7 IoT Medical Devices That Are Hackable

Security Flaws in Patient Medical Devices Put Lives at Risk

Advances in the IoT medical devices market are rapidly innovating how we treat patients, often to a remarkable effect. Layering robotics with medicine and factoring the Internet of Things (IoT) into patient monitoring has opened up a new world for medical treatment, supporting remote patient care. The healthcare IoT market surged throughout the pandemic — and is expected to rise at a rate of 25.9% to $446.52 billion by 2028.

However, there’s a catch: Many IoT medical devices are hackable, and compromised devices can lead to catastrophic patient outcomes.

Escalating Cyber Risks: IoT Medical Devices Connected to Outdated Operating Systems

While advanced IoT devices change how patients receive care, recent history sheds light on escalating cyber risks. In 2017, WannaCry ransomware infiltrated outdated Windows systems, entering 70,000 devices across National Health Services hospitals in England and Scotland. Ambulances stalled, hospitals closed, and patient monitoring was disrupted, delaying care and threatening lives.

Lessons from history are often repeated — and sometimes escalated. Gartner predicts that by 2025 attacks on operational technology (OT) environments linked to medical IoT devices will be hacked and weaponized during cyberattacks with the intent to cause physical harm or even death — costing over $50 billion per year.

Just a Few Examples of Hackable IoT Medical Devices  

Keeping a close eye on IoT medical devices and their cybersecurity risks is a matter of life or death.

Tread cautiously with these seven IoT medical devices:

1. Next-Generation Teleoperated Surgical Robots: The Raven II

In 2001, Professor Jacques Marescaux used telesurgery and robotics from his offices in New York to perform a cholecystectomy on a 68-year-old woman in France. Since then, experts in robotics and medicine have worked around the clock to make telesurgery a viable option for anyone.

While telesurgery and robotics are most often used while the surgeon is in the same room as the patient, operating over a secure hardwire, surgeons will eventually use them to intervene during situations that are unsafe for humans (like battle scenes, chemical fires, earthquake rescue missions, and pandemics). But there’s a catch: Treatment will likely occur over insecure networks — and cybercriminals can easily infiltrate them. During research at the University of Washington, The Raven II, a telesurgery robot, was easily hacked. Even a tiny interference could have deadly consequences in actual practice.

2. Infusion Pumps: The B. Braun Infusomat Space Large Volume Pump and B. Braun SpaceStation

Imagine you’re lying in a hospital bed after surgery, blissfully unaware of your body’s distressed state thanks to the IV drip of painkillers. And then you suddenly wake up to excruciating pain because someone hacked into the network and shut off the infusion pump — or even worse, you don’t wake up at all because a hacker doubled the rate of flow.

Cybersecurity researchers revealed vulnerabilities that could lead to such an overdose when they hacked into the B. Braun Infusomat Space Large Volume Pump and B. Braun SpaceStation. Ironically, these IoT devices have a locked-down software design with thoughtful security features that are intended to keep patients safe from hackers. Researchers found an easy loophole: They hacked into the hospital’s network and exploited a common connectivity vulnerability, which allowed them to compromise the security of the B. Braun infusion pumps. “Successful exploitation of these vulnerabilities could allow a sophisticated attacker to compromise the security of the Space or compact plus communication devices, allowing an attacker to escalate privileges, view sensitive information, upload arbitrary files, and perform remote code execution,” announced B. Braun in a security statement.

3. Insulin Pumps: Medtronic and Johnson & Johnson

Medical device company Medtronic issued an urgent recall of their insulin pump controllers thanks to researcher Jay Radcliffe discovering connective vulnerabilities, potentially allowing an attacker to overdose the user. And it’s not the first time hackers have exploited vulnerabilities in Insulin Pumps: Back in 2016, Johnson & Johnson announced that one of its insulin pumps could be hacked, possibly overdosing the patients. The solution? Users were asked to disable a remote control feature, patch a vulnerability, and program the device using a maximum insulin release setting. (Now imagine your grandparent was using the insulin pump, and had to take each of those steps to stay safe.)

4. Imaging Devices: GE Imaging and Ultrasound Devices

According to the 2020 Unit 42 IoT Threat Report, a shocking 83% of hospital imaging devices run on unsupported operating systems — an easy entry point for malicious actors.

In 2020, researchers from CyberMDX found critical vulnerabilities attributed to default global credentials used in management software that affected over 100 radiology tools from GE (including molecular imaging devices, mammography devices, MRI machines, CT and PET Scans, advanced visualization, ultrasounds, and X-rays). “Successfully exploiting the vulnerability may expose sensitive data — such as protected health information (PHI) — or could allow the attacker to run arbitrary code,” researchers explained. And this could “impact the availability of the system and allow manipulation of PHI.”

5. Health Monitors: IntelliVue Information Center iX (PIIC iX) Developed by Philips

Several months ago, researchers at Nozomi Networks Labs discovered five new vulnerabilities in patient monitoring systems. Health monitors track a patient’s vitals and alert staff should anything go wrong — and these monitors are particularly vulnerable to attacks because they’re connected to the more extensive communications network and have large attack surfaces. A hacker could change settings, obscure the displayed data, or silence alarms, leaving patients in urgent need without help.

6. Digital Smart Pens

Doctors use digital smart pens to prescribe medications and then swiftly transmit them to pharmacies — along with a patient’s sensitive information, including their name, address, and health records. Security researcher Saurabh Harit of Spirent SecurityLabs revealed that it’s entirely possible to reverse-engineer the pen and uncover all that information. Even worse, a digital smart pen could serve as an entry point into a larger operating system — and cybercriminals could potentially access databases with patient records.

7. Implantable Cardiac Devices: Pacemakers

The U.S. Department of Homeland Security released a medical advisory statement exposing the vulnerabilities in several pacemaker models. Dick Cheney famously had his pacemaker modified back in 2007 to protect against a virtual assassination.

Hospital staff can protect themselves and their patients by following cybersecurity hygiene basics, keeping software and virus protection up-to-date, running vulnerability assessments and adopting zero-trust policies, modernizing legacy systems, training staff on cybersecurity best practices, and following the FDA’s Medical Device Safety Action Plan.

If We Really Cared About the Cybersecurity Talent Shortage…

…We Wouldn’t Make Cybersecurity Jobs So Hard To Fill

The cybersecurity industry is booming with job openings, but organizations don’t have the talent to fill them. Over a third of the 1.8 million cybersecurity jobs in the U.S. go unfilled due to lack of skills and expertise — generating a talent gap that could fill Yankee Stadium thirteen times over. (That’s 18 times the amount of seats in Fenway Park for you Red Sox fans.)

Meanwhile, cyberattacks keep increasing in frequency and sophistication. By 2023, the number of global malware attacks is projected to reach over 1.4 billion — and that’s just known malware. It’s impossible to predict the real impact of new threats in the years to come.

With such an overwhelming demand for talent and innovation, you would assume that the path to employment would be streamlined. But that’s far from the reality.

The cybersecurity industry is difficult to break into, workers report high levels of burnout, and too few employers offer room for career advancement. Without industry-wide solutions to bridge the talent gap, cybersecurity teams won’t keep up with rapidly evolving threats.

Barriers to Entry

Most cybersecurity positions require at least a bachelor’s degree and three or more years of experience. That includes entry-level positions. Meanwhile, computer science has one of the highest dropout rates in higher education, meaning fewer potential candidates are heading into IT in the first place, let alone cybersecurity.

Assuming a potential new hire has graduated with a bachelor’s degree in computer science — and even with a cybersecurity certificate or two — landing a cybersecurity job worth the effort is a difficult task. Breaking into the cybersecurity field is often unclear, and navigating a cybersecurity career path can be just as confusing.

Cybersecurity is constantly changing and evolving to face the latest threats and meet new and stricter standards. That means the learning curve gets steeper and more complex with time. It’s harder for every fresh wave of college grads to gain a foothold. And when they do, the workload is heavy and demanding, with too few rewards to keep skilled workers around for the long haul.

Overwork and Burnout

The people who do manage to break into the industry often find that it’s a far more demanding job than they might have anticipated. Notorious for overwork and burnout, cybersecurity jobs are not for the faint of heart. Cybersecurity professionals are often ignored when things go right and villainized when things go wrong.

CodeHunter CEO Larry Roshfeld applies this exhausting thought to the cybersecurity industry as a whole: “The thing about being responsible for cybersecurity is that we know we can’t win; the best we can ever hope for is not to lose.”

The fatigue that comes with this line of work shows in the numbers. Over half of surveyed IT security professionals said they or someone they knew left their job due to overwork and burnout or worked with someone who has. Additionally, 60% of employers report difficulties retaining qualified cybersecurity professionals.

These obstacles have created a skills gap that’s become increasingly difficult — and increasingly urgent — to overcome. If there aren’t enough opportunities for new hires to learn and grow, the current generation of cybersecurity professionals won’t have anyone to pass the baton to.

We Need a Culture Shift

Employers must balance expectations, workers’ well-being, and industry demands from multiple angles. To lead the way, the cybersecurity community can do the following:

  • Promote cybersecurity training in local colleges offering computer science programs.

  • Provide internships that offer meaningful experience in the cybersecurity field and help prospective cybersecurity professionals get ahead as quickly as possible.

  • Hire for top talent potential (as opposed to current skill levels), and provide the support and training to reach that potential.

  • Upskill and reskill current employees and promote from within while regularly freeing up entry-level positions.

  • Train all employees on cybersecurity best practices, compliance, and managing risk factors on a routine basis throughout the organization to share the burden of responsibility.

  • Look for exceptional soft skills in addition to tech skills — especially in management positions. Over half of ISACA’s survey respondents report a significant gap in soft skills in the cybersecurity industry.

  • Offer flexibility with scheduling and consider what employees need for a healthy work-life balance. This helps prevent burnout and attracts new talent.

  • Foster diversity. Employers who create a welcoming environment for everyone are recruiting from a larger talent pool, and are at less risk of high turnover.

  • Market the critical mission of cybersecurity: we make a difference by protecting people and organizations from cyber threats, big and small. The work is constantly evolving — and never dull.

Unfortunately, We Don’t Have That Kind of Time

While all of the above would set up the cybersecurity industry for a brighter and more robust future, none of those things will make a difference overnight — and we still need viable solutions now.

Even if we could hire armies of well-trained cybersecurity professionals, we would still be outnumbered by constantly evolving threats and increasingly sophisticated cyberattacks. We need solutions that help workers efficiently face threats at scale — and we needed them yesterday.

CodeHunter helps bridge the talent (and numbers) gap in cybersecurity with automated threat detection and analysis. It rapidly identifies otherwise undiscoverable threats and saves organizations precious time to discovery, resources, and man hours.

Learn more about the scale of the issue and how CodeHunter can help tackle it.

 Or check out these other resources to learn more about how CodeHunter combats the rising threat of malware

  • CodeHunter Enterprise is currently available. See how your organization’s needs align with CodeHunter’s advanced capabilities.

  • Learn all about advanced malware and why it’s one of cybersecurity’s greatest threats.

  • Understand how CodeHunter automates threat detection and analysis to make threat discovery and prevention accessible to cybersecurity teams of all experience levels.