DerbyCon 2015: Thousands of online medical devices vulnerable to attacks

DerbyCon 2015: Linking medical equipment to the internet may have seemed like a very smart idea to you a few years ago.

But you will change your mind when you watch the presentation of Scott Erven and Mark Collao from the recent DerbyCon 2015 Security Conference.

DerbyCon medical devices

According to the two security researchers, over 68.000 medical systems are online, with at least 12.000 of them belonging to a single healthcare organization.

What is even more worrying is that most of these devices are connected to the Internet through computers running very old versions of Windows such as XP and 98, since they are known not to be upgraded and thus have many vulnerabilities .

All these devices are easily traced through Shodan, a search engine that can detect online devices online, and it's also easy to hack someone through brute-force attacks and using hard-coded logins.

During the of their research, the two experts came across anesthesia equipment, cardiology devices, nuclear medicine systems, infusion systems, pacemakers, MRI scanners, as well as archival images and communications tools, all with simple queries in Shodan.

Using their initial findings, the two security experts created honeypots ), on special servers that looked to the outside like medical devices, with vulnerability and fake medical data, but also with strong login credentials.

Making a screening of the logs collected by these honeypots, the researchers found that the attackers managed to pass SSH authentication over 55.000 times, and that they left behind 299 malware.

There have also been 24 cases where attackers have successfully exploited the vulnerability of MS08-067 XP, the same as that used in Conficker worm infections.

Researchers say that most of the time the attackers didn't realize exactly what they were hacking and were content to just leave an infected machine behind, just like a computer. of their.

If the hacker realized what he was doing, he could easily access patient information through these devices, even using the devices to spread a more dangerous malware inside the information infrastructure of the hospital, which would help them carry out even more disastrous attacks.

See the presentation of Scott Erven and Mark Collao in DerbyCon 2015, below:

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).