April 28, 2015 By Shane Schick 2 min read

Security threats against desktops and smartphones are so overwhelming that few would want to contemplate the possibility of medical device malware, which means a product that could track it based on power consumption could be just what the doctor ordered.

According to a recent story on The Register, a startup called Virta Labs is quietly signing up health care organizations to pilot WattsUpDoc, a platform that uses machine learning to detect medical device malware via the power footprints of websites or other feedback over AC. In demonstrations at the recent RSA Conference, the firm demonstrated how this technology could work, though the two most recent U.S. hospitals among the trial group were not mentioned by name.

Though they might not be considered a high-risk endpoint today from the perspective of a chief information security officer, devices such as heart-rate monitors can collect and transmit considerable amounts of sensitive information and are sometimes connected to back-end hospital systems and medical records. In fact, InformationWeek suggested it might be relatively easy for medical device malware to find its target since default passwords are often set to things such as “admin” or can’t be changed at all.

One of the things that complicate this particular attack vector is the role of regulators such as the Food and Drug Administration (FDA), according to Government Health IT. Though the FDA has issued guidance around cybersecurity, there have historically been restrictions on how such hardware can be changed, even if it’s to provide a patch against medical device malware. Some suggest more standards are needed in this area.

The notion of using AC power to monitor and mitigate threats isn’t limited to medical device malware, of course. An in-depth feature on CSO Online explored how tools similar to WattsUpDoc are being deployed to fend off cybercriminals from industrial control systems or supervisory control and data acquisition (SCADA) systems. The latter could be a particularly interesting test case, given that recent research said SCADA systems are among the areas where cybersecurity activity is on the rise.

Of course, nothing beats prevention, and medical device malware is no exception. As Healthcare IT News pointed out, manufacturers need to build security into the design of products instead of dealing with the fallout when a cybercriminal strikes. Otherwise, technologies such as WattsUpDoc may be making a lot of house calls.

Image Source: iStock

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today