"Attack surface" is not a term hospital officials have historically used in debates over which medical devices to purchase.
That's changing quickly. Some networked medical devices are vulnerable to hacking, either intentionally or from lax computer security measures, which makes them weak points in the hospital's "attack surface" for hackers in cyberspace.
"Long ago, the medical device, the car, the [power] grid, was not vulnerable to cyberattack because it was a mechanical system. We've long passed the point of adding cyber components," Dan Massey, a manager at the Homeland Security Department, said at a meeting of med-tech security experts in Minneapolis this week. "In our rush to add in new functionality, are we also making sure we have security?"
Last March, the Homeland Security Department disclosed cybersecurity vulnerabilities in some common drug-dispensing machines used in hospitals. Last year, the Food and Drug Administration warned hospitals to avoid a type of drug-infusion pump vulnerable to hacking. Independent researchers continue hacking devices to look for flaws.
A few hospitals have publicly acknowledged being hit with "ransomware" attacks, in which hackers infect a hospital network and encrypt critical files until a ransom is paid. The attacks are often caused by garden-variety e-mail phishing scams, but the FBI has warned hospitals that compromised medical devices would also allow "malicious traffic" to be transmitted through firewalls and into hospital networks.
Thus far, no Minnesota hospital has acknowledged being victimized by hackers, but the extent of such vulnerabilities and attacks in hospitals is a vast unknown — a point highlighted this week at the meeting of security researchers convened by Homeland Security.
"I've never seen this kind of exposure, with this kind of risk, and so little data, in near 30 years of public health practice," said Dr. Dale Nordenberg, executive director of MDISS, the Medical Device Innovation, Safety and Security Consortium.
Nordenberg's group is one of several organizations receiving Homeland Security funding to study and develop tools to combat cyber-vulnerabilities in medical technology. The meeting where he spoke, held in Nicholson Hall at the University of Minnesota, brought together investigators from ongoing security projects in medical devices, cars, important buildings, and the power grid, among others.