Source |
AlienVault Lab Blog |
Identifiant |
8611533 |
Date de publication |
2024-11-15 07:00:00 (vue: 2024-11-15 07:07:47) |
Titre |
Safeguarding Healthcare Organizations from IoMT Risks |
Texte |
The healthcare industry has undergone significant transformation with the emergence of the Internet of Medical Things (IoMT) devices. These devices ranging from wearable monitors to network imaging systems collect and process vast amounts of sensitive medical data based on which they make critical decisions about patients\' health. But at the same time, they also raise serious privacy and security concerns.
Cybercriminals often target vulnerabilities within these devices to gain entry into the hospital network and compromise healthcare data. Attacks on these interconnected devices cause life-threatening harm to patients, disrupt services, and bring financial and reputational costs to medical centers.
As hackers increasingly target IoMT devices and present significant threats to medical organizations, it is crucial to combat these risks and ensure patient safety.
Current Security Landscape of Medical Connected Devices
The global healthcare medical device market is expected to reach $332.67 billion by 2027. The acceleration in IoMT adoption shows that the healthcare industry found this technology useful. However, this innovation also carries possible threats and challenges. Below is an insight into the key security challenges that these IoT devices come with:
Ransomware Attacks
Cybercriminals often target medical devices and networks to access sensitive information like protected health information (PHI) and electronic health records (EHR). They even steal this information to put it up for sale on the dark web and, in return, demand hefty ransom.
For instance, in the crippling ransomware attack against Change Healthcare, the criminal gang ALPHV/Blackcat stole 4TB of patients\' records and affected one-third of people living in the USA. The stolen data was up for sale on the black market until hackers received $22 million as a ransom payment. Such incidents erode patients\' trust and cause healthcare organizations to face HIPAA violations ranging from $100 to $50,000 per violation.
Vulnerabilities Exploitation
Medical devices such as infusion pumps or pacemakers are not designed with security in mind. As a result, they may come with security vulnerabilities that hackers can exploit to get unauthorized access to medical data. For example, the Nozomi Network Lab found several security flaws within the GE Healthcare Vivid Ultrasound family that hackers can exploit to launch ransomware attacks and manipulate patients\' data.
Previously, the Palo Alto Network discovered 40 vulnerabilities and more than 70 security alerts in infusion pumps, putting them at risk of leaking sensitive information. Similarly, McAfee researchers identified significant vulnerabilities in two types of B.Braun infusion pumps that could enable hackers to deliver a lethal dosage of medications to suspected patients. Although no affected case was reported, this event highlighted the gaps in medical device security and the need for improvement.
Outdated and Unpatched Medical Devices
Outdated systems remain a top challenge for medical IoT as healthcare organizations continue to rely on legacy systems. Many of these devices aren\'t designed with security in mind and stay in use for years and even decades.
The device manufacturers are reluctant to upgrade the system software because it |
Notes |
★★
|
Envoyé |
Oui |
Condensat |
$100 $22 $332 $50 000 2024 2027 4tb ability about acceleration access accessible across actions active activities added address addressing adheres adoption advanced affected affecting against aims alerts allow allows alphv/blackcat also although alto ambulance among amounts analysis apart apply approach apps archiving are aren assessment attack attackers attacks authentic authenticate authorize authorized average awareness based because before behavioral below best between billion black block blockchain blockchains boost both braun breach breaches bring budgets but can capacity care carries case categorize categorizing cause centers chain challenge challenges change checking collect combat come communicate communication compliance comply comprehensive compromise concerns conduct configuration connected consider considerable consistently constantly consult consume continue continuously control controls conventional costs could create criminal crippling critical crucial cryptographic current cyber cybercriminals cybersecurity dark data decades decentralized decisions deliver delivery demand described designed detect deviations device devices diagnosis dicom discovered dispensing disrupt distributing division dosage downside each effectively efficiently ehr ehrs electrocardiograph electronic embracing emerged emergence emerging employees empowers enable encrypting encryption end endpoints energy enforcing enhance enormous ensure ensures ensuring entry environment erode errors establish evaluate even event example expected expensive experts exploit exploitation exploiting exposure external face facilities familiar family fbi fda final financial find firm firmware five flaws focus follow forescout found framework from frustrating full function future gain gang gaps get getting global great guide guidelines hackers hardware harm has have health healthcare hefty help helps here high higher highlighted highly hipaa hold hospital however ideal identified identify identity images imaging imdrf immediate impact impacted implement implementation implemented implementing improve improvement improves incident incidents include includes: incorporating increases increasingly industry information informed infusion initiatives innovation inquiries insight instance instead integral interconnected internal internet intuitive investing involves iomt iot iso isolates issue issues it’d its key known lab landscape lateral latest launch leaking least legacy less lethal level life like limitations limited limits links lives living machines mainly maintains make makes making malware management managing manipulate manufacturers manufacturing many market may mcafee measures medical medication medications might million mind minimum mitigate model monitors month more movement much must named need network networks new nist not notifies nozomi offers often once one ones ongoing only operating operations opportunities optimize organizations ortivus other outdated overcome pacemakers pacs palo parties party patches patching patient patients patterns payment people per perform personal phi phone picture place platform plays point points policies pose poses posing possible posture potential practice present prevent preventing prevents previous previously principle principles privacy privilege proactive process processes productivity professionals promptly prone protect protected protections provided providers providing pumps put putting quality raise ranging ransom ransomware reach real receive received records reduce reduces regular regulations release reliance reluctant rely remain remaining remains report reported reputational required requires research researchers resilient resist resources respond restricting result return review revolutionize rights risk riskiest risks role run running safe safeguarding safety sale same secure securing security segmentation sensitive sensitivity serious serve services several severity should shows significant similarly software some spread staff: standard standards stay steal step steps stole stolen storing stra |
Tags |
Ransomware
Malware
Vulnerability
Threat
Patching
Medical
Technical
|
Stories |
|
Move |
|