April 28, 2015 By Shane Schick 2 min read

Security threats against desktops and smartphones are so overwhelming that few would want to contemplate the possibility of medical device malware, which means a product that could track it based on power consumption could be just what the doctor ordered.

According to a recent story on The Register, a startup called Virta Labs is quietly signing up health care organizations to pilot WattsUpDoc, a platform that uses machine learning to detect medical device malware via the power footprints of websites or other feedback over AC. In demonstrations at the recent RSA Conference, the firm demonstrated how this technology could work, though the two most recent U.S. hospitals among the trial group were not mentioned by name.

Though they might not be considered a high-risk endpoint today from the perspective of a chief information security officer, devices such as heart-rate monitors can collect and transmit considerable amounts of sensitive information and are sometimes connected to back-end hospital systems and medical records. In fact, InformationWeek suggested it might be relatively easy for medical device malware to find its target since default passwords are often set to things such as “admin” or can’t be changed at all.

One of the things that complicate this particular attack vector is the role of regulators such as the Food and Drug Administration (FDA), according to Government Health IT. Though the FDA has issued guidance around cybersecurity, there have historically been restrictions on how such hardware can be changed, even if it’s to provide a patch against medical device malware. Some suggest more standards are needed in this area.

The notion of using AC power to monitor and mitigate threats isn’t limited to medical device malware, of course. An in-depth feature on CSO Online explored how tools similar to WattsUpDoc are being deployed to fend off cybercriminals from industrial control systems or supervisory control and data acquisition (SCADA) systems. The latter could be a particularly interesting test case, given that recent research said SCADA systems are among the areas where cybersecurity activity is on the rise.

Of course, nothing beats prevention, and medical device malware is no exception. As Healthcare IT News pointed out, manufacturers need to build security into the design of products instead of dealing with the fallout when a cybercriminal strikes. Otherwise, technologies such as WattsUpDoc may be making a lot of house calls.

Image Source: iStock

More from

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

DOD establishes Office of the Assistant Secretary of Defense for Cyber Policy

2 min read - The federal government recently took a new step toward prioritizing cybersecurity and demonstrating its commitment to reducing risk. On March 20, 2024, the Pentagon formally established the new Office of the Assistant Secretary of Defense for Cyber Policy to supervise cyber policy for the Department of Defense. The next day, President Joe Biden announced Michael Sulmeyer as his nominee for the role.“In standing up this office, the Department is giving cyber the focus and attention that Congress intended,” said Acting…

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today