Most connected medical devices contain multiple flaws that make them vulnerable to hacks. Credit: Thinkstock For years, since the Internet of Things (IoT) made it possible to connect things that had never been designed to be connected, there have been increasing warnings that medical devices were vulnerable to attacks – potentially catastrophic attacks.If online attackers can control your implanted heart device, they can blackmail you, damage you, even kill you.Based on a couple of sessions at the SOURCE Boston conference this week, the bad news is that things have not measurably improved in the several years since former Vice President Dick Cheney famously had the wireless functionality of his implanted defibrillator and heart pump disabled because of fears that it could be hacked and used to assassinate him.The somewhat better news is that it is possible to improve the security of those devices, and there are organized efforts to do that without compromising their access and value to practitioners and patients. Chris Schmidt, chief guidance officer at Codiscope, was the bearer of most of the bad news. In a talk titled, “The Bad Guys Have Your Pacemaker: How to Stop Attacks on Your IoT Devices,” he said that in a recent investigation of “smart” pacemakers, “we discovered a lot of scary things,” indicating that application security still, “gets the least amount of attention.”[ MORE FROM SOURCE: SOURCE 2016: It’s behavior, not names, that gives attackers away ] Among them:Cross-site Scripting (XSS): ): “This combined with issues in State Management could make it possible for an attacker to gain access to an ongoing session in the command and control app,” Schmidt said.Insecure two-factor authentication: “This is a bigger problem than some people realize,” he said. “The token is your only defense if someone has your password. If I guess your token, it’s game over.”Backdoors: They create a way into command and control.Remote Command Execution: The kind of thing that made Dick Cheney nervous.Man-in-the-Middle vulnerability: “It’s not hard to get into the middle of a network,” he said. “Government is in the middle of every network, at least they try to be.”Schmidt said he could spend three weeks talking about successful intrusions into IoT devices – baby monitors, thermostats, refrigerators, printers, cars and more.“And those are just the ones we know about,” he said. “There are probably at least 10 times that amount.”There are other systemic factors that make medical device security difficult, according to Penny Chase and Steve Christey Coley, of the MITRE Corporation.In a talk titled, “Toward Consistent, Usable Security Risk Assessment of Medical Devices,” they noted that those devices:Generally incorporate third-party software, operating systems and workstations.Are subject to regulation, which can limit ability to patch and reconfigure them.Are exposed to limited clinical trials, so many flaws aren’t discovered until devices are on the market.Are made by manufacturers who don’t incorporate security testing.Besides all that, they noted that the interests of multiple stakeholders – researchers, manufacturers, providers, patients and regulators like the Food and Drug Administration (FDA) are involved. Amid all that bad news, Schmidt insisted that, “all hope is not lost,” because the problems with those devices are mostly the same and, at least from the technical standpoint, “they’re not hard to fix.”The solution, he said, is to “build security in” – something his former boss, Gary McGraw, CTO of Cigital, has been preaching for more than a decade, and even wrote a book with that title 10 years ago.That, he said, means making it part of the process from the beginning – the design phase. He noted that there are secure software development practices available, and that sites like GitHub have made peer review simple.“Be transparent while you’re building, not after you’re on the market,” he said, noting that, “more eyes spot more bugs.” Finally, he urged developers to, “hack yourself. Try to break the stuff you created,” before putting it on the market.The message from Chase and Coley is that management of the risks of such devices requires, “a delicate balance of security, safety and privacy – they overlap.”“Each can interfere with the other,” Chase said. “You don’t want the AV (antivirus) firing during surgery.”And, for some patients, the availability of a device can trump the small risk that it could be compromised.That, they said, has led to efforts to adapt the Common Vulnerability Scoring System (CVSS) to healthcare, by focusing on what the actual impact of a vulnerability is on patient safety, when put in the context of its value to the providers and patients.The so-called “base score” can exaggerate the risk, they said, while undervaluing a device’s value to patients. They cited examples of a medical staff person being required to confirm the setting of a fusion pump before it is used, which presumably would catch an attempt by an attacker to change it remotely.They said one effort to bring context to the ranking of risks is to use other frameworks like the Common Weakness Scoring System (CWSS) and the related Common Weakness Risk Assessment Framework (CWRAF).“The goal is to take the environment into consideration along with the base score,” Coley said. “We don’t want FUD (fear, uncertainty and doubt) to make patients fearful of life-saving therapy.” Related content brandpost How an integrated platform approach improves OT security By Richard Springer Sep 26, 2023 5 mins Security news Teachers urged to enter schoolgirls into UK’s flagship cybersecurity contest CyberFirst Girls aims to introduce girls to cybersecurity, increase diversity, and address the much-maligned skills shortage in the sector. By Michael Hill Sep 26, 2023 4 mins Back to School Education Industry IT Training news CREST, IASME to deliver UK NCSC’s Cyber Incident Exercising scheme CIE scheme aims to help organisations find quality service providers that can advise and support them in practising cyber incident response plans. By Michael Hill Sep 26, 2023 3 mins IT Governance Frameworks Incident Response Data and Information Security news Baffle releases encryption solution to secure data for generative AI Solution uses the advanced encryption standard algorithm to encrypt sensitive data throughout the generative AI pipeline. By Michael Hill Sep 26, 2023 3 mins Encryption Generative AI Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe