We use cookies to understand how you use our site and to improve your experience. This includes personalizing content and advertising. To learn more, click here. By continuing to use our site, you accept our use of cookies. Cookie Policy.

Features Partner Sites Information LinkXpress hp
Sign In
Advertise with Us
ARAB HEALTH - INFORMA

Download Mobile App




Weak AI security Exposes IoT Medical Devices to Risk of Cyberattacks

By HospiMedica International staff writers
Posted on 18 May 2019
Print article
Image: With cyberattacks a major challenge for companies, stronger AI solutions can help to prevent them (Photo courtesy of e3zine).
Image: With cyberattacks a major challenge for companies, stronger AI solutions can help to prevent them (Photo courtesy of e3zine).
The proliferation of healthcare internet-of-things (IoT) devices, along with unpartitioned networks, insufficient access controls and the reliance on legacy systems has exposed a vulnerable attack surface that can be exploited by cybercriminals determined to steal personally identifiable information (PII) and protected health information (PHI), in addition to disrupting healthcare delivery processes. These findings published by Vectra AI Inc. (San Jose, CA, USA) in its Vectra 2019 Spotlight Report on Healthcare underscore the importance of utilizing machine learning and artificial intelligence (AI) for detecting hidden threat behaviors in enterprise IT networks before cybercriminals have a chance to spy, spread and steal.

The report by Vectra AI, which applies AI to detect and respond to cyberattacks in real time, is based on observations and data from the 2019 RSA Conference Edition of the Attacker Behavior Industry Report that reveals behaviors and trends in networks from a sample of 354 opt-in enterprise organizations in healthcare and eight other industries. According to the report, gaps in policies and procedures can result in errors by healthcare staff members such as improper handling and storage of patient files, which is a soft spot for cybercriminals targeting global organizations and industries and looking for weaknesses to exploit.

The report found that hidden HTTPS tunnels were the most prevalent method used by attackers to hide command-and-control communications in healthcare networks. This traffic represents external communication involving multiple sessions over long periods of time that appear to be normal encrypted web traffic. Attackers mostly used hidden domain name system (DNS) tunnels to hide data exfiltration behaviors in healthcare networks. Behaviors consistent with exfiltration can also be caused by IT and security tools that use DNS communication.

There has also been a spike in behaviors consistent with attackers performing internal reconnaissance in the form of internal darknet scans and Microsoft Server Message Block (SMB) account scans. Internal darknet scans occur when internal host devices search for internal IP addresses that do not exist on the network. SMB account scans occur when a host device rapidly makes use of multiple accounts via the SMB protocol that is typically used for file sharing.

Several healthcare organizations have witnessed ransomware attacks in recent years, although the report found that ransomware threats were not as prevalent in the second half of 2018. Nevertheless, it still remains important to catch ransomware attacks early before files are encrypted and clinical operations are disrupted.

“Healthcare organizations struggle with managing legacy systems and medical devices that traditionally have weak security controls, yet both provide critical access to patient health information,” said Chris Morales, head of security analytics at Vectra. “Improving visibility into network behavior enables healthcare organizations to manage risk of legacy systems and new technology they embrace."

Related Links:
Vectra AI

Gold Member
STI Test
Vivalytic Sexually Transmitted Infection (STI) Array
Gold Member
SARS‑CoV‑2/Flu A/Flu B/RSV Sample-To-Answer Test
SARS‑CoV‑2/Flu A/Flu B/RSV Cartridge (CE-IVD)
New
Standing Sling
Sara Flex
New
Mobile Barrier
Tilted Mobile Leaded Barrier

Print article

Channels

Surgical Techniques

view channel
Image: The surgical team and the Edge Multi-Port Endoscopic Surgical Robot MP1000 surgical system (Photo courtesy of Wei Zhang)

Endoscopic Surgical System Enables Remote Robot-Assisted Laparoscopic Hysterectomy

Telemedicine enables patients in remote areas to access consultations and treatments, overcoming challenges related to the uneven distribution and availability of medical resources. However, the execution... Read more

Patient Care

view channel
Image: The portable biosensor platform uses printed electrochemical sensors for the rapid, selective detection of Staphylococcus aureus (Photo courtesy of AIMPLAS)

Portable Biosensor Platform to Reduce Hospital-Acquired Infections

Approximately 4 million patients in the European Union acquire healthcare-associated infections (HAIs) or nosocomial infections each year, with around 37,000 deaths directly resulting from these infections,... Read more

Health IT

view channel
Image: First ever institution-specific model provides significant performance advantage over current population-derived models (Photo courtesy of Mount Sinai)

Machine Learning Model Improves Mortality Risk Prediction for Cardiac Surgery Patients

Machine learning algorithms have been deployed to create predictive models in various medical fields, with some demonstrating improved outcomes compared to their standard-of-care counterparts.... Read more

Point of Care

view channel
Image: The acoustic pipette uses sound waves to test for biomarkers in blood (Photo courtesy of Patrick Campbell/CU Boulder)

Handheld, Sound-Based Diagnostic System Delivers Bedside Blood Test Results in An Hour

Patients who go to a doctor for a blood test often have to contend with a needle and syringe, followed by a long wait—sometimes hours or even days—for lab results. Scientists have been working hard to... Read more
Copyright © 2000-2024 Globetech Media. All rights reserved.