27
Concinnity Risks Unpatchable Living with a vulnerable implanted device @MarieGMoe @blackswanburst Marie Moe, PhD, Research Scien?st at SINTEF Eireann LevereE, Founder and CEO of Concinnity Risks

Unpatchable: 32C3 edition

Embed Size (px)

Citation preview

Page 1: Unpatchable: 32C3 edition

Concinnity  Risks  

Unpatchable    Living  with  a  vulnerable  implanted  device  

@MarieGMoe  @blackswanburst  

Marie  Moe,  PhD,  Research  Scien?st  at  SINTEF  Eireann  LevereE,  Founder  and  CEO  of  Concinnity  Risks  

Page 2: Unpatchable: 32C3 edition

Hack  to  save  lives!  

Page 3: Unpatchable: 32C3 edition

 A  brief  history  of  my  heart…  

Page 4: Unpatchable: 32C3 edition

How  the  heart  works  

Page 5: Unpatchable: 32C3 edition

Electrical  system  of  the  heart  

Page 6: Unpatchable: 32C3 edition

Pacemaker  

Page 7: Unpatchable: 32C3 edition

 The  Internet  of  Medical  ”Things”  is  real,  

 and  Marie’s  heart  is  wired  into  it…  

Page 8: Unpatchable: 32C3 edition

①  Implantable  medical  device  –  ICD/Pacemaker/other  devices  –  MICS  (Medical  Implant  

Communica?on  Service)  –  Bluetooth  

②  Access  point  –  POTS/GSM/SMS/email  

③  GSM/Telephone/Internet  ④  Telemetry  store  

–  Programmers  –  Doctor’s  worksta?on  –  Telemetry  server  at  vendor  

⑤  Medical  staff  –  Social  engineering  

Page 9: Unpatchable: 32C3 edition

With  connec?vity  comes  vulnerability…  

Page 10: Unpatchable: 32C3 edition

Poten?al  impact  Pa?ent  privacy  issues  

BaEery  exhaus?on  

Device  malfunc?on  

Death  threats  and  extor?on  

Remote  assassina?on  scenario…  

Page 11: Unpatchable: 32C3 edition

 ”We  need  to  be  able  to  verify  the  so\ware  that  

controls  our  lives”  

Bruce  Schneier  on  “Volkswagen  and  Chea?ng  So\ware”  

Page 12: Unpatchable: 32C3 edition

Previous  work  •  Kevin  Fu  et  al:  

–  Pacemakers  and  implantable  cardiac  defibrillators:  So\ware  radio  aEacks  and  zero-­‐power  defenses  (2008)  

–  Mi?ga?ng  EMI  signal  injec?on  aEacks  against  analog  sensors  (2013)  

•  Barnaby  Jack  •  Hardcoded  creden?als  •  Medical  device  honeypots  •  Drug  infusion  pumps  

Page 13: Unpatchable: 32C3 edition

Hacking  can  save  lives  

Source:  h*p://www.fda.gov/MedicalDevices/Safety/AlertsandNo>ces/ucm456815.htm  

 

Page 14: Unpatchable: 32C3 edition

Medical  devices  do  get  infected    

Source:  h*ps://securityledger.com/wp-­‐content/uploads/2015/06/AOA_MEDJACK_LAYOUT_6-­‐0_6-­‐3-­‐2015-­‐1.pdf  

Page 15: Unpatchable: 32C3 edition

WTF  are  you  doing  with  my  data?  

Page 16: Unpatchable: 32C3 edition

The  stairs  that  almost  killed  me  

Page 17: Unpatchable: 32C3 edition

Debugging  me    

 

Page 18: Unpatchable: 32C3 edition

Leadless  pacemaker  

Page 19: Unpatchable: 32C3 edition

The  future?  

Page 20: Unpatchable: 32C3 edition

Reflec?ons  on  trus?ng  machines  

Page 21: Unpatchable: 32C3 edition

Why?  

Legacy  technology  

No  so\ware  updates  Long  life?me  of  devices  

No  security  tes?ng  or  monitoring  

Medical  devices  are  ”black  boxes”  Proprietary  

so\ware  

More  connec?vity  

Lack  of  regula?ons  Increased  aEack  surface  

Page 22: Unpatchable: 32C3 edition

How  to  solve  it?  

Security  research  

Informa?on  sharing  Third  party  collabora?on  Coordinated  disclosure  

Vendor  awareness  

Regula?on  Procurement  

Safety  by  design  Security  tes?ng  

Security  risk  

monitoring  

Security  updates  Incident  response  Cyber  insurance  Resilience  

Page 23: Unpatchable: 32C3 edition
Page 24: Unpatchable: 32C3 edition

 What  is  the  social  contract  for  the  

code  in  our  bodies?  

Page 25: Unpatchable: 32C3 edition

Research  needed  •  Open  source  medical  devices  •  Medical  device  cryptography  •  Personal  area  network  monitoring  •  Jamming  protec?on  •  Forensics  evidence  capture  

Page 26: Unpatchable: 32C3 edition

Credits  

Tony  Naggs  (@xa329)  Gunnar  Alendal  (@gradoisageek)  Alexandre  Dulaunoy  (@adulau)  Joshua  Corman  (@joshcorman)  

Claus  Cramon  Houmann  (@ClausHoumann)  ScoE  Erven  (@scoEerven)  Beau  Woods  (@beauwoods)  Suzanne  Schwartz  (US  FDA)  

Family  &  Friends    

Page 27: Unpatchable: 32C3 edition

Concinnity  Risks  

Thank  you!        

www.infosec.sintef.no  www.iamthecavalry.org  www.concinnity-­‐risks.com  

@MarieGMoe  @blackswanburst