Mitigating cybersecurity risks in radiology—is it time to unmask vulnerabilities and fortify cyber defenses with ethical hacking?

iRadiology Pub Date : 2024-03-29 DOI:10.1002/ird3.71
Reuben Schmidt, Lincoln J. Lim
{"title":"Mitigating cybersecurity risks in radiology—is it time to unmask vulnerabilities and fortify cyber defenses with ethical hacking?","authors":"Reuben Schmidt,&nbsp;Lincoln J. Lim","doi":"10.1002/ird3.71","DOIUrl":null,"url":null,"abstract":"<p>The integration of technology in medicine, particularly in the field of radiology, has led to significant advancements in patient care and diagnosis. While this digital transformation of healthcare has brought many benefits, it has also exposed radiological systems and sensitive patient data to unprecedented cybersecurity threats. This article aims to highlight the current cyberattack landscape, trends, and benefits of ethical hacking, which could be employed to identify vulnerabilities and improve cybersecurity defenses.</p><p>Global cyberattacks have been exponentially increasing on an annual basis. Focusing on the global healthcare sector, the number of attacks had alarmingly increased by 69% within the space of a year (from 2021 to 2022) [<span>1</span>]. Up to 250 million individuals have been affected by healthcare data breaches from 2005 to 2019, of which, 157 million individuals have been affected in the last 5 years [<span>2</span>]. The financial impact has also been significant. According to an IBM report, the average cost of a single healthcare data breach affecting an average of 26,000 records would cost up to $15 million [<span>2</span>]. The breach of Anthem, a medical insurance company in the USA in 2015, exposed the medical records of 78 million individuals and resulted in a $115 million settlement [<span>3</span>].</p><p>In Australia, 22% of businesses have experienced a cybersecurity attack in FY2021/2022, and the number of attacks has doubled since FY2019/2020 [<span>4</span>]. A total of 16% of the cyberattacks were scams/fraud, 5% were malicious software, and 3% were related to unauthorized access [<span>4</span>]. In FY2021/2022, these attacks were associated with 18% service downtime and 17% loss of staff productivity [<span>4</span>]. Notable events in Australian healthcare that occurred within the past year (2022) include the Australian Red Cross from a cyberattack on the International Committee of Red Cross servers, CTARS client case management system for vulnerable children, Medlab Pathology attack impacting almost 230,000 individuals, Medibank attack impacting 9.7 million customers and private hospital provider, Mater [<span>1</span>]. The impacts of cyberattacks on healthcare systems include the breach of sensitive patient data, disruption of services, electronic system downtime, cancellation of scheduled medical appointments, and ambulance diversions.</p><p>Within radiology, Picture Archiving and Communication Systems (PACS) and Radiology Information Systems (RIS) are used to help streamline the process of retrieving, storing, and sharing of medical images that are saved in the Digital Imaging and Communications in Medicine (DICOM) format (international communication standard). Breach of these systems can result in the theft of sensitive patient data/diagnoses and an increased risk of identity theft and ransom. Manipulation of medical images is also an emerging concern, which could result in dire consequences in patient care.</p><p>Since the inception of DICOM in the late 1980s, DICOM has underwent multiple enhancements from varying groups of stakeholders (i.e., vendors, working groups, and committees) through the years; however, DICOM security protocols were largely untouched [<span>5</span>]. Despite legal reinforcements and standard additions to DICOM, medical data security was never robustly built, theoretical, or nonexistent [<span>5</span>]. While the current DICOM standard includes some security provisions such as encryption for secure transmission of data via transport layer security (TLS) and digital signatures, the DICOM standard only provides for, but does not enforce the need for data security. As such, manufacturers are free to modify and implement parts of the DICOM standard based on preference. In addition to the proprietary nature of medical systems and the complexity of managing encryption certificates/keys, this has resulted in varying degrees of implementation or ignorance by the manufacturers [<span>3</span>]. Within the hospital walls, much of the data security falls onto the information technology (IT) and PACS administrative staff. This has led to generic protocol implementations such as firewalls, identity access management, and virtual private networks [<span>5</span>].</p><p>In a 2015 study, researchers simulated hackers and implemented a DICOM probe of the entire World Wide Web to locate vulnerable or open radiology servers via a standard DICOM handshake (analogous to opening a web page in a browser) [<span>5</span>]. The scanning tool acted as a legitimate medical application that was used to extract medical data from remote servers. They implemented a security threat grading system (type 1–6), where a true security threat is denoted from type 3 (basic threat DICOM application open to external party) to type 6 (complete open access to medical records). In total, 2774 servers were at type 3–4 security threat levels, of which, 719 were DICOM-open servers. The countries with the most extensive infrastructures (i.e., United States) also led in the most unsecure DICOM ratings. While most of the detected servers rejected the handshake, it was thought that this was likely due to vendor or support team whitelists that block foreign connections (basic security protocol), and that it may be possible to bypass this with a local internet protocol (IP) address. The study also revealed the lack of basic firewall protection for perimeter security as the researchers were able to still reach these servers from foreign IP addresses. The study concluded just short of downloading patients' data from the open servers as it was illegal but completely achievable [<span>5</span>]. The study's findings were echoed in 2018 when a McAfee researcher utilized an internet scanning tool and found 1100 unprotected DICOM servers worldwide. He was able to download medical DICOM images and print a 3D model of a patient's pelvic bones from the data [<span>6</span>].</p><p>In addition, recent proof-of-concept attacks have demonstrated vulnerabilities in RIS/PACS and DICOM (image file standard in radiology). Researchers recently showed the ability to automatically add lung cancer nodules/lesions to chest CT scans using deep learning techniques and modifying DICOM data which was in transit from the scanner to the PACS system [<span>7</span>]. The tampered CT chest images were able to fool 99% of the radiologists involved in the study. In another attack, malware was embedded within the DICOM file header, which allowed the file to still function normally on PACS. However, the malicious binary executable would be triggered when the study was opened [<span>8</span>].</p><p>To help safeguard PACS/RIS and DICOM images, there is a myriad of security measures and recommendations that can help bolster the resilience to cyberattacks in healthcare organizations [<span>9</span>]. Whilst there is an extensive list of recommendations, they could be broken down into physical, technical, and organizational sections. Physical security measures include locking doors in unused rooms and preventing network cable removal using secure network plugs. Technical security measures include splitting or segmentation of internal networks with interspersed firewalls between layers, secure wireless networks with regular review and updates, regular antivirus, and malware scanning, and permitting only the use of whitelisted applications. Organizational security measures include appropriate access rights for employees (since data breeches or theft are usually from employees), vendor/IT collaboration to use bi-directional authentication for TLS encryption, and audit with support for encrypted network communication [<span>9</span>].</p><p>Despite regular updates and improvements in cybersecurity, cyberattacks continue to become more commonplace and sophisticated. The implementation of the above-mentioned security recommendations will also be likely patchy with varying degrees of adoption across global healthcare organizations. Perhaps it is time for everyone to think outside the box where ethical hacking methodology would be of benefit. Ethical (or “white hat”) hackers employ the same tools and techniques as malicious attackers but do so under contract to identify vulnerabilities before criminal exploitation. Hacking approaches such as penetration testing, social engineering, and fuzzing can all reveal weaknesses in an organization's networks, applications, and human elements.</p><p>For radiology systems, ethical hacking should include attempts to breach the network perimeter, interception, and modification of DICOM transfers, alteration of RIS scheduling data, and embedding codes into DICOM files. Successful attacks would demonstrate insufficient encryption, lack of data validation, unpatched software vulnerabilities, and inadequate intrusion detection. These invaluable insights obtained from ethical hacking would allow IT security teams to improve authentication controls, segment internal networks, enforce encryption protocols (i.e., TLS), validate DICOM object integrity, and monitor system activity. Periodic retesting would verify and ensure that the appropriate defenses are in place.</p><p>Apart from the routine cybersecurity practices that are already employed widely, ethical hacking exercises would help build security awareness among radiology staff through social engineering attempts. With proper scoping and authorization, controlled attacks can improve the cyber resilience of radiology workflows and limit/prevent any disruption of patient care. Radiologists must also partner with health IT security teams to utilize ethical hacking as a proactive form of cyber defense.</p><p>Advances in technology will bring two sides of a coin. Whilst there is much good that is achieved, new cyber risks and vulnerabilities will also continue to emerge. This article has shown that there is much to be desired in the cybersecurity of radiology RIS/PACS and DICOM systems. Whilst this can be partially mitigated by the employment of cybersecurity recommendations, its implementation will likely be varied. Perhaps ethical hacking, akin to the above-mentioned studies where researchers mimic hacker techniques to test the security levels and vulnerabilities of open DICOM systems, is an important addition to our armamentarium in our war against the ongoing waves of sophisticated cyberattacks. As ethical hackers are employed by healthcare organizations, they will be able to tailor their approach and identify organization-specific vulnerabilities, which will be helpful given the variations in security protocol implementation. Along with vendor collaboration and regularly updated standards, there is hope that this multi-faceted approach can continue to help us keep radiological systems safe, secure, and trustworthy sources of patient data in this rapidly evolving cyber landscape.</p><p><b>Reuben Schmidt</b>: Conceptualization (supporting); investigation (equal); data curation (supporting); writing − original draft (equal). <b>Lincoln J. Lim</b>: Conceptualization (lead), investigation (equal); data curation (supporting); writing − original draft (equal); project administration (lead); writing − review &amp; editing (lead). All authors commented on previous versions of the manuscript and approved the final version.</p><p>The authors declare no conflict of interest.</p><p>Not applicable.</p><p>Not applicable.</p>","PeriodicalId":73508,"journal":{"name":"iRadiology","volume":"2 2","pages":"216-219"},"PeriodicalIF":0.0000,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ird3.71","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"iRadiology","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ird3.71","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The integration of technology in medicine, particularly in the field of radiology, has led to significant advancements in patient care and diagnosis. While this digital transformation of healthcare has brought many benefits, it has also exposed radiological systems and sensitive patient data to unprecedented cybersecurity threats. This article aims to highlight the current cyberattack landscape, trends, and benefits of ethical hacking, which could be employed to identify vulnerabilities and improve cybersecurity defenses.

Global cyberattacks have been exponentially increasing on an annual basis. Focusing on the global healthcare sector, the number of attacks had alarmingly increased by 69% within the space of a year (from 2021 to 2022) [1]. Up to 250 million individuals have been affected by healthcare data breaches from 2005 to 2019, of which, 157 million individuals have been affected in the last 5 years [2]. The financial impact has also been significant. According to an IBM report, the average cost of a single healthcare data breach affecting an average of 26,000 records would cost up to $15 million [2]. The breach of Anthem, a medical insurance company in the USA in 2015, exposed the medical records of 78 million individuals and resulted in a $115 million settlement [3].

In Australia, 22% of businesses have experienced a cybersecurity attack in FY2021/2022, and the number of attacks has doubled since FY2019/2020 [4]. A total of 16% of the cyberattacks were scams/fraud, 5% were malicious software, and 3% were related to unauthorized access [4]. In FY2021/2022, these attacks were associated with 18% service downtime and 17% loss of staff productivity [4]. Notable events in Australian healthcare that occurred within the past year (2022) include the Australian Red Cross from a cyberattack on the International Committee of Red Cross servers, CTARS client case management system for vulnerable children, Medlab Pathology attack impacting almost 230,000 individuals, Medibank attack impacting 9.7 million customers and private hospital provider, Mater [1]. The impacts of cyberattacks on healthcare systems include the breach of sensitive patient data, disruption of services, electronic system downtime, cancellation of scheduled medical appointments, and ambulance diversions.

Within radiology, Picture Archiving and Communication Systems (PACS) and Radiology Information Systems (RIS) are used to help streamline the process of retrieving, storing, and sharing of medical images that are saved in the Digital Imaging and Communications in Medicine (DICOM) format (international communication standard). Breach of these systems can result in the theft of sensitive patient data/diagnoses and an increased risk of identity theft and ransom. Manipulation of medical images is also an emerging concern, which could result in dire consequences in patient care.

Since the inception of DICOM in the late 1980s, DICOM has underwent multiple enhancements from varying groups of stakeholders (i.e., vendors, working groups, and committees) through the years; however, DICOM security protocols were largely untouched [5]. Despite legal reinforcements and standard additions to DICOM, medical data security was never robustly built, theoretical, or nonexistent [5]. While the current DICOM standard includes some security provisions such as encryption for secure transmission of data via transport layer security (TLS) and digital signatures, the DICOM standard only provides for, but does not enforce the need for data security. As such, manufacturers are free to modify and implement parts of the DICOM standard based on preference. In addition to the proprietary nature of medical systems and the complexity of managing encryption certificates/keys, this has resulted in varying degrees of implementation or ignorance by the manufacturers [3]. Within the hospital walls, much of the data security falls onto the information technology (IT) and PACS administrative staff. This has led to generic protocol implementations such as firewalls, identity access management, and virtual private networks [5].

In a 2015 study, researchers simulated hackers and implemented a DICOM probe of the entire World Wide Web to locate vulnerable or open radiology servers via a standard DICOM handshake (analogous to opening a web page in a browser) [5]. The scanning tool acted as a legitimate medical application that was used to extract medical data from remote servers. They implemented a security threat grading system (type 1–6), where a true security threat is denoted from type 3 (basic threat DICOM application open to external party) to type 6 (complete open access to medical records). In total, 2774 servers were at type 3–4 security threat levels, of which, 719 were DICOM-open servers. The countries with the most extensive infrastructures (i.e., United States) also led in the most unsecure DICOM ratings. While most of the detected servers rejected the handshake, it was thought that this was likely due to vendor or support team whitelists that block foreign connections (basic security protocol), and that it may be possible to bypass this with a local internet protocol (IP) address. The study also revealed the lack of basic firewall protection for perimeter security as the researchers were able to still reach these servers from foreign IP addresses. The study concluded just short of downloading patients' data from the open servers as it was illegal but completely achievable [5]. The study's findings were echoed in 2018 when a McAfee researcher utilized an internet scanning tool and found 1100 unprotected DICOM servers worldwide. He was able to download medical DICOM images and print a 3D model of a patient's pelvic bones from the data [6].

In addition, recent proof-of-concept attacks have demonstrated vulnerabilities in RIS/PACS and DICOM (image file standard in radiology). Researchers recently showed the ability to automatically add lung cancer nodules/lesions to chest CT scans using deep learning techniques and modifying DICOM data which was in transit from the scanner to the PACS system [7]. The tampered CT chest images were able to fool 99% of the radiologists involved in the study. In another attack, malware was embedded within the DICOM file header, which allowed the file to still function normally on PACS. However, the malicious binary executable would be triggered when the study was opened [8].

To help safeguard PACS/RIS and DICOM images, there is a myriad of security measures and recommendations that can help bolster the resilience to cyberattacks in healthcare organizations [9]. Whilst there is an extensive list of recommendations, they could be broken down into physical, technical, and organizational sections. Physical security measures include locking doors in unused rooms and preventing network cable removal using secure network plugs. Technical security measures include splitting or segmentation of internal networks with interspersed firewalls between layers, secure wireless networks with regular review and updates, regular antivirus, and malware scanning, and permitting only the use of whitelisted applications. Organizational security measures include appropriate access rights for employees (since data breeches or theft are usually from employees), vendor/IT collaboration to use bi-directional authentication for TLS encryption, and audit with support for encrypted network communication [9].

Despite regular updates and improvements in cybersecurity, cyberattacks continue to become more commonplace and sophisticated. The implementation of the above-mentioned security recommendations will also be likely patchy with varying degrees of adoption across global healthcare organizations. Perhaps it is time for everyone to think outside the box where ethical hacking methodology would be of benefit. Ethical (or “white hat”) hackers employ the same tools and techniques as malicious attackers but do so under contract to identify vulnerabilities before criminal exploitation. Hacking approaches such as penetration testing, social engineering, and fuzzing can all reveal weaknesses in an organization's networks, applications, and human elements.

For radiology systems, ethical hacking should include attempts to breach the network perimeter, interception, and modification of DICOM transfers, alteration of RIS scheduling data, and embedding codes into DICOM files. Successful attacks would demonstrate insufficient encryption, lack of data validation, unpatched software vulnerabilities, and inadequate intrusion detection. These invaluable insights obtained from ethical hacking would allow IT security teams to improve authentication controls, segment internal networks, enforce encryption protocols (i.e., TLS), validate DICOM object integrity, and monitor system activity. Periodic retesting would verify and ensure that the appropriate defenses are in place.

Apart from the routine cybersecurity practices that are already employed widely, ethical hacking exercises would help build security awareness among radiology staff through social engineering attempts. With proper scoping and authorization, controlled attacks can improve the cyber resilience of radiology workflows and limit/prevent any disruption of patient care. Radiologists must also partner with health IT security teams to utilize ethical hacking as a proactive form of cyber defense.

Advances in technology will bring two sides of a coin. Whilst there is much good that is achieved, new cyber risks and vulnerabilities will also continue to emerge. This article has shown that there is much to be desired in the cybersecurity of radiology RIS/PACS and DICOM systems. Whilst this can be partially mitigated by the employment of cybersecurity recommendations, its implementation will likely be varied. Perhaps ethical hacking, akin to the above-mentioned studies where researchers mimic hacker techniques to test the security levels and vulnerabilities of open DICOM systems, is an important addition to our armamentarium in our war against the ongoing waves of sophisticated cyberattacks. As ethical hackers are employed by healthcare organizations, they will be able to tailor their approach and identify organization-specific vulnerabilities, which will be helpful given the variations in security protocol implementation. Along with vendor collaboration and regularly updated standards, there is hope that this multi-faceted approach can continue to help us keep radiological systems safe, secure, and trustworthy sources of patient data in this rapidly evolving cyber landscape.

Reuben Schmidt: Conceptualization (supporting); investigation (equal); data curation (supporting); writing − original draft (equal). Lincoln J. Lim: Conceptualization (lead), investigation (equal); data curation (supporting); writing − original draft (equal); project administration (lead); writing − review & editing (lead). All authors commented on previous versions of the manuscript and approved the final version.

The authors declare no conflict of interest.

Not applicable.

Not applicable.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
降低放射学中的网络安全风险--现在是通过道德黑客揭露漏洞和强化网络防御的时候了吗?
虽然大多数被检测到的服务器都拒绝握手,但研究人员认为,这很可能是由于供应商或支持团队的白名单阻止了国外连接(基本安全协议),而使用本地互联网协议(IP)地址则有可能绕过白名单。这项研究还揭示了周边安全缺乏基本的防火墙保护,因为研究人员仍能从国外 IP 地址访问这些服务器。这项研究的结论是,从开放服务器下载患者数据虽然不合法,但完全可以实现[5]。2018 年,McAfee 的一名研究人员利用互联网扫描工具发现了全球 1100 个未受保护的 DICOM 服务器,该研究结果与上述研究结果不谋而合。他能够下载医疗 DICOM 图像,并从数据中打印出患者盆腔骨骼的 3D 模型[6]。此外,最近的概念验证攻击也展示了 RIS/PACS 和 DICOM(放射学图像文件标准)中的漏洞。研究人员最近展示了利用深度学习技术和修改从扫描仪传输到 PACS 系统的 DICOM 数据,在胸部 CT 扫描中自动添加肺癌结节/病变的能力[7]。被篡改的胸部 CT 图像能够骗过 99% 参与研究的放射科医生。在另一种攻击中,恶意软件被嵌入 DICOM 文件头中,使文件仍能在 PACS 上正常运行。为了帮助保护 PACS/RIS 和 DICOM 图像,有许多安全措施和建议可以帮助医疗机构提高抵御网络攻击的能力[9]。虽然建议的清单非常广泛,但可分为物理、技术和组织三个部分。物理安全措施包括锁上闲置房间的门,使用安全的网络插头防止网线被拔出。技术安全措施包括分割或分段内部网络,在各层之间穿插防火墙,定期审查和更新安全无线网络,定期进行防病毒和恶意软件扫描,以及只允许使用白名单上的应用程序。组织安全措施包括为员工提供适当的访问权限(因为数据泄露或盗窃通常来自员工)、供应商/IT 协作使用 TLS 加密双向验证以及支持加密网络通信的审计[9]。上述安全建议的实施也很可能是零散的,全球医疗机构采用的程度也不尽相同。也许现在是大家跳出框框思考的时候了,因为道德黑客方法会让大家受益匪浅。道德(或 "白帽")黑客使用与恶意攻击者相同的工具和技术,但他们是根据合同在犯罪利用之前找出漏洞。渗透测试、社会工程学和模糊处理等黑客攻击方法都能揭示组织网络、应用程序和人为因素中的弱点。对于放射学系统,道德黑客攻击应包括尝试突破网络边界、拦截和修改 DICOM 传输、更改 RIS 调度数据以及在 DICOM 文件中嵌入代码。成功的攻击将证明加密不足、缺乏数据验证、软件漏洞未修补以及入侵检测不足。从道德黑客攻击中获得的这些宝贵见解将使 IT 安全团队能够改进身份验证控制、划分内部网络、执行加密协议(如 TLS)、验证 DICOM 对象的完整性并监控系统活动。除了已经广泛采用的常规网络安全实践外,道德黑客练习还有助于通过社会工程尝试在放射科员工中建立安全意识。通过适当的范围界定和授权,可控攻击可提高放射科工作流程的网络复原力,限制/防止对患者护理的任何干扰。放射科医生还必须与医疗 IT 安全团队合作,利用道德黑客作为一种积极的网络防御形式。技术的进步会带来硬币的两面,在取得很多好成绩的同时,新的网络风险和漏洞也会不断涌现。本文表明,放射学 RIS/PACS 和 DICOM 系统的网络安全还有许多不足之处。虽然采用网络安全建议可以部分缓解这一问题,但其实施可能会有所不同。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Issue Information An unusual large mass of sclerosing angiomatoid nodular transformation Exploring the feasibility of integrating ultra-high field magnetic resonance imaging neuroimaging with multimodal artificial intelligence for clinical diagnostics Three-dimensional time of flight magnetic resonance angiography at 5.0T: Visualization of the superior cerebellar artery Ultra-high field magnetic resonance imaging in theranostics of mental disorders
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1