Pacemakers vulnerable to attack, expert warns

The following article was published by the Sydney Morning Herald this morning. Does anyone have any clues or further information on this issue

"Fatal risk at heart of lax security

Ben Grubb
Published: November 6, 2012 - 1:08AM

A hacker with a laptop watches a crowd of people from a distance, presses a button and 10 people grip their chests and drop dead. The hacker then walks away, leaving no evidence of the mass murder he has just committed.

It sounds like a scene from a James Bond movie, but it's entirely possible.

Security flaws in pacemakers and defibrillators implanted in those with heart problems and designed to save lives could actually be putting users at risk, say IT security experts and a recent US government report.

The experts say it is because many devices are not properly secured and are therefore susceptible to being hacked by someone with malicious intent.

Barnaby Jack, famous for “jackpotting” an ATM (making money fly out of it) on stage at the Las Vegas DefCon security conference in 2010, is one of the few security researchers raising the alarm about the security of implanted medical devices.

At the Breakpoint security conference in Melbourne last month, Mr Jack demonstrated how he was able to deliver a deadly 830-volt jolt to a pacemaker by logging into it remotely after hacking it, but did not reveal which models were vulnerable, a standard practice for ethical hackers, known as "white hats".

He was able to deliver the jolt remotely because many implanted medical devices use wireless technology and authentication that requires only a user name and password – usually its serial and model number - that can be remotely extracted from it.

Mr Jack said medical devices were designed to be easy to crack by a doctor needing to gain quick control during an emergency.

In his research, he found the secret command doctors use to send a "raw packet" of data over the airwaves to find any cardioverter-defibrillator or pacemaker in range and have it respond with its model number and serial number. This information allows them to authenticate a medical device to receive telemetry data and perform commands or software updates.

The command to jolt the heart – or any other command – can be delivered, in some cases, up to 12 metres away, meaning someone with malicious intent does not need to be very close to victims to zap them.

Mr Jack said at the Melbourne security conference and in a podcast on the Australian security website risky.biz that it would be possible to write a worm for one particular brand of pacemaker and defibrillator, then have it spread to other devices within range, from person to person.

“People with these devices should be very concerned,” said Patrick Gray, a specialist security journalist who produces podcasts and writes for risky.biz.

"I can't think of a good reason why an implantable medical device needs to be wirelessly readable at 10 metres, but hey, maybe that's just me."

The only thing preventing these sorts of attacks was the fact that people were not motivated to perpetrate them, Mr Gray said.

Ty Miller, the chief technology officer at Australian security firm Pure Hacking, said: “The potential impact of this security threat is devastating and the attack execution could be quite stealthy.

"This means that the attacker has a high return on investment and a relatively small chance of being caught."

Mr Jack and other security experts are not the only ones raising the alarm.

A recent US Government Accountability Office (GAO) report, which referred to Mr Jack's research, highlighted issues with the security of medical devices and called upon the US Food and Drug Administration (FDA), which is responsible for ensuring the safety and effectiveness of medical devices in the US, to do more to make sure they are secure from malicious acts.

The report, which was released in August, said the FDA had not considered risks from intentional security threats "as a realistic possibility until recently" and had been focusing only on unintentional threats to medical devices (i.e. welding irons and metal detectors).

“In commenting on a draft of this report, [the] FDA said it intends to reassess its approach for evaluating software used in medical devices, including an assessment of information security risks," the GAO report said.

The Therapeutic Goods Administration (TGA), the Australian equivalent of the FDA, said it was aware of the potential for implanted medical devices to be affected by a breach of software security.

In issuing certification of active implantable medical devices in Australia, the TGA said "the essential principles require that a medical device is fit for purpose".

The agency did not respond to questions asking whether "fit for purpose" meant asking medical device manufacturers to test their devices' security against malicious attacks.

The chairman of the Cardiac Society of Australia and New Zealand, Andrew McGavigan, said his organisation had no specific concerns about the security of medical devices.

While Associate Professor McGavigan supported anything that may lead to an improvement in medical device security, he said people must remember that "millions of patients have benefited from implantable cardiac devices over the last few decades".

There had never been a reported case of a person being harmed by someone maliciously altering their implantable medical device, he said.

Mr Miller said that despite this, Australian agencies such as the TGA needed to ensure security threats and cyber attacks were incorporated into the risk assessments of products before they are sold.

"These threat and risk assessments should be performed by IT security specialists who stay up to date with the latest attack techniques," he said.

"This will ensure that all realistic risks associated with the products are surfaced, allowing the risks to be mitigated prior to being sold to consumers."

Mr Gray agreed.

"If the devices are designed and manufactured in Australia, I would think there should be some sort of regulation that says these devices must be security tested," he said. "Not tested by government, but by someone reputable.

"There's no simple solution here, but until these companies accept that there's a legitimate problem here, then zero progress will be made."


4 Comments

LInk to article

by Bernard - 2012-11-05 09:11:52

PS: the link is http://www.smh.com.au/digital-life/consumer-security/fatal-risk-at-heart-of-lax-security-20121102-28ore.html

This is the Third Post...

by donr - 2012-11-05 10:11:08

...on this subject. All started w/ the Barnaby jack show in Australia a couple weeks ago. Some of it does not just READ like a James Bond flick - it is a JB Flick!

Has ANYONE asked their Cardio about availability of PM's that respond to RF, as opposed to the magnetic hockey puck? Or, perhaps a Mfgr's Rep?

For those interested, the links to the two previous posts are copied below: BTW: All the scurrilous/sarcastic comments are included in the links.

Don

"Hacked Pacemakers II"
http://www.pacemakerclub.com/public/jpage/1/p/story/a/storypage/sid/25481/content.do

"News Article - Now There are Two Articles."
http://www.pacemakerclub.com/public/jpage/1/p/story/a/storypage/sid/25422/content.do

Here we go again

by ElectricFrank - 2012-11-06 02:11:39

As I mentioned the last time this one went around, please not who is warning us. It is the people who make their living off scaring us all who push this stuff.

Hmm, I guess I will take my old pacemaker and modify it so I can feed a fatal arrhythmia into the lead terminals and it will talk to all its friends with in range. I can make my girl friends heart twitter at will. LOL

frank

Frank: Remember...

by donr - 2012-11-06 07:11:16

...Robert Heinlein's sci-fi book of about 1950 "The Puppet Masters"? That's what you just described! Old Fahrt, aren't you?

I second your comments about the OP in this thread.

I stuck my comment on just to make the story complete all in one spot for folks who may have been asleep when the first two were on the front page of the forum.

I see my cardio on Thurs - I'm going to ask about existence of PM's that communicate via RF energy.

Don

You know you're wired when...

You forecast electrical storms better than the weather network.

Member Quotes

I am active and healthy and have been given a second chance.