Hacking Medical Devices

Similar documents
Evaluating the Security of Your IT Network. Vulnerability Scanning & Network Map

Healthcare IT A Monitoring Primer

RS TechMedic BV the Netherlands T: vision.com

FDA & Medical Device Cybersecurity

Managing Remote Medical Devices Through The Cloud. Joel K Young SVP of Research and Development & CTO Digi International Friday, September 9 11:30AM

HEALTH CARE AND CYBER SECURITY:

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

Practical Guide to the FDA s Postmarket Cybersecurity Guidance

Session 5311 Critical Testing Programs for Security Operations

Trusted Computing Today: Benefits and Solutions

Medical Devices and Cyber Issues JANUARY 23, American Hospital Association and BDO USA, LLP. All rights reserved.

Securing WMSN using SHAREMIND

Healthcare Hacked. Mayra Rosario Fuentes/Numaan Huq Forward Looking Threat Research (FTR) Sr. Threat Researcher

Enabling Breakthroughs in Medical Electronics. Karthik Vasanth, Ph.D General Manager, Medical and High Reliability Business Unit

Evaluation of ZigBee Protocol Network Topologies in Medical Monitoring Environments

Medical Device Safety in a Connected World

Addressing the elephant in the operating room: a look at medical device security programs

Connected Medical Devices

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

JUST WHAT THE DOCTOR ORDERED: A SOLUTION FOR SMARTER THERAPEUTIC DEVICES PLACEHOLDER IMAGE INNOVATORS START HERE.

Internet of Things. Internet of Everything. Presented By: Louis McNeil Tom Costin

Creating Solutions for Health through Technology Innovation

Banner Health Information Security and Privacy Training Team. Morgan Raimo Paul Lockwood

GDPR: An Opportunity to Transform Your Security Operations

HIPAA in 2017: Hot Topics You Can t Ignore. Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017

Addressing Cybersecurity in Infusion Devices

Main objectives or functions can be modelled like different blocks or components that can be observed in Figure 1. Figure 1: HOPE System Architecture

Governance Ideas Exchange

Medical Devices Cybersecurity? Introduction to the Cybersecurity Landscape in Healthcare

Always in touch. IntelliVue Telemetry System with Smart-hopping technology, surveillance of ambulatory cardiac patients

MEDICAL DEVICE SECURITY. A Focus on Patient Safety February, 2018

The Windstream Enterprise Advantage for Healthcare

Pass4suresVCE. Pass4sures exam vce dumps for guaranteed success with high scores

ips.insight.com/healthcare Identifying mobile security challenges in healthcare

Distributed Pervasive Systems

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS

The Internet of Things. Steven M. Bellovin November 24,

Electronic Communication of Personal Health Information

The ABCs of HIPAA Security

Introduction Privacy, Security and Risk Management. What Healthcare Organizations Need to Know

CYBER SECURITY AND MITIGATING RISKS

Datasheet FUJITSU Software Cloud Monitoring Manager V2.0

Security Policies and Procedures Principles and Practices

Designing Secure Medical Devices

Memorial Hermann Health System Eases Encryption with Zix

Internet of Medical Things (IoMT)

i 4 imm Compact Critical Care Monitor GE Healthcare Modular monitoring for critical care

Business Web Application Testing A new perspective to an old art OWASP. The OWASP Foundation

FOCUS - ON - PATIENTS. corpuls aed

Cisco BioMed NAC Solution for Healthcare: Flexible, Cost-Effective Provisioning for Identified Networked Biomedical Devices

Is Your Web Application Really Secure? Ken Graf, Watchfire

Medigate and Palo Alto Networks Integration

Are You Avoiding These Top 10 File Transfer Risks?

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

Security Audit What Why

Cybersecurity and Hospitals: A Board Perspective

Meaningful Use or Meltdown: Is Your Electronic Health Record System Secure?

Be effective in protecting against the cybercrime

Strong Security Elements for IoT Manufacturing

NARRATOR: Welcome to the RSA Conference 2016 StoryCorps. podcasts. Please enjoy this discussion between fellow

Jeff Wilbur VP Marketing Iconix

ARE YOUR RACK PDUS KEEPING YOU FROM OPTIMIZING POWER MANAGEMENT?

Information Governance, the Next Evolution of Privacy and Security

Designated Cyber Security Protection Solution for Medical Devices

Towards an integrated regulation platform in Luxembourg. Information Security Education Day th of april

Train employees to avoid inadvertent cyber security breaches

Cyber Incident Response: Step 1

The Connected Water Plant. Immediate Value. Long-Term Flexibility.

Media centre Electromagnetic fields and public health: mobile phones

Cyber Security For Utilities Risks, Trends & Standards. IEEE Toronto March 22, Doug Westlund Senior VP, AESI Inc.

Query Auditing for Protecting Sensitive Attributes in Statistical Databases

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

PCI Compliance. What is it? Who uses it? Why is it important?

A compliance journey to the cloud how to build a medical cloud platform regulatory- and ISO27000-compliant. Carl Zeiss Meditec AG Thorsten Bischoff

Automated Mobile Security (ESUKOM)

Cyber Attack: Is Your Business at Risk?

RiskSense Attack Surface Validation for Web Applications

CompTIA CAS-003. CompTIA Advanced Security Practitioner (CASP)

Countermeasures and Best Practices Track 1: Large Business Sophisticated IT Security Program

Security Challenges with ITS : A law enforcement view

Cisco Wireless Video Surveillance: Improving Operations and Security

VMDK Has Left the Building

CYBERSECURITY. Recent OCR Actions & Cyber Awareness Newsletters. Claire C. Rosston

Cybersecurity Today Avoid Becoming a News Headline

SECURITY & PRIVACY DOCUMENTATION

Hospital IT and Facilities Special Report Top concerns in the hospital include budget, power requirements

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

INTERNET OF THINGS. Presented By Erin Bosman & Julie Park, Morrison & Foerster LLP ACC 14th ANNUAL GC ROUNDTABLE AND ALL DAY MCLE

2017 RIMS CYBER SURVEY

Document Number: rev D Intuitive Surgical, Inc. OnSite Overview. for the da Vinci Xi and da Vinci Si Surgical System.

HEALTHCARE SOLUTIONS WITH RENESAS SYNERGY PLATFORM

Cybersecurity and Nonprofit

Securing Industrial Control Systems

2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification

The Data Breach: How to Stay Defensible Before, During & After the Incident

Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

Data Backup and Contingency Planning Procedure

The GAL Middleware Platform

Transcription:

Hacking Medical Devices All your vital signs are belong to us

#2 Blog: Conference: Florian Grunow Security Analyst ERNW GmbH in Heidelberg Team Lead: Pentests Research: Medical Devices

#3 Agenda Motivation Publications The Problem Targets Findings so far Questions

#4 Disclaimer All products, company names, brand names, trademarks and logos are the property of their respective owners!

#5 Motivation Make the world a safer place

Motivation Importance We trust these devices Doctors trust these devices Technology Rocket science: e.g. MRI Proprietary protocols Every device is different 10/30/2014 #6

#7 Publications so far What has been done

#8

#9

#10

#11

#12

#13

#14

#15

#16 http://arstechnica.com/tech-policy/2014/10/feds-examining-medical-devices-for-fatal-cybersecurity-flaws/

#17 The Problem Anamnesis

#18 Siemens Sirecust BS1 In the old days

#19 Nihon Kohden Neurofax EEG In the old days

#20 The Change Optimization of processes Good or bad? New com options available Lowering costs Especially on Intensive Care Units (ICUs) Interoperability E-Health records PACS Personal Health

The Gathering Standard anesthesia devices

#22 Are we Ready? What about IT in hospitals? Resources / Know-how Different types of networks Doctors Patients Devices Guests Research Semi-New technologies on the rise -> No experience Remote maintenance (non-optional?)

Are we Ready? What about home monitoring? Devices for personal health Transmitting wireless / Upload to provider Need to be integrated without hassle What could possibly go wrong? Think pre-calculated encryption keys in home routers Must not be expensive Privacy? 10/30/2014 #23

The Scale Home Monitoring

#25 Privacy?

#26 Privacy? HTTP! omfgstfu

Are they Ready? What about the vendors? Same mistakes again? Learning curve WiFi Car keys Exploiting like in the old days? We are not really using this port, the board came with it! We are fine, we have two network interfaces (trusted/untrusted)! 10/30/2014 #27

#28 What is Important for Compliance? Focus is on safety not security Especially important in Germany We do not even have these words Safety mostly works Still have bugs like: Device showing asystole alarm when patient is fine Does security? We only need to make sure that there are proper authorization mechanisms A hacker will always find a way 510(k) assumes there is no hostile environment, doctor will not harm patient, patient will not harm himself or doctor Certification Focus on safety, too

#29 Problem Summary Little resources on customer s side Little experience with incidents on vendor/hospital side Safety vs. Security This could kill you!

#30 Targets What are we looking at?

Targets Medical devices with enabled com Com is in places you would never suspect Severity Rating : Low: Monitoring stuff Medium: Diagnostic systems High: Feedback to patient 10/30/2014 #31

#32 Monitoring

#33 Diagnostic

#34 Feedback

#35 Targets Hard to get hands on devices Vendors have little interest? Lack of experience? Expensive Cooperations What about liability? Hard to test!

#36 Targets What we looked at so far

#37 Target Example: EEG Measures brain waves Used in small/medium sized medical offices Grey box and software on a host Communication via LAN Can be deployed in different rooms Grey box <- UDP -> Host No auth, no encryption, no security Full remote control of the box

#38 Target example: EEG Box for electrodes

#39 Off-Topic for a Second OpenEEG project Build your own EEG Do crazy Biofeedback stuff Brain-to-computer interface

DIY: EEG OpenEEG Project

#41 Disclaimer There will be no details yet on how the exploits work as this might pose a threat to life or the physical condition of patients!

#42 Target: Patient Monitor 1 Widely used in hospitals ICU During operation Monitors critical vital signs SPO2 Blood Pressure ECG Temperature Respiration More

#43 Target: Patient Monitor 1 Unreasonable Configuration

10/31/2014 #44 Target: MRI Really cool!

Target: MRI Consists of: Host System Windows based PC Image Processing System Retrieves the raw data and constructs images Control System Controls hardware of the MRI (basically patient table, coils, etc.) 10/31/2014 #45

10/31/2014 #46 Target: MRI

10/31/2014 #47 Target: MRI Host System

10/31/2014 #48 Target: MRI Host System Open Ports: 114

10/31/2014 #49 Target: MRI Host System After portscan

10/31/2014 #50 Target: MRI Guest WiFi

#51 Target: Syringe Pump Demo: Infusion Override

Target: Patient Monitor 2 2 central elements ARM for peripherals and probably signal processing Control the pump for blood pressure Maybe FFT ARM for user interaction RX / TX to the peripheral board ARM926EJ-S @ 400MHz 64MB RAM 10/30/2014 #52

#53 Target: Patient Monitor 2 Signal Processing / Frontend

#54 Target: Patient Monitor 2 Demo: Pwning vital signs

#55 Targets There is more to come! Cooperations with hospitals Information Gathering reveals promising results Radiology Equipment: MRIs X-Rays Hospital Infrastructure Physical Access Control Systems Aneasthesia devices

#56 Final Words We need to test these devices! Responsible disclosure process is critical! Get your hands dirty! There will be more publications from ERNW! Stay tuned!

#57 Questions?

#58 Thank you! Please consult your doctor or pharmacist for risks and side effects of this presentation