Cyber Crime

Hospitals Falling Victim to Old Malware

Security experts confirm that a growing number of cyber-attacks continue to hit hospitals threatening unpatched medical devices.

In late 2015, MaineGeneral Health, a new state of the art hospital located in Augusta, Maine, reported that it had fallen victim to a cyberattack that leaked the names, addresses, and phone numbers for patients of its radiology services since June 2009.  The attack is one of many in the past year where targeting of the medical industry, particularly hospitals, is on the rise. According to MaineGeneral Health, the hospital had a robust security plan in place and were continuously patching network vulnerabilities.

Though there are little details about the specifics of the breach, the fact that the radiology department was the epicenter of the breach may lend clues as to how the attackers were able break through the hospital’s defenses.

In February 2015, a dire warning was published in the American Journal of Roentgenology stating that Radiologists and the medical industry “need to urgently review and rectify security issues in existing networked medical equipment.” The team behind the warning found that forty-four percent of the 144 devices it test had a least one critical vulnerability and at least eighty-three percent had at least one high-risk vulnerability.  The team noted other significant findings such as unsecure USB ports and insecure implementations of VPN access.   Later in September, security researchers Scott Evren and Mark Collao demonstrated at DerbyCon how easy it was to find misconfigured medical devices using the Shodan search engine.  Conducting searches on terms such as “radiology” yielded a hackers treasure trove of Internet connected and misconfigured medical devices using default passwords and usernames set by the manufacturer.

Just this week, TrapX Labs, a San Mateo based security research group, released a follow-up to its May, 2015 report on the cyber-attacks against hospitals through unpatched medical devices, drawing attention across the medical industry.  MEDJACK, TrapX’s code name for medical device hijacking, is the art hiding of sophisticated cyberattack tools in legacy malware. In its research, TrapX discovered hackers hiding their tools in an old variant of the Conficker worm.  Because of its age, the worm largely goes unnoticed by network defenses but easily infects legacy software often found on medical devices.

These devices are difficult to patch or sometimes ignored by security teams who delegate patching to vendors because of contractual agreements.  Once infected, a Radiation Oncology system becomes the gateway for hackers and a pivot point to launch more sophisticated attacks against your network.

TrapX’s report comes at a time where the Healthcare industry is reeling from a series of high-profile attacks. Hollywood Presbyterian Hospital, Methodist Hospital in Henderson, Kentucky, Chino Valley Medical Center, and Desert Valle Hospital are just but a few of the medical facilities hit with a wave of Cryptolocker attacks, costing an untold amount in ransom and cleanup. Then there’s MedStar, the Washington D.C. based hospital chain whose infrastructure was crippled with a virus in late March.

Then there’s MedStar, the Washington D.C. based hospital chain whose infrastructure was crippled with a virus in late March.  According to one report some 35,000 employees could not access emails or access patient records.  Cybercriminals behind the attack demanded 45 Bitcoins, at the time worth US$45,000, to unlock its systems and threatened to destroy the private key used to encrypt MedStar’s data if payment wasn’t made within ten days.  Interestingly, the hackers also gave MedStar the option of releasing one computer at a time for 3 Bitcoins – how nice of them. It’s unknown whether or not MedStar paid the ransom or not but reported four days later they had recovered “90 percent of its functionality.”

The medical industry has become a fertile ground for cybercriminals and an industry that appears to be left lagging behind other critical infrastructures that have focused on hardening its networks for years, like the financial services industry.  Hospitals are a smorgasbord of personal identifiable information and payment systems that make it attractive for snoops, thieves, and extortionists alike.

Security initiatives in hospitals are mainly driven by privacy and compliance initiatives, which may explain the industry lagging behind others in building robust defense mechanisms.  With 5,627 registered hospitals in the US alone and more than half being not-for-profit community hospitals operating on tight budgets, it is no wonder why security measures are falling behind, but relief may be on its way.  In December of last year, the US Congress passed a US$1.1 trillion spending

In December of last year, the US Congress passed a US$1.1 trillion spending bill that funds the establishment a healthcare industry cybersecurity task force.  In April, NIST fellow Ronald Ross promised that new best practices for the medical industry are forthcoming putting into motion new privacy and security controls that may help hospitals protect their networks.

TrapX concludes its report with a series of best practices that the medical industry can initiate today.  Network segmentation and device isolation, good patching plans, and choosing vendors that have a focus on securing there devices are a good place to start.  However, until new industry-wide programs and funding are in place, it is likely attacks against the medical sector will continue to increase.

Written by: Rick Gamache

Rick Gamache is a freelance writer with 25 years’ experience in the cyber security field. His past work includes the Managing Director of Wapack Labs, CIO of the Red Sky Alliance, and lead FISMA auditor for the US Navy’s destroyer program.  Rick has written several high-level cyber and general risk reports with an emphasis on the Nordic countries, India, Russia, and Ukraine and has traveled extensively, speaking on strategic cyber threat intelligence matters as they relate global supply chains.

LinkedIn – https://www.linkedin.com/in/rick-gamache-cissp-021ab43

Twitter – https://twitter.com/thecissp

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs – Hospitals, malware)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Security Affairs newsletter Round 563 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…

19 minutes ago

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

21 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

22 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

This website uses cookies.