Home > Security & Privacy
Pacemakers Are Far More Vulnerable To Hacking Than We Thought
Don Farrall
May 30th, 2017 | 09:05 AM | 2367 views
ENGADGET
A team of researchers find 8,000 bugs in pacemaker codes.
Back in January, the FDA has finally acknowledged that some pacemakers and other cardiac devices are vulnerable to hacking. But how vulnerable are they, exactly? A security company called WhiteScope has discovered 8,000 bugs that hackers can exploit in pacemaker programmers -- the tools used to adjust and monitor the device itself -- from four different manufacturers. More importantly, the researchers said they've also discovered that pacemakers don't authenticate programmers, so any working tool listed on eBay has the potential to harm patients with the implant.
Manufacturers are supposed to control programmers' distribution, but the researchers themselves got their test devices from the auction website for as little as $500 to as much as $3,000. In addition to those issues, the team has found that doctors' monitoring systems don't require log-in names and passwords when pacemakers connect to them. They even found unencrypted patients' data stored in the tools, including SSNs, names, phone numbers and medical conditions.
That said, Matthew Green, an Assistant Professor for Computer Science at Johns Hopkins, noted that doctors are adamant not to let security systems block patient care. He said that requiring passwords would merely lead to a "post-it note on the device listing the password," so every doctors' staff member can access the data they need. Green also called attention to some dubious parts of the study, particularly the lack of emphasis on the team's most alarming finding that third-party programmers can remotely access pacemakers:
24 May
Matthew Green @matthew_d_green
But the real concern I have boils down to what the report *doesn't* find in commercial cardiac devices. Here it is in a nutshell. 6/n pic.twitter.com/eZVe9XwgAw
Follow
Matthew Green @matthew_d_green
Despite the points Green raised, it's still true that various security researchers have been warning manufacturers about pacemakers' and other cardiac devices' vulnerabilities for years. Unfortunately, it sounds like very few listened: a separate study by security firm Ponemon Institute LLC found that only 17 percent of manufacturers took steps to secure their products. While we've yet to hear about an incident that has led to a patient's death, it's still ideal to make cardiac devices more secure as cyberattacks become more common, elaborate and sophisticated.
Source:
courtesy of ENGADGET
by Mariella Moon, @mariella_moon
If you have any stories or news that you would like to share with the global online community, please feel free to share it with us by contacting us directly at [email protected]