Please contact the FBI with any questions related to this Private Industry Notification via your local FBI Cyber Squad.
Medical device hardware often remains active for 10-30 years, however, underlying software life cycles are specified by the manufacturer, ranging from a couple months to maximum life expectancy per device allowing cyber threat actors time to discover and exploit vulnerabilities. Legacy medical devices contain outdated software because they do not receive manufacturer support for patches or updates, making them especially vulnerable to cyber attacks.
In addition to outdated software, many medical devices also exhibit the following additional vulnerabilities:
- Devices used with the manufacturer’s default configuration are often easily exploitable by cyber threat actors.
- Devices with customized software, require special upgrading and patching procedures, delaying the implementation of vulnerability patching.
- Devices not initially designed with security in mind, due to a presumption of not being exposed to security threats.
Medical devices have known vulnerabilities that impact various machines used for healthcare purposes, including those that sustain patients with mild to severe medical conditions.
- As of January 2022, a research report conducted by a cybersecurity firm found 53 percent of connected medical devices and other internet of things (IoT) devices in hospitals had known critical vulnerabilities. Approximately one third of healthcare IoT devices have an identified critical risk potentially implicating technical operation and functions of medical devices.
- According to a report in mid-2022 conducted by a healthcare cybersecurity analyst, medical devices that are susceptible to cyber attacks include insulin pumps, intracardiac defibrillators, mobile cardiac telemetry, pacemakers, and intrathecal pain pumps. Malign actors who compromise these devices can direct them to give inaccurate readings, administer drug overdoses, or otherwise endanger patient health.
- According to a research report in 2021, a cybersecurity firm assessed there is an average of 6.2 vulnerabilities per medical device, and recalls were issued for critical devices such as pacemakers and insulin pumps with known security issues, while more than 40 percent of medical devices at the end-of-life stage offer little to no security patches or upgrades.
The FBI recommends considering the following to actively secure medical devices, identify vulnerabilities, and increase employee awareness reporting in order to help mitigate the risk posed by medical devices.
- Endpoint Protection
o If supported by the medical device, use antivirus software on an endpoint. If not supported, providing integrity verification whenever the device is disconnected for service and before it is reconnected to the IT network.
o Encrypt medical device data while in transit and at rest. o Utilize endpoint detection and response (EDR) and Extended Detection and Response (XDR) solutions, which provides visibility on medical devices and offers protection.
- Identify and Access Management
o Ensure default passwords are changed to secure and complex passwords specific for each medical device. If supported by medical device, limit the number of login attempts per user.
- Asset Management
o Maintain an electronic inventory management system for all medical devices and associated software, including vendor-developed software components, operating systems, version and model numbers.
o Use inventory results to identify critical medical devices, operational properties, and maintenance timeframes.
o Consider replacement options for affected medical devices as part of purchasing process; if replacing the medical device is not feasible, take other mitigation precautions, such as isolating the device from network or auditing the device’s network activities.
- Vulnerability Management
o Work with manufacturers to help mitigate vulnerabilities on operational medical devices.
o Monitor and review medical devices’ software vulnerabilities disclosures by vendors and conduct independent vulnerability assessments.
o Implement a routine vulnerability scan before installing any new medical device onto the operating IT network.
- Training to Help Mitigate Risk Associated with Employees
o Implement required training for employees on how to identify and report potential threats:
- Insider threats related to employees seeking to cause harm to the network or steal information. This includes training on the types of behavior and activity to look for.
- Attacks targeting employees including phishing, social engineering, and spoofing attempts to compromise their accounts or credentials.
- As budget constraints allow consider email alert banners for all email exchanges originating outside of the organization.