11 Uncommon Hackable Medical Devices Posing Real Threats

Share and earn Cybytes
Facebook Twitter LinkedIn Email

Within the last year, you’ve likely read a few posts about hackable pacemakers and insulin pumps detailing scary and real threats to common medical devices. In addition to the known hackable IoT medical devices, there are many not-so-common devices that pose legitimate threats when (not if) hacked. In all corners of the world, they sit silently poised as potential vectors for botnet or ransomware attacks.

According to the “Healthcare’s IoT Dilemma: Connected Medical Devices” report by Forrester, “You have less control over connected medical devices than any other aspect of your technology environment.” The report also notes, “Many times, vendors control patch and update cycles, and vulnerabilities persist that require segmentation from your network. Considering that many of these devices are in direct contact with patients, this is a major cause for concern.”

Another article on WIRED quotes May Wang, chief technology officer at Zingbox, who states, “For the past three years the healthcare sector has been hacked even more than the financial sector. And more and more hacking incidents are targeting medical devices.”

It’s hard to ignore that insecure medical devices will play starring roles in upcoming massive hacks, so companies are starting to zero in on security down to the lowest level – the firmware.

Get familiar with this list of 11 Uncommon Hackable Connected Medical Devices That Pose Real Threats. It was built through research and conversations with manufacturers. Imagine the hundreds of connected medical devices that aren’t on the list (yet):

Brain ImplantsVital MonitorsMedication DispensersMRI ScannersBlood Flow SensorsSmart Hospital BedsGastric SimulatorsFoot Drop ImplantsCochlear ImplantsInfusion PumpsSurgical Robots

Companies who want to protect their data, their networks, their brand and the healthcare industry at large from senseless and dangerous cyberattacks will take steps to properly code and reverse engineer their firmware, checking for all security holes that malicious hackers will unquestionably find.

Is your connected medical device at risk? Find out.

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
About Tactical Network Solutions
Are you concerned about risky, vulnerable embedded firmware in IoT devices, connected medical devices, automotive ECUs and industrial control systems? You're not alone. Since 2007, Fortune 500 companies and governments around the world have sought out Tactical Network Solutions for reverse engineering training programs, firmware evaluations, and cyber risk mitigation strategies. Clients are excited to leverage our automated firmware evaluations and consulting performed with the proprietary Centrifuge IoT Security Platform. The evals are completed with NO access to source code on compiled images containing a Linux-based root filesystem compiled for either MIPS, ARM, or X86. We also support QNX (a real-time operating system) and Docker containers. TNS evaluations have revealed thousands of hidden attack vectors including erroneously placed private crypto keys, insecure binaries with highly vulnerable function calls and other rampant security holes on embedded firmware. Our community of clients includes firmware developers, underwriters, law firms, governments and intelligence agencies worldwide who share a common goal: to discover hidden attack vectors in IoT and connected devices.
Promoted Content
TNS Issues a Sample IoT Security Report Showing Backdoors in a Connected Device
First, the good news: The extremely high number of connected devices rapidly coming to market has consumers and manufacturers excited. The new IoT devices often include advancements, more effective data collection and greater ease of use. Now, the bad news: When the devices are not built securely, they also bring unnecessary exposure, vulnerabilities, and danger.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?