Medical Malware Rampant in US Hospitals
Get the world’s most fascinating discoveries delivered straight to your inbox.
You are now subscribed
Your newsletter sign-up was successful
Want to add more newsletters?
Delivered Daily
Daily Newsletter
Sign up for the latest discoveries, groundbreaking research and fascinating breakthroughs that impact you and the wider world direct to your inbox.
Once a week
Life's Little Mysteries
Feed your curiosity with an exclusive mystery every week, solved with science and delivered direct to your inbox before it's seen anywhere else.
Once a week
How It Works
Sign up to our free science & technology newsletter for your weekly fix of fascinating articles, quick quizzes, amazing images, and more
Delivered daily
Space.com Newsletter
Breaking space news, the latest updates on rocket launches, skywatching events and more!
Once a month
Watch This Space
Sign up to our monthly entertainment newsletter to keep up with all our coverage of the latest sci-fi and space movies, tv shows, games and books.
Once a week
Night Sky This Week
Discover this week's must-see night sky events, moon phases, and stunning astrophotos. Sign up for our skywatching newsletter and explore the universe with us!
Join the club
Get full access to premium articles, exclusive features and a growing list of member rewards.
Medical devices are at risk from computer attacks and malware, government experts say. The problem, in part, stems from fears that updating or modifying existing software could break U.S. Food and Drug Administration rules.
Under the current law, software used to run medical devices in hospitals, once approved, must remain static. Therefore, manufacturers will not install anti-virus software or provide updates to fix security flaws, Technology Review reports.
As is the result with most unprotected computers online, the medical devices become infected with malware. The best hospitals can do to combat it is to take infected machines offline and clean them. That however, can be a time-consuming and labor-intensive process that also makes the device unusable for that period of time.
"Conventional malware is rampant in hospitals because of medical devices using unpatched operating systems," Kevin Fu, a medical-device and computer security scientist at UMass Amherst and the University of Michigan, told Technology Review. "There's little recourse for hospitals when a manufacturer refuses to allow OS updates or security patches."
[Remote Hack Could Cause Pacemakers to Electrocute Patients]
The biggest concern, though, is what impact the malware has on the devices and what that means for patient safety.
In one example, malware caused a slowdown in a fetal monitor used to treat high-risk pregnant women. The infected device failed to track or record data, said Mark Olson, the chief information security officer at Beth Israel Deaconess Medical Center in Boston.
Get the world’s most fascinating discoveries delivered straight to your inbox.
"Fortunately, we have a fallback model because they are high-risk [patients]," Olson told Technology Review. "They are in an IC unit — there's someone physically there to watch. But if [a doctor or nurse] are stepping away to another patient, there is a window of time for things to go in the wrong direction."
This story was provided by TechNewsDaily, a sister site to LiveScience.
