If security flaws in brain stimulation tech are not fixed, researchers warn that hackers will be able to target your memories, erase them or hold them for ransom in the future. Credit: Thinkstock Oh goody! Erasing memories or rewriting them and then implanting false ones are not just the stuff of sci-fi or horror flicks, as a new report warns that hackers will be able to attack the memories of people with implanted brain stimulation devices.New research by Kaspersky Lab and the University of Oxford Functional Neurosurgery Group identified vulnerabilities currently in implanted devices used for deep brain stimulation. The devices, known as neurostimulators or implantable pulse generators, send electrical impulses to parts of the brain; they can be used to treat disorders such as Parkinson’s disease, Obsessive–Compulsive Disorder, major depression and essential tremor.The brain implants come with management software which can be installed on tablets or smartphones; the connection is based on standard Bluetooth protocol. As for what hackers could do, the researchers listed the following as existing and potential risk scenarios:Exposed connected infrastructure: The researchers found one serious vulnerability and several worrying misconfigurations in an online management platform popular with surgical teams, which could allow an attacker to access sensitive data and treatment procedures.Insecure or unencrypted data transfer between the implant, the programming software and any associated networks: This could enable malicious tampering of a patient’s implant, or even tampering of whole groups of implants (and patients) connected to the same infrastructure. Manipulation could result in changed settings, causing pain, paralysis or the theft of private and confidential personal data.Design constraints as patient safety takes precedence over device security: For example, a medical implant needs to be controlled by physicians in emergency situations, including when a patient is rushed into a hospital far from their home. This precludes use of any password that isn’t widely known among clinicians. Further, it means that by default such implants need to be fitted with a software ‘backdoor.’Insecure behavior by medical staff. Devices with patient-critical software were found being left with default passwords, used to browse the internet or with additional apps downloaded onto them.Hellish hacks of the future But wait as there is so much more that attackers will be able to pull off in the future as scientists better understand the brain and the storing of memories. For example, within five years, scientists are expected to be capable of electronically recording brain signals that build memories or even rewriting those memories before stuffing them back into the brain. Commercial memory boosting implants are expected to hit the market in 10 years; in 20 years, it may be possible to allow for vast control over memories. The creepy things that hackers could do then include locking memories and holding them for flipping ransom, espionage-themed hacks such as spying on or stealing memories, erasing memories, and mass manipulation of memories to rewrite history. Thankfully, none of these attacks have yet been observed in the wild. Yet the researchers emphasized that current vulnerabilities in the tech need to be reduced or eliminated altogether before being built into the foundation of the future. If security and healthcare pros, developers and manufacturers start collaborating now to grasp the full range of risks and vulnerabilities, it will pay off in the future.I am going to be so ticked if the day comes when instead of still writing about ransomware hitting a company, the news will be about the memories of company personnel being locked and held for ransom – or even deleted for not paying the ransom demand. If some people can’t regularly patch, upgrade firmware or even backup their business data, will they be able to backup their brain data, their memories? Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe