TLP White: In this edition of Hacking Healthcare, we discuss the UK’s recent decision to allow Huawei to construct portions of the country’s 5G network infrastructure. We then break down a new vulnerability affecting the peer-to-peer connectivity of internet-of-things (“IoT”) devices. Finally, we dive into healthcare organizations’ cyber-readiness and the unique challenges facing them in the form of legacy systems, strict regulatory requirements, and a lack of network segmentation.
As a reminder, this is the public version of the Hacking Healthcare blog. For additional in-depth analysis and opinion, become a member of H-ISAC and receive the TLP Amber version of this blog.
Welcome back to Hacking Healthcare.
Hot Links –
1. UK Gives Huawei an Entry Point.
Last week news outlets reported that the UK will allow Huawei to participate in building infrastructure for the nation’s 5G network, albeit on a limited basis. Huawei, a Chinese telecom equipment company alleged to operate as an arm of the Chinese government, has been granted the ability to supply certain “non-core” hardware to UK cellular phone manufacturers. After news of the decision leaked to the press, Chinese Ambassador to the UK Liu Xiaoming condemned political pressure against the choice, imploring Britain to make “the right decision independently based on its national interests and in line with its need.” The Chinese ambassador’s statement is generally understood to refer to UK allies, such as the United States and Australia, who have publicly expressed interest in minimizing Huawei’s ability to contribute to 5G network infrastructure.
As we have discussed previously, 5G network security is a hot button issue in part because of how powerful the technology is projected to be. Some analysts suggest that 5G could be up to 100 times faster than 4G, which could allow for super-sophisticated IoT devices along with other impressive technological advancements. The potential for the technology suggests 5G will be ubiquitous, so vulnerabilities in the network could be devastating.
2. New Vulnerability Exposes Millions of Smart IoT Devices.
Researcher Paul Marrapese recently reported a vulnerability in a peer-to-peer communications software called iLinkP2P. The software, which is installed in millions of IoT devices around the world (such as security cameras, Webcams, baby monitors, smart doorbells, and digital video recorders), has a significant security issue that can expose the devices’ owners and users to eavesdropping, credential theft, and remote compromise at the hands of hackers.
To discover the vulnerability, Marrapese built a proof-of concept attack that took advantage of the devices’ “heartbeat” features. After being connected to a network, iLinkP2P-enabled devices regularly send a “heartbeat” ping to the network servers. The researcher discovered that knowing a valid device’s UID alone could allow an attacker to issue fake “heartbeats” to the network, overtaking those issued by the actual device. Attackers could then obtain a user’s credentials to a device, enabling them to overtake it and co-opt it for their own use.
3. Healthcare IT Security Falls Short of Expectations.
Recently published cybersecurity reports have highlighted healthcare systems’ lack of cyber-readiness. Vectra Research’s 2019 Spotlight Report on Healthcare concluded that “healthcare’s legacy infrastructure of unmanaged devices exposes a vulnerable attack surface.” In addition, CynergisTek’s 2019 Annual Report noted that healthcare organizations on average have implemented less than half of federal agencies’ recommended cybersecurity compliance practices. Legacy systems, organizational impediments, and regulatory misalignment have created heightened obstacles for healthcare systems to overcome in order to catch up in the cybersecurity arena.
One of the primary cybersecurity issues in the healthcare sector is that many health system networks are unsegmented; this means that most computers on the network maintain the same permissions and abilities to access data maintained on servers. The dearth of firewall technologies and carefully apportioned security permissions create vulnerable points of entry for hackers and nefarious actors to exploit.
Tuesday, April 30th:
–No relevant hearings.
Wednesday, May 1st:
–No relevant hearings.
Thursday, May 2nd:
–No relevant hearings.
International Hearings/Meetings –
EU – No relevant hearings.
Conferences, Webinars, and Summits –
–H-ISAC Medical Device Security Workshop – Burlington, VT (5/1/19)
–2019 NH-ISAC Spring Summit – Ponte Vedra Beach, FL (5/13/19-5/17/19) <https://www.marriott.com/hotels/travel/jaxsw-sawgrass-marriott-golf-resort-and-spa/>
–HEALTH IT Summit (Florida) – Wesley Chapel, FL (5/21/19-5/22/19)
–HEALTH IT Summit (Mid-Atlantic) – Philadelphia, PA (6/3/19-6/4/19)
–HEALTH IT Summit (Southeast) – Nashville, TN (6/13/19-6/14/19)
–H-ISAC Healthcare Cybersecurity Workshop- Buffalo, NY (6/18/2019-6/19/2019)
–Healthcare Cybersecurity Workshop – London, UK (7/10/19)
–CybSec and Blockchain Health – London, UK (7/11/19-7/12/19)
–HEALTH IT Summit (Rocky Mountain) – Denver, CO (7/15/19-7/16/19)
–HEALTH IT Summit (California) – Los Angeles, CA (9/19/19-9/20/19)
–HEALTH IT Summit (Northeast) – Boston, MA (10/3/19-10/4/19)
–HEALTH IT Summit (Southwest) – Houston, TX (11/14/19-11/15/19)
–Health IT Summit (Northwest) – Seattle, WA (11/19/19-11/20/19)
–2019 NH-ISAC Fall Summit – San Diego, CA (12/2/19-2/6/19)
–Someone is spoofing big bank IP addresses – possibly to embarrass security vendors
–Embassies targeted in ongoing spearphishing campaign that weaponized Microsoft Excel files
–Patient PII exposed in leak of Pennsylvania-based rehab center records
–Regulations, Insider Threat Handicap Healthcare IT Security
–Bug in French government’s WhatsApp replacement let anyone join Élysée chats
–Supply Chain Hackers Snuck Malware Into Videogames
–Over 500% Increase in Ransomware Attacks Against Businesses
–Cybercrime’s Total Earnings Skyrocketed to $2.7 Billion Says the FBI
–Russians Will Soon Lose Uncensored Access to the Internet
–The Sim Swap Fix That The U.S. Isn’t Using
Contact us: follow @HealthISAC, and email at firstname.lastname@example.org
 https://www.vectra.ai/download/spotlight-report-on-healthcare-2019; https://insights.cynergistek.com/reports/2019-healthcare-cybersecurity-privacy-report?utm_content=home_banner&utm_campaign=2019_report