Pacemaker hack can deliver deadly 830-volt jolt
- 17 October, 2012 04:40
Pacemakers from several manufacturers can be commanded to deliver a deadly, 830-volt shock from someone on a laptop up to 50 feet away, the result of poor software programming by medical device companies.
The new research comes from Barnaby Jack of security vendor IOActive, known for his analysis of other medical equipment such as insulin-delivering devices.
Jack, who spoke at the Breakpoint security conference in Melbourne on Wednesday, said the flaw lies with the programming of the wireless transmitters used to give instructions to pacemakers and implantable cardioverter-defibrillators (ICDs), which detect irregular heart contractions and deliver an electric shock to avert a heart attack.
A successful attack using the flaw "could definitely result in fatalities," said Jack, who has notified the manufacturers of the problem but did not publicly identify the companies.
In a video demonstration, Jack showed how he could remotely cause a pacemaker to suddenly deliver an 830-volt shock, which could be heard with a crisp audible pop.
As many as 4.6 million pacemakers and ICDs were sold between 2006 and 2011 in the U.S. alone, Jack said. In the past, pacemakers and ICDs were reprogrammed by medical staff using a wand that had to pass within a couple of meters of a patient who has one of the devices installed. The wand flips a software switch that would allow it to accept new instructions.
But the trend is now to go wireless. Several medical manufacturers are now selling bedside transmitters that replace the wand and have a wireless range of up to 30 to 50 feet. In 2006, the U.S. Food and Drug Administration approved full radio-frequency based implantable devices operating in the 400MHz range, Jack said.
With that wide transmitting range, remote attacks against the software become more feasible, Jack said. Upon studying the transmitters, Jack found the devices would give up their serial number and model number after he wirelessly contacted one with a special command.
With the serial and model numbers, Jack could then reprogram the firmware of a transmitter, which would allow reprogramming of a pacemaker or ICD in a person's body.
"It's not hard to see why this is a deadly feature," Jack said.
His research is just beginning. The FDA, he said, just looks at the medical effectiveness of devices and does not do an audit of a device's code.
"My aim is to raise awareness of these potential malicious attacks and encourage manufacturers to act to review the security of their code and not just the traditional safety mechanisms of these devices," Jack said.
He also found other problems with the devices, such as the fact they often contain personal data about patients, such as their name and their doctor. Other tell-tale signs of sloppy code were also found, such as potential access to remote servers used to develop the software.
"The new implementation is flawed in so many ways," Jack said. "It really needs to be reworked."
Jack is developing "Electric Feel," an application with a graphical user interface that would allow a user to scan for a medical device in range. A list will appear, and a user can select a device, such as a pacemaker, which can then be shut off or configured to deliver a shock.
As if this wasn't bad enough, Jack said it is possible to upload specially-crafted firmware to a company's servers that would infect multiple pacemakers and ICDs, spreading through their systems like a real virus.
"We are potentially looking at a worm with the ability to commit mass murder," Jack said. "It's kind of scary."
Ironically, both the implants and the wireless transmitters are capable of using AES (Advance Encryption Standard) encryption, but it is not enabled, Jack said. The devices also have "backdoors," or ways that programmers can get access to them without the standard authentication using a serial and model number.
There a legitimate medical need since without backdoors, you might have to "cut someone open," Jack said. "But if they're going to have a backdoor, at least have it embedded deep inside the ICD core. These are expensive devices."
Jack's presentation was beautifully illustrated in a comic-book like fashion. At one point, a slide showed a man who looked quite similar to former U.S. vice president Dick Cheney, who has long suffered from heart problems. The flaws in the device, Jack said, could mean an attacker could perform "a fairly anonymous assassination" from 50 feet away.
"To me, a laptop doesn't look like a device that is capable of killing someone," Jack said.
Or as an audience member added: "There's no muzzle flash with a laptop."
Send news tips and comments to email@example.com. Follow me on Twitter: @jeremy_kirk
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Trust issue looms large for tech companies capitalizing on personal data
5 women who've made it in IT
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Finding Common Ground for Collaboration in Virtual Organisations
Whilst offices are still one of our most powerful collaboration tools available, global collaboration requires us to communicate wherever we happen to be using a host of other tools. In this whitepaper, we look at the future of business collaboration technologies and strategic orientation that leads to best practice.
APAC Digital Performance
With some of the highest levels of social media penetration, mobile device ownership, and Internet connectivity in the world, Asian markets are ripe for more innovative and adept interactive engagement. In this study, we look at how marketers in the region express high hopes for digital, but hare held back with limited budgets and a region-wide lack of talent and training. Click for more
2014 Foundations of Pathways | 9 Executive Core Business Competencies
CIOs who want to shift their leadership focus beyond the IT function need to cultivate and emphasise leadership competencies that will equip them to lead effectively at the enterprise level and at the business strategy table.