals are very attractive targets for cybercriminals: lots of data, including the patients\u2019 personal information; also lots of internet-connected devices, including specialized medical equipment, not just PCs and staff\u2019s and patients\u2019 handhelds.<\/p>\n<p>Mr. Lozhkin\u2019s research proved that attackers can gain full access to the entire medical infrastructure.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-5362\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/03\/06020447\/Modern-hospital-infrastructure_fnl.png\" alt=\"Modern-hospital-infrastructure_fnl\" width=\"1000\" height=\"1000\"><\/p>\n<p>\u201cImagine a scenario \u2013 one that could be called a truly \u201ctargeted attack\u201d \u2013 whereby cybercriminals with full access to the medical infrastructure at a specific facility can manipulate the results of diagnosis or treatment systems. Because doctors in some cases will depend heavily on these sophisticated medical systems, such manipulation could result in the wrong treatment being given to a patient, worsening his or her medical condition.\u201d<\/p>\n<p>If it sounds like a scenario from some \u2018Mission Impossible\u2019 movie, i.e. unrealistic, we have to state regretfully that it is actually very realistic.<\/p>\n<p>And at the recent Kaspersky Security Analysts Summit Sergey Lozhkin presented his research showing how easy it was to find a hospital, get access to its internal networks, and gain control of an MRI device \u2013 locating personal data about patients and their treatment procedures, and then getting access to the MRI device file system.<\/p>\n<p>\u201cThe problem is not only one of weak protection of medical equipment, it has a much wider scope \u2013 the whole IT infrastructure of modern hospitals is not properly organized and protected, and the problem persists worldwide\u201d, Lozhkin says.<\/p>\n<p>His report for Securelist is available <a href=\"https:\/\/securelist.com\/blog\/research\/74249\/hospitals-are-under-attack-in-2016\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>Below is 10-minute video interview with Mr. Lozhkin regarding his presentation at the SAS 2016.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/PDg5i11RT6k?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p><strong>Internet of scary things<\/strong><\/p>\n<p>The reason for this problem is rather familiar: while the industry of internet of things \u2013 which means that next to every new electric and electronic device is getting network-enabled for whatever reason \u2013 is on the rise, cybersecurity isn\u2019t (yet) perceived as a competitive advantage.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4297\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/03\/06020447\/carr_image.jpg\" alt=\"carr_image\" width=\"500\" height=\"499\"><\/p>\n<p>Modern medical devices are, in fact, fully-functional computers with operating systems and apps installed on them. These devices and their software are written with their primary goal in mind (i.e. medical treatment), but the cybersecurity aspects are often overlooked.<\/p>\n<p>This is highly characteristic of the entire IoT industry: the same has been observed before with cars and their infotainment systems.<\/p>\n<p>With medical equipment, however, the level of peril is even higher than with cars, as there\u2019s not much sophistication required to conduct an attack on them.<\/p>\n<p>As Mr. Lozhkin has shown, all it actually takes is Shodan search engine, which allows for\u00a0the finding of thousands of medical devices exposed \u2013 in all meanings\u00a0\u2013 to the Internet.<\/p>\n<p>\u201c\u2026A hacker could discover MRI scanners, cardiology equipment, radioactive medical and other related equipment connected to the Internet. A lot of these devices still operate under the Windows XP OS and have dozens of old, unpatched vulnerabilities that could lead to the full compromise of a remote system. Moreover, in some cases these devices have unchanged default passwords that could easily be found in manuals published on the Internet\u201d, \u2013 Sergey Lozhkin writes.<\/p>\n<p>Yes, default passwords are there. At the life-saving equipment. Because \u2013 \u201cwho would ever want to hack MRI device?\u201d\u2026<\/p>\n<p>Lozhkin also mentions that these devices aren\u2019t protected from being accessed from local networks too, and have their share of vulnerabilities in software as well.<\/p>\n<p>Neglecting even basic security measures \u2013 either by the equipment developers or users or both \u2013 becomes an issue of dramatic proportions and consequences if the worst scenario becomes a reality. Even if no serious damage to patients\u2019 health is inflicted,\u00a0from the business angle, the \u201chackability\u201d of medical equipment and hospital infrastructure is also a tremendous reputation risk.<\/p>\n<p><strong>Kaspersky Lab experts recommend implementing the following measures to protect clinics from unauthorized access:<\/strong><br>\n\u2022 Use strong passwords to protect all external connection points;<br>\n\u2022 Update IT security policies, develop on time patch management and vulnerability assessments;<br>\n\u2022 Protect medical equipment applications in the local network with passwords in case of an unauthorized access to the trusted area;<br>\n\u2022 Protect infrastructure from threats like malware and hacking attacks with a reliable security solution;<br>\n\u2022 Backup critical information regularly and keep a backup copy offline.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>Public studies aren&#8217;t there for any kind of fear-mongering, however some cybersecurity-related news really may make one feel uneasy. That&#8217;s the case with the Kaspersky Lab&#8217;s Global Research &amp; Analysis Team (GReAT) field study of the security of hospitals&#8217; IT systems. As one may have already guessed, the situation there is, let&#8217;s say, not good.<\/p>\n","protected":false},"author":209,"featured_media":15352,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2188,1671,1091,97,1460],"class_list":{"0":"post-5361","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-healthcare","10":"tag-hospitals","11":"tag-it","12":"tag-security-2","13":"tag-shodan"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/healthcare-and-cyberscare\/5361\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/healthcare-and-cyberscare\/15035\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/healthcare-and-cyberscare\/5361\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/healthcare-and-cyberscare\/5361\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/healthcare\/","name":"healthcare"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5361"}],"version-history":[{"count":8,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5361\/revisions"}],"predecessor-version":[{"id":34778,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5361\/revisions\/34778"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15352"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5361"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}