Rapid7 and Johnson & Johnson reveal vulnerabilities in the Animas OneTouch Ping insulin pump system that could be remotely exploited to trigger unauthorized insulin injections Rapid7 and Johnson & Johnson disclosed three vulnerabilities in the Animas OneTouch Ping insulin pump system, flaws that could be remotely exploited. However, the attack is sophisticated, and both say the risk of exploitation is “relatively low.”OneTouch Ping is a medical device that comes with a wireless remote control patients can use to deliver insulin instead of accessing the device under their clothes. The Johnson & Johnson Animas device is described as a “two-part system”: the pump and a meter remote, which communicates wirelessly via RF communication “to deliver insulin from the pump.”The flaws were discovered by Jay Radcliffe, a security researcher at Rapid7 and a diabetic who has previously disclosed vulnerabilities in an insulin device. This time, Radcliffe discovered the OneTouch Ping insulin pump system doesn’t use encryption to communicate. An attacker could spoof communications between the pump and the remote in order to force doses of insulin.Rapid7 explained that because the communications are in cleartext, “a remote attacker can spoof the Meter Remote and trigger unauthorized insulin injections.” Johnson & Johnson took an unprecedented step, since the manufacturer is the first to issue a warning about cyber vulnerabilities. Animas / Johnson & Johnson According to Reuters, Johnson & Johnson sent letters (pdf) to doctors and about 114,000 patients in the United States and Canada. It said, “The probability of unauthorized access to the OneTouch Ping system is extremely low.” Animus was able to exploit the vulnerabilities disclosed in Radcliffe’s research and confirmed “that a hacker could order the pump to dose insulin from a distance of up to 25 feet.”Rapid7 said, “It is believed these attacks could be performed from one to two kilometers away, if not substantially further, using sufficient elevation and off-the-shelf radio transmission gear available to ham radio hobbyists.”Not wanting non-technical diabetics to panic, Radcliffe clarified, “Most people are at limited risk of any of the issues related to this research. These are sophisticated attacks that require being physically close to a pump. Some people will choose to see this as significant, and for that they can turn off the RF/remote features of the pump and eliminate that risk.”He advised against freaking out and removing the pump, since “removing an insulin pump from a diabetic over this risk is similar to never taking an airplane because it might crash.”He added that if his kids were to become diabetics, then he “would not hesitate to put them on a OneTouch Ping. It is not perfect, but nothing is. In this process I have worked with Animas and its parent company, Johnson & Johnson, and know that they are focused on taking care of the patient and doing what is right.”Radcliffe did 90 percent of his research on the device that was attached to him for years. He wants medical devices to be safe in the future, urging vendors, regulators and researchers to work together. “As these devices get more advanced and eventually connect to the internet (directly or indirectly), the level of risk goes up dramatically,” he said.Rapid7 first reached out to the vendor in April. In September, Johnson & Johnson provided mitigations. Today, October 4, the vulnerabilities were revealed to the public.Radcliffe told Reuters that OneTouch Ping users should follow the steps in the letter from Johnson & Johnson in order to be safe. It explained how to turn off the pump’s radio frequency feature. Users who wish to leave RF on can limit the amount of bolus insulin that can be delivered, as well as turn on vibrating alerts; the alerts notify a patient that a dose is being initiated by the meter remote and gives them an option to cancel the dose.You can find Rapid7’s full findings about the “communications transmitted in cleartext, weak pairing between remote and pump, and lack of replay attack prevention or transmission assurance” here. Additionally, there is a demonstration video of an attack on the Animas OneTouch Ping. Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe