April 28, 2015 By Shane Schick 2 min read

Security threats against desktops and smartphones are so overwhelming that few would want to contemplate the possibility of medical device malware, which means a product that could track it based on power consumption could be just what the doctor ordered.

According to a recent story on The Register, a startup called Virta Labs is quietly signing up health care organizations to pilot WattsUpDoc, a platform that uses machine learning to detect medical device malware via the power footprints of websites or other feedback over AC. In demonstrations at the recent RSA Conference, the firm demonstrated how this technology could work, though the two most recent U.S. hospitals among the trial group were not mentioned by name.

Though they might not be considered a high-risk endpoint today from the perspective of a chief information security officer, devices such as heart-rate monitors can collect and transmit considerable amounts of sensitive information and are sometimes connected to back-end hospital systems and medical records. In fact, InformationWeek suggested it might be relatively easy for medical device malware to find its target since default passwords are often set to things such as “admin” or can’t be changed at all.

One of the things that complicate this particular attack vector is the role of regulators such as the Food and Drug Administration (FDA), according to Government Health IT. Though the FDA has issued guidance around cybersecurity, there have historically been restrictions on how such hardware can be changed, even if it’s to provide a patch against medical device malware. Some suggest more standards are needed in this area.

The notion of using AC power to monitor and mitigate threats isn’t limited to medical device malware, of course. An in-depth feature on CSO Online explored how tools similar to WattsUpDoc are being deployed to fend off cybercriminals from industrial control systems or supervisory control and data acquisition (SCADA) systems. The latter could be a particularly interesting test case, given that recent research said SCADA systems are among the areas where cybersecurity activity is on the rise.

Of course, nothing beats prevention, and medical device malware is no exception. As Healthcare IT News pointed out, manufacturers need to build security into the design of products instead of dealing with the fallout when a cybercriminal strikes. Otherwise, technologies such as WattsUpDoc may be making a lot of house calls.

Image Source: iStock

More from

How to craft a comprehensive data cleanliness policy

3 min read - Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential.But what does this involve, and how can you ensure your data cleanliness policy checks the right boxes? Luckily, there are practical steps you can follow to ensure data accuracy while mitigating the security and compliance risks that come with poor data hygiene.Understanding the 6 dimensions of…

2024 roundup: Top data breach stories and industry trends

3 min read - With 2025 on the horizon, it’s important to reflect on the developments and various setbacks that happened in cybersecurity this past year. While there have been many improvements in security technologies and growing awareness of emerging cybersecurity threats, 2024 was also a hard reminder that the ongoing fight against cyber criminals is far from over.We've summarized this past year's top five data breach stories and industry trends, with key takeaways from each that organizations should note going into the following…

Black Friday chaos: The return of Gozi malware

4 min read - On November 29th, 2024, Black Friday, shoppers flooded online stores to grab the best deals of the year. But while consumers were busy filling their carts, cyber criminals were also seizing the opportunity to exploit the shopping frenzy. Our system detected a significant surge in Gozi malware activity, targeting financial institutions across North America. The Black Friday connection Black Friday creates an ideal environment for cyber criminals to thrive. The combination of skyrocketing transaction volumes, a surge in online activity…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today