Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Thousands of medical devices are vulnerable to hacking, security researchers say

James Niccolai | Oct. 1, 2015
The security flaws put patients' health at risk.

UCSF Medical Center at Mission Bay MRI
UCSF Medical Center at Mission Bay has been dressed up to look less threatening to patients. Credit: Matt Weinberger

Next time you go for an MRI scan, remember that the doctor might not be the only one who sees your results.

Thousands of medical devices, including MRI scanners, x-ray machines and drug infusion pumps, are vulnerable to hacking, creating significant health risks for patients, security researchers said this week.

The risks arise partly because medical equipment is increasingly connected to the Internet so that data can be fed into electronic patient records systems, said researcher Scott Erven, who presented his findings with fellow researcher Mark Collao at the DerbyCon security conference.

Besides the privacy concerns, there are safety implications if hackers can alter people's medical records and treatment plans, Erven said.

"As these devices start to become connected, not only can your data gets stolen but there are potential adverse safety issues," he said.

The researchers located medical devices by searching for terms like "radiology" and "podiatry" in Shodan, a search engine for finding Internet-connected devices.

Some systems were connected to the Internet by design, others due to configuration errors. And much of the medical gear was still using the default logins and passwords provided by manufacturers.

The researchers studied public documentation intended to be used to set up the equipment and found some frighteningly lapse security practices.

The same default passwords were used over and over for different models of a device, and in some cases a manufacturer warned customers that if they changed default passwords they might not be eligible for support. That's apparently because support teams needed the passwords to service the systems.

The researchers focused on equipment from GE Healthcare, but they said they could have picked any company. GE is "one of the more progressive" vendors and responded quickly when the flaws were pointed out, they said.

They built a word cloud showing the most frequently used logins and passwords for GE's products, which looked like this. 

word cloud of frequent logins and passwords
Word cloud showing default logins and passwords that were used frequently in GE medical devices. Credit: Scott Erven/Mark Collao

Evren noted that it doesn't require a malicious hacker for patients' safety to be compromised -- patients can put themselves at risk. He cited a case of two patients in hospital after an accident who hacked their pain medication drips in order to increase the dosage.

"If you're on morphine and you can figure out how to hack your own pump" then medical device security clearly "isn't very good," Evren said.

 

1  2  Next Page 

Sign up for Computerworld eNewsletters.