[Diabetes-talk] Insulin Pumps Able to Be Hacked
Everett Gavel
everett at everettgavel.com
Fri Aug 26 13:44:22 UTC 2011
FYI,
Everett
Insulin pump maker identified after hacking talk
After devising way to hack insulin pumps, researcher
says he's stymied by device maker
http://finance.yahoo.com/news/Insulin-pump-maker-identi
fied-apf-4070222421.html?x=0
SAN FRANCISCO (AP) -- When Jay Radcliffe revealed three
weeks ago that he'd found serious security holes in a
popular type of insulin pump that diabetics wear, he
kept two important details secret: the pump maker's
name, and the specific technique he used to hack the
device.
The problems he found carry exceptional risks, such as
being able to program a special remote control to
command strangers' pumps to dispense the wrong dosage
of insulin. But Radcliffe said he was ignored in
repeated attempts to alert the company to the defects.
On Thursday he identified the company -- Medtronic Inc.
-- in an effort to apply public pressure to fix the
vulnerabilities.
The disclosure raises the risk of attacks on certain
Medtronic insulin pumps. But Radcliffe said he hopes
that exposure helps fix the problems. He said he tried
to handle the disclosure ethically -- by working with
the company first -- and felt "there should have been
an ethical response (from the company) to that."
Radcliffe, a diabetic who experimented on his own
Medtronic pump, revealed the details to The Associated
Press ahead of a planned news conference.
Medtronic would not directly address its interactions
with Radcliffe. Spokeswoman Amanda Sheldon said a
Medtronic employee attended Radcliffe's presentation at
the Black Hat computer security conference this month
in Las Vegas and said the company was analyzing his
public statements.
"We have to evaluate the sources of the information and
figure out what we should do with it," she said.
Radcliffe said his public statements intentionally
lacked the specific technical details that Medtronic
would need to address the vulnerabilities he's found.
After the Department of Homeland Security, which
examined his research, helped make the introduction to
Medtronic, his calls and e-mails went unanswered, he
said, a claim Medtronic wouldn't specifically address.
Radcliffe, who lives in Meridian, Idaho, said the
experience has caused him to switch to another company
that appears to use stronger security.
However, he said Medtronic customers should continue to
use their pumps, as the techniques he developed are
hard to execute in the real world -- for now. Hacking
attacks tend to get easier as more people do them,
because hackers can write programs to automate the most
cumbersome tasks.
The tension is more than an inside-baseball ethical
dilemma about how security professionals should deal
with companies they believe have been uncooperative and
aren't fixing known vulnerabilities.
Medtronic, which is based in Minneapolis, is one of the
world's biggest medical device makers. A Medtronic
device that works as a pacemaker and defibrillator was
also found in a different study in 2008 to be
vulnerable to hacking attacks.
Radcliffe's findings and the earlier study are examples
of hacking attack of the future, in which the
sophisticated software and communications chips being
added to everyday technologies will make them
vulnerable to frightening new attacks.
Medical devices are particularly vulnerable because
there are clear advantages in allowing them to talk to
each other wirelessly and connect to the Internet. That
connection allows devices to receive important software
updates, and it lets patients upload their medical
information to special websites to track the status of
their conditions. But medical device makers aren't used
to hackers picking apart their products, and there's no
clear path for disclosing weaknesses.
In light of Radcliffe's findings, two lawmakers, Reps.
Anna Eshoo of California and Edward Markey of
Massachusetts, both Democrats, have asked the
Government Accountability Office, the investigative arm
of Congress, to evaluate the government's efforts to
identify the risks of implants and other medical
devices that use wireless communication.
Radcliffe said he also took issue with a statement that
Medtronic issued after his presentation. The company
had asserted that turning off the device's wireless
function would protect users from attack. Radcliffe
said that statement is inaccurate because the
particular wireless ability he exploited can't be
turned off, which means a deeper fix would be needed.
Sheldon, the Medtronic spokeswoman, would not address
Radcliffe's claims specifically, saying that "we're not
going to bit-by-bit outline our security measures." She
added that the "risk of deliberate, malicious or
unauthorized manipulation of our insulin pumps is
extremely low" and that the company is not aware of any
attacks on its devices outside of research
environments.
Sheldon said the company is open to talking to
Radcliffe. Radcliffe received an email from Medtronic's
public relations department after a reporter inquired
about the issue.
Late Thursday, Medtronic said it doesn't plan to fix
the weaknesses in current products, but is adding
encryption and other security measures to the next
generation of products to deter hackers. Those products
could take several years to hit the market, though, in
part because of a lengthy government approval process.
Radcliffe said the response was inadequate, because the
devices could be fixed sooner with a "patch," and
current Medtronic pumps are left with outdated software
code that can be exploited.
More information about the Diabetes-Talk
mailing list