The Arizona Republic

Beating the hackers

UA event focuses on cybersecur­ity for high-tech medical devices

- JULIANNE STANFORD THE REPUBLIC | AZCENTRAL.COM

An event at the University of Arizona’s medical school in Phoenix focuses on an emerging concern in medicine: Since new pacemakers, insulin pumps and other devices feature wireless connectivi­ty, could a hacker gain access to them?

Five years ago, Marie Moe collapsed, unconsciou­s, because her heart “was taking a break.”

Her heart rate dropped to 30 or 40 beats per minute, and she was rushed to the hospital to have a life-saving pacemaker installed.

At the time, Moe, who holds a doctorate in informatio­n security, was working for the Norwegian government as an incident responder, running an operation center to react to cyberattac­ks.

Soon after recovering from her operation, Moe began to wonder: What if her pacemaker could be hacked?

Preventing device cyberattac­ks

More than 100 medical profession­als, cybersecur­ity experts, law-enforcemen­t officials, policy makers and hackers gathered at the University of Arizona College of Medicine in Phoenix on Thursday and Friday to start a conversati­on about the sort of response the medical and cybersecur­ity community can develop to treat or prevent this kind of attack from occurring.

Newer models of medical devices like pacemakers, insulin pumps and medication pumps have wireless connectivi­ty, so doctors can remotely access the device to monitor the patient or make changes to how the device operates.

But those very features also provide a back door for hackers to gain access to the device, just as they could any other informatio­n stored online.

“I found myself suddenly dependent on technology, inside of my body, that had connectivi­ty to the internet,” Moe said. “This worried me as a security researcher, because connectivi­ty leads to vulnerabil­ity, and I didn’t really trust the technology that was implanted inside of my body.”

If these medical-device security risks go unaddresse­d, Moe said, she worries it could “lead to potentiall­y lethal attacks if you have someone with malicious intentions.”

Dr. Jeff Tully, one of the conference organizers, said cybersecur­ity and medicine “are in a critical state … but we don’t want to be seen as alarmists. We don’t want people running and screaming out of our conference to their cardiologi­st to ensure that they’re not at risk for being hacked.”

While there hasn’t yet been a reallife documented case of a patient’s medical implant being hacked, research proves such an attack is possi-

ble. Event co-organizer Dr. Christian Dameff said he believes the medical-cybersecur­ity industry needs to be proactive, not reactive.

“When we know of the first patient that dies of a cyberattac­k … you can’t put the genie back in the bottle,” Dameff said. “It’s going to usher in a new era of health-care cybersecur­ity where hospitals are going to be scrambling. That’s not the time to do it — the time to do it is now.” Likewise for device manufactur­ers. “We’re going to need to turn our focus from when we design these things to make sure that cybersecur­ity is built in on the ground floor and not as an afterthoug­ht,” Tully said.

The U.S. Department of Health and Human Services’ Health Care Industry Cybersecur­ity Task Force issued a report June 2 on the evolution of medical technology and the potential security risks posed to patients.

The report found providers “cannot deliver effective and safe care without deeper digital connectivi­ty.” But if that system is “connected, but insecure, this connectivi­ty could betray patient safety, subjecting them to unnecessar­y risk and forcing them to pay unaffordab­le personal costs.” rooms, hooded individual­s nefariousl­y hacking and attacking the Pentagon,” Dameff said. “That’s not the case.”

In the world of hacking, there are two types: rogue “black hat” hackers seeking to exploit the system weaknesses they uncover, and “white hats,” the “good hackers,” who seek to build protection­s for systems after their weaknesses are discovered, Dameff said.

Having one foot in both worlds provides the doctors a clinical and technical perspectiv­e when considerin­g security concerns, Tully said.

“All throughout our medical training, we were exposed to how proliferat­ive technology has become in the care of our patients,” Tully said. “With our hacker background­s, we understood that these systems are no more different than your grandmothe­r’s email, or bank records that have been hacked, or the government structures that have been targeted by hackers.”

Tully and Dameff place medical technology into two categories:

Devices used to treat patients, such as imaging machines and implants like pacemakers.

Digital infrastruc­ture behind medical care, which includes electronic records and even the power grids that keep the lights on in hospitals.

Both are vulnerable to attack, the doctors said.

“Ransomware can target the infrastruc­ture of the hospital,” Tully said. “A more precise attack can take advantage of the fact that a pacemaker communicat­es with a device in the patient’s home before sending data over Wi-Fi to the doctor’s office.”

The threat of hacking medical systems isn’t the stuff of science fiction. Recently, there have been numerous highprofil­e instances of hacking that impeded the ability of medical profession­als to provide care to patients.

In May, a ransomware attack known as WannaCry targeted computers using outdated Windows software across the globe. Ransomware locks up a user’s computer, then scrambles and encrypts data that can only be unlocked when the decryption key is purchased from the hacker.

The computer system of the National Health Service, the national health-care system in the United Kingdom, was affected by the attack, which affected more than 200,000 victims in 150 countries.

It forced at least 16 NHS hospitals to cancel doctor’s appointmen­ts, delay surgeries and turn away patients. It took at least three days for the network to return to complete working order.

An August 2016 report issued by the U.S. Government Accountabi­lity Office found more than 113 million people had their health records hacked in 2015, which was the highest level since data tracking started in 2009.

The Hollywood Presbyteri­an Medical Center in California paid $17,000 in 2016 to buy a decryption code when a ransomware attack infected its computer systems. The hospital spent five days regaining control of the systems.

In 2014, the hacker collective Anonymous launched a denial-of-service attack against the Boston Children’s Hospital to make a political statement. This type of attack flooded the hospital’s servers, causing its website to shut down and affecting services for about a week.

Hackers can hold records hostage to extort money from hospitals or sell stolen personal informatio­n on the “dark net.” But when it comes to potentiall­y holding someone’s medical device hostage, the reason is less clear-cut, Tully said.

“There are probably as many different motivation­s as there are hackers, and some do it for financial means; some people do it to see if they can, because it’s a challenge; and some people do have malicious intent that they’d satisfy by being able to hurt people, whether it’s targeted or completely at random,” he said.

 ?? SAM CARAVANA/THE REPUBLIC ?? At the University of Arizona College of Medicine in Phoenix, Drs. Jeff Tully (left) and Christian Dameff stand over a dummy used in simulation­s of cyberattac­ks on medical devices. Dameff says the time to figure out how to prevent such attacks is now,...
SAM CARAVANA/THE REPUBLIC At the University of Arizona College of Medicine in Phoenix, Drs. Jeff Tully (left) and Christian Dameff stand over a dummy used in simulation­s of cyberattac­ks on medical devices. Dameff says the time to figure out how to prevent such attacks is now,...
 ?? SAM CARAVANA/THE REPUBLIC ??
SAM CARAVANA/THE REPUBLIC

Newspapers in English

Newspapers from United States