Computer software provides countless services in increasingly connected hospitals. But the loopholes they contain can also help cybercriminals.
IN A WORLD
OF SOFTWARE FLAWS
HEALTHCARE EQUIPMENT
SOFTWARE VECTOR
Software cyberattacks are any kinds of attack that exploit a weakness, flaw or obsolescence in software installed on computer equipment or a computerised medical device.
DEFINITION
( Video Motion Design )
These cyberattacks can made locally, provided the cybercriminal has physical or network access to their target within the hospital. But they can also occur remotely, if the same target is accessible via a computer network. This is, for example, the case with some medical equipment monitored by old operating systems.
Learn about the different ways in which software attacks can access hospital equipment.
ACCESSIBILITY
The majority of software cyberattacks target medical equipment. However, in some cases, the first machine to be attacked is only an intermediate step in reaching the real target: patient data, other medical or IT equipment, or even installations relating to the centralised building management system (BMS) or electrical technical management system.
TARGETS
The consequences of a software attack on a hospital can be varied, and often disastrous. They can take many forms, from industrial sabotage of health machines to the installation of ransomware, and including the extraction or corruption of health data.
Flat networks and lack of segmentation, obsolete operating systems, failure of updates: there can be many vulnerabilities in a hospital. It only takes one to be exploited for a virus to spread and bring the entire hospital infrastructure to be frozen. Focus on the subject with Marco Genovese, Presales Specialist Industrial Business Line Stormshield.
IMPACT
EXAMPLES
OF SOFTWARE ATTACKS
IN HOSPITALS
A German hospital fell victim to ransomware which was deployed by exploiting a software flaw in a Citrix network gateway. The cyberattack turned into a tragedy when one of the patients who could not be treated died during her transfer to another hospital.
Tragic attack at Düsseldorf hospital
2020 |
In 2020, a controversy uncovered a number of security flaws in a solution from the Dedalus group, specialising in healthcare software. One of them provided access to tickets opened by the company’s client hospitals and laboratories, in which remote administration identifiers and passwords could be found.
Security breaches
at Dedalus
2020 |
The emergency department at this hospital centre was the first to sound the alarm on an October night when they lost access to their business software. The culprit: Anti Recuva, malicious software which infiltrated the network as an email attachment, paralysing all Windows workstations by exploiting a flaw in the operating system.
Phishing case
at the Issoudun
Hospital Center
2019 |
The American authorities issued a warning over potential risks from implantable defibrillators produced by the Medtronic company, whose data transmission system could be hacked to disrupt its operation.
Critical flaw
in Medtronic defibrillators
2019 |
More about Stormshield solutions
To prevent software cyberattacks, it is essential to raise awareness among teams, and also to ensure that workstations comply with best practices in this area: limit application network access to what is strictly necessary, perform a systems audit, tighten configurations, and even perform offline backups. Security can also be delivered through the use of behavioural analysis on workstations and data encryption.
SOLUTIONS AND RECOMMANDATIONS
FOR PREVENTING
A SOFTWARE CYBERATTACK
read our dedicated ebook
Medical devices are thus required to bear the CE marking, a sign of compliance with European legislation. The rules that apply to hospitals to guarantee patient safety are numerous and varied, and include the use of approved machines, and compliance with the “Health safety in healthcare establishments” standard.
To help you find your way through the labyrinth of cyber regulations,
REGULATORY
UPDATES
Would you like to get in touch with Stormshield for more information on your options?
Start a discussion with our technical or sales teams.