Albuquerque Journal

Hackers got into hospitals despite software warnings

Security warnings issued in 2007, 2010

-

WASHINGTON — The hackers who seriously disrupted operations at a large hospital chain recently and held some data hostage broke into a computer server left vulnerable despite urgent public warnings in 2007 and in 2010 that it needed to be fixed with a simple update, The Associated Press has learned.

The hackers exploited design flaws that had persisted on the MedStar Health Inc. network, according to a person familiar with the investigat­ion. The flaws were in a JBoss applica- tion server supported by Red Hat Inc. and other organizati­ons, the person said.

The FBI, which is investigat­ing, declined to discuss how the hackers broke in.

The JBoss technology is popular because it allows programmer­s to write custom-built software tools that can be quickly made available across a company, but security researcher­s discovered it was routinely misconfigu­red to allow unauthoriz­ed outside users to gain control. The U.S. government, Red Hat and others issued urgent warnings about the security problem and a related flaw in February 2007, March 2010 and again earlier this week. The government warned in 2007 the problem could disrupt operations and allow for unauthoriz­ed disclosure­s of confidenti­al informatio­n.

Fixing the problem involved installing an available update or manually deleting two lines of software code.

It was not immediatel­y clear why the hospital chain, which operates 10 hospitals in Maryland and Washington, including the MedStar Georgetown University Hospital, was still vulnerable years after those warnings. The new disclosure doesn’t diminish the potential culpabilit­y of the hackers responsibl­e for the breakin, but it reveals important details about how the crime unfolded. And it could affect MedStar’s civil or administra- tive exposure under U.S. laws and regulation­s that require health providers to exercise reasonable diligence to protect their systems.

MedStar’s assistant vice president, Ann C. Nickles, said in a statement Tuesday to the AP that the company “maintains constant surveillan­ce of its IT networks in concert with our outside IT partners and cybersecur­ity experts. We continuous­ly apply patches and other defenses to protect the security and confidenti­ality of patient and associate informatio­n.” MedStar said Monday its systems “are almost fully back online,” just over a week after the March 28 hacking.

Newspapers in English

Newspapers from United States