Hackers Outsmart Pacemakers, Fitbits: Worried Yet? - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Healthcare // Security & Privacy
News
12/12/2013
08:36 AM
David F Carr
David F Carr
Slideshows
Connect Directly
LinkedIn
Google+
Twitter
RSS
E-Mail

Hackers Outsmart Pacemakers, Fitbits: Worried Yet?

Mobile health devices aren't as secure as you might think. Look at how researchers plan to strengthen security for consumer devices and regulated medical devices.
1 of 12

The Heart of the Problem
Some of the most sensational findings in medical device security revolve around devices that keep the heart beating: pacemakers and implantable cardiac defibrillators. The threat was brought to light by a 2008 paper. Before his death this year, the security researcher Barnaby Jack demonstrated that it was possible to hack a pacemaker remotely and cause it to deliver a life-threatening jolt.
The intended role of wireless communications is to allow these devices to be reprogrammed or to report diagnostic information without the need for surgery. Because they are designed to operate for a decade or more on a single battery, these devices have little power to spare for the kind of encryption you take for granted on your PC. Research focuses on the most frugal methods of protecting data links.
'For about a decade now, with wireless communication for medical devices, the assumption by the manufacturers has been that the telemetry interface is proprietary, and nobody is going to know what these bits mean,' Denis Foo Kune, a visiting scholar at the University of Michigan, told us. Kune is working with professor Kevin Fu, one of the foremost medical device security researchers. The security-by-obscurity strategy was partly based on the fact that the devices use radio frequencies that few other devices could access, Kune said. 'However, since about 2008, researchers have been showing that they could use software-defined radios to detect the bits coming out and play them back.' 
Through methodical hacking, it's often easy to decode and manipulate communications, Kune said. Even when communications are better protected, his research has shown the potential of hacking device sensors so they feed false data to higher-level applications, potentially leading to the administration of an unnecessary shock to the heart or an overdose of medicine. (Source: Wikimedia Commons)

Some of the most sensational findings in medical device security revolve around devices that keep the heart beating: pacemakers and implantable cardiac defibrillators. The threat was brought to light by a 2008 paper. Before his death this year, the security researcher Barnaby Jack demonstrated that it was possible to hack a pacemaker remotely and cause it to deliver a life-threatening jolt.

The intended role of wireless communications is to allow these devices to be reprogrammed or to report diagnostic information without the need for surgery. Because they are designed to operate for a decade or more on a single battery, these devices have little power to spare for the kind of encryption you take for granted on your PC. Research focuses on the most frugal methods of protecting data links.

"For about a decade now, with wireless communication for medical devices, the assumption by the manufacturers has been that the telemetry interface is proprietary, and nobody is going to know what these bits mean," Denis Foo Kune, a visiting scholar at the University of Michigan, told us. Kune is working with professor Kevin Fu, one of the foremost medical device security researchers. The security-by-obscurity strategy was partly based on the fact that the devices use radio frequencies that few other devices could access, Kune said. "However, since about 2008, researchers have been showing that they could use software-defined radios to detect the bits coming out and play them back."

Through methodical hacking, it's often easy to decode and manipulate communications, Kune said. Even when communications are better protected, his research has shown the potential of hacking device sensors so they feed false data to higher-level applications, potentially leading to the administration of an unnecessary shock to the heart or an overdose of medicine.

(Source: Wikimedia Commons)

1 of 12
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
MedicalQuack
50%
50%
MedicalQuack,
User Rank: Moderator
12/12/2013 | 2:47:38 PM
Privacy too
I'm a privacy advocate and that along with security are two big issues for me.  The data selling epidemic in the US is so bad as you have the likes of Walgreens making about a billion a year selling data and Fitbit's model is built around selling data profiles...have a campaign for the FTC to license and excise tax all data sellers so they can regulate it.  Can't do that until we have an index..that would be a license.

Oh wellness companies owned by insurance companies love to get a hold of data like this and it will end up in some analytics program to fix you in some fasion or another or potentially in time to deny access to something or someone.

http://ducknetweb.blogspot.com/2013/08/ftc-tries-to-bring-strong-case-for.html


I am all over the FTC all the time about this.  There's a new "open" device out there which would allow one to choose their platform to use with it and that in time may be a plus as it would be out there for everyone to jump and fix flaws, security or otherwise. 
Laurianne
100%
0%
Laurianne,
User Rank: Author
12/12/2013 | 1:05:40 PM
No thanks to that network
Human bodies with a network of implanted medical devices? No thank you. I prefer to remain my own network administrator.
David F. Carr
100%
0%
David F. Carr,
User Rank: Author
12/12/2013 | 10:05:18 AM
Sooner or later ...
The cybersecurity researchers are trying to raise enough of an alarm to change things, without being alarmist. Yet I have to wonder how long it will be before a real hack of someone's pacemaker comes to light, or some other life critical incident occurs.

Or is this really too far-fetched? Granted, there are easier ways to kill someone.
RobPreston
50%
50%
RobPreston,
User Rank: Author
12/12/2013 | 9:52:24 AM
Oh my
I'm a tad more worried about hackers messing with pacemakers than with Fitbits. Nonetheless, this is beyond wrong.
Slideshows
IT Careers: Top 10 US Cities for Tech Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  1/14/2020
Commentary
Predictions for Cloud Computing in 2020
James Kobielus, Research Director, Futurum,  1/9/2020
News
What's Next: AI and Data Trends for 2020 and Beyond
Jessica Davis, Senior Editor, Enterprise Apps,  12/30/2019
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
Slideshows
Flash Poll