Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Audits

Unprotected Medical Systems Expose Data on Millions of Patients

Hundreds of Internet-accessible, unprotected medical imaging systems expose data on millions of patients worldwide, German security firm Greenbone reveals.

Hundreds of Internet-accessible, unprotected medical imaging systems expose data on millions of patients worldwide, German security firm Greenbone reveals.

The analysis conducted by Greenbone, a vulnerability analysis and management solutions provider, focused on Picture Archiving and Communication Systems (PACS), which are used by healthcare organizations to capture, store and distribute medical images.

The company’s study aimed to shed some light into how well patient data is protected within healthcare organizations, and the results were not encouraging: nearly a quarter of the analyzed PACS servers exposed data to the Internet.

Specifically, out of 2,300 systems analyzed between July and September 2019, 590 were accessible from the Internet and had no protection for the personal or medical data stored on them. Such data included patient name and date of birth, date of examination, some details on the reason for examination, and even image data for those patients.

Overall, the 590 exposed systems contained more than 24.5 million data records from patients across 52 countries, including 737 million images (from X-ray, CT, MRI devices), with 400 million of these images easily downloadable over the Internet.

In November 2019, the security firm revisited the study, only to discover that the amount of exposed data had increased. Although 129 new archiving systems were found and 172 went offline, a total of 35 million data records were publicly accessible. Furthermore, the number of exposed images had increased from 737 million to 1.19 billion (1,193,404,000).

In an updated report (PDF), Greenbone revealed that the number of patient records for which it was possible to access images had doubled from 4.4 million to 9 million between September and November. The number of images that could easily be downloaded over the Internet had declined from 400 million to 370 million.

A re-run of the analysis performed at the beginning of January has showed a slight decrease in the number of exposed PACS, though tens of millions of medical studies remain exposed to the Internet.

Advertisement. Scroll to continue reading.

At the beginning of 2020, more than 460 of the previously exposed systems were still connected to the Internet, “allowing uncontrolled, unprotected access to patient information,” Dirk Schrader, cyber resilience strategist at Greenbone, told SecurityWeek in an email conversation.

“More than half of them allow even access to the images contained (not only to study data like name, DOB, date of exam, method of exam, physician name, etc),” he continued.

Globally, between November and early January, 5.9 million patient records were taken offline and 100 million images went down with them.

However, around 1 million studies were added to the systems that were still connected to the Internet. These, Schrader says, also included 30 million images.

Given that there was only a small change in the amount of exposed data within an 8-week timeframe and considering the off-peak due to Christmas, Schrader paints a rather bleak picture of the foreseeable future.

“This means that in about 3-4 months, the situation will be back and above the level of November 2019, if the number of unprotected systems isn’t reduced drastically,” he said.

Should the top 10% PACS in terms of number of studies stored on them be taken offline, the number of patient records exposed to the Internet would be reduced by more than 15 million, he explains.

“In addition it would substantially decrease the number of studies added over time as they are the largest ‘contributors’,” Schrader continues.

In terms of the most affected countries, the United States takes the leading position. Greenbone has informed over 140 U.S. organizations that they expose patient data, but their November 2019 report says there are over 800 impacted institutions, including clinics, hospitals, and radiology service providers.

Turkey, South Africa, Ecuador, India, and Brazil are also highly impacted.

The issue, Greenbone says, can be mitigated through security awareness: organizations should increase visibility into their assets and check whether they are exposed to the Internet; physicians should verify that medical information transmitted in electronic form is encrypted and inquire why if not; and patients should ask doctors about their data protection regime.

Related: Indiana Hospital System Notifying Patients After Data Breach

Related: Google Healthcare Project Targeted by Congress Committee

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...