33
Breaking into Hospitals Disclaimer: All the views / data presented are my own and do not reflect the opinions of my employer. -- Anirudh Duggal

Breaking into hospitals

Embed Size (px)

Citation preview

Page 1: Breaking into hospitals

Breaking into Hospitals

Disclaimer: All the views / data presented are my own and do not reflect the opinions of my employer.

-- Anirudh Duggal

Page 2: Breaking into hospitals

About me • Senior software engineer with Royal Philips• Speaker at Cocon, HITCON, Ground Zero, Nullcon• Hack anything• Sustainability enthusiast• Play guitar in free time

Page 3: Breaking into hospitals

Menu!• Hospitals• Why attack hospitals?• Infrastructure inside a hospital• A reality check• Indian perspective • Changing threat scenario

Page 4: Breaking into hospitals

Hospital• A hospital is a health care institution providing patient treatment with

specialized staff and equipment.-- wiki

Page 5: Breaking into hospitals

Why Hospitals?• Cyber war / Terrorism?• Privacy • Financial – a medical record fetches 8x of a credit card record • Physical?

Page 6: Breaking into hospitals
Page 7: Breaking into hospitals

Infrastructure inside a hospital

Page 8: Breaking into hospitals

Range of devices

Cost: Rs 250 115 (50% off)Fits in pocket

Cost: can reach up to 3 million $Size: about the size of a truck (don’t ask the weight ;) )

Page 9: Breaking into hospitals

And the memory

A hospital data center…

A simple DIY device

Page 10: Breaking into hospitals

And……….• Patient monitors• Insulin monitors• Pacemakers• Heart rate devices• “smart bands”• Home monitoring solutions

Page 11: Breaking into hospitals

And……….

Page 12: Breaking into hospitals

Healthcare centers and hospitals

HVAC system

Lighting system

Hospital servers

Waste management

systemsMedical devices

Hospital computers

Monitoring devices

Tablets / phones

Water controls

NAT / Bridged network

Other hospitals Vendor servers

“service portals”

Vendor servers

Intranet

Internet

Security systems

Page 13: Breaking into hospitals

Really?

HVAC system

Lighting system

Hospital servers

Waste management

systemsMedical devices

Hospital computers

Monitoring devices

Tablets / phones

Water controls “service

portals”Security systems

guests

Internet

Page 14: Breaking into hospitals

So where’s the problem?• The infrastructure is not supposed to be “public”• Most of this infrastructure is not prepared to be Public

Page 15: Breaking into hospitals

Attack Scenario• Outsider attacks -> fingerprinting and attacking hospitals• Name, medical equipment, EMR systems, HVAC systems, control systems,

routers, security systems

• Insider attacks – network and medical devices• Public vs private networks, finding HL7 implementations, • Finding obsolete hardware / software

Page 16: Breaking into hospitals

A reality check• As an attacker i

Found 2000+ vulnerable hospital serversFound 200+ hospitals from major hospital chainsFound HVAC controls Discovered many entry points in each of themAm updating the number of live EMR systems I foundStill findings lots of hospitals and healthcare devices and solutions…

Page 17: Breaking into hospitals

Indian perspective as an attacker • Found many major hospitals (40+)• Was able to fingerprint major hospital chains• Found FTP, Telnet, IIS instances (unprotected)• Found suspicious activity• Found hospital networks have open Wi-Fi Connections e.g. Hospital admin and hospital networks• Need security now!

Page 18: Breaking into hospitals

Outsider attacks• Recon using shodan

Page 19: Breaking into hospitals
Page 20: Breaking into hospitals

On the basis of EMR solutions

Page 21: Breaking into hospitals

Fingerprinting chains of hospitals

Page 22: Breaking into hospitals
Page 23: Breaking into hospitals

Infrastructure – besides medical devices

Page 24: Breaking into hospitals
Page 25: Breaking into hospitals

Unknown hospitals

Page 26: Breaking into hospitals

Insider attacks• WiFi networks – guests• Stealing information from employees– privacy • Evil staff – using existing infrastructure to launch attacks• HL7 and FHIR

Page 27: Breaking into hospitals

Medical devices

Page 28: Breaking into hospitals

Potential entry points• Wifi / Lan• Serial ports • USB - Firmware • The sensors • Keyboard / mouse • Firewire• Protocols

Page 29: Breaking into hospitals

Demo Time!

Page 30: Breaking into hospitals

New threat landscape• BYOD• Cloud Based attacks• Targeted attacks

Page 31: Breaking into hospitals

Thank you Minatee Mishra Michael Mc NeilBen Kokx Jiggyasu SharmaSanjog Panda Pardhiv ReddyAjay Pratap Singh Neelesh SwamiGeethu Aravind Archita AparichitaSagar Popat

Page 32: Breaking into hospitals

Questions?

Page 33: Breaking into hospitals

Thank you