DOTmed Home MRI Oncology Ultrasound Molecular Imaging X-Ray Cardiology Health IT Business Affairs
News Home Parts & Service Operating Room CT Women's Health Proton Therapy Endoscopy HTMs Mobile Imaging
SEARCH
Current Location:
>
> This Story


Log in or Register to rate this News Story
Forward Printable StoryPrint Comment

 

Health IT Homepage

Machine learning algorithm may predict early-stage Alzheimer's disease Already used for cancer

Enterprise imaging will make up 27 percent of imaging IT market by 2021 PACS vendors ramp up enterprise solutions to compete against multi-vendor IT models

Hospital for Special Surgery improves response times to 12 critical events How one NY hospital rose to the occasion in the aftermath of Hurricane Sandy

Siemens Healthineers collaborates with Houston Methodist Hospital Will provide advanced angio, MR, CT, molecular imaging and ultrasound technology

Health care C-suite’s guide to artificial intelligence Questions and costs associated with disruptive new technology

Lakeland Health installs the Philips IntelliVue Guardian Solution in three hospitals Cardiac and respiratory arrests cut by 56 percent

Glencoe Software releases 2.0 version of PathViewer Digital Pathology Solution Can assess multiplexed whole slide images with 40 or more biomarkers.

Exa PACS/RIS drive productivity and readership volume rates Network Radiology reports success with Konica Minolta solution

Fujifilm introduces new version of its Synapse PACS Available as a software upgrade

Accuray's iDMS cleared by FDA for use with TomoTherapy Centralized Data Management System platform for workflow efficiency

'Ransomware' attack hit U.S. medical devices, too

by Thomas Dworetzky , Contributing Reporter
Another shoe appeared to have dropped in the possibly-North-Korean-tied WannaCry ransomware attack: beyond PCs, it looks like actual medical devices may have been infected, as well.

A report in Forbes magazine has revealed “an image of an infected Bayer Medrad device in a U.S. hospital.”

Story Continues Below Advertisement

Streamline Your Radiology Workflow with RamSoft's PowerServer RIS/PACS

The PowerServer RIS/PACS is a single database application, essential to reducing redundant work, limiting manual data entry, and increasing consistency throughout healthcare practices. Click to learn how it will help you improve patient care and more.



The unnamed source who had sent the image to the magazine didn't identify either the institution or the model of the Bayer machine. But, according to the magazine, it looked to be a Bayer power injector.

Bayer confirmed to the publication that two reports from U.S. customers had come in concerning devices infected with ransomware. “Operations at both sites were restored within 24 hours," the spokesperson said. "If a hospital's network is compromised, this may affect Bayer's Windows-based devices connected to that network."

The company advised customers to work with Bayer's Technical Assistance Center "to ensure continued support of contrast-enhanced radiology procedures which use Bayer power injectors."

The good news, according to Beau Woods, deputy director of Cyber Statecraft Initiative at the Atlantic Council, is that although the hacking might disable the machines, it was unlikely that patients would be put at risk. "I seriously doubt Windows is controlling any of the safety functions," he told Forbes.

He also noted on Twitter that when such infections cause medical device outages, this leads to a rise in resource needs, delays in care, and leads to more clinical mistakes. “The harm can go unseen unless you look for it," he tweeted.

The Bayer devices are the first reported cases of medical device operation impacted by ransomware, according to Forbes.

As the hacking code is further investigated by cybersecurity experts, the thinking now is that there was North Korean involvement in the attack.

As reported last week when the attack broke, the tools were first leaked by a group known as the Shadow Brokers.

Since then there has been discovery, by BAE Systems,of "multiple overlaps between the WannaCry malware and that controlled by the Lazarus Group, which the firm associated with North Korean activity,” said the magazine.

Warnings from health care firms have come out in recent days, urging clients to be on alert – and to announce that they are working on ways to protect against infection.

Another possible victim of the attack is Siemens Healthineers, although the company would not “confirm or deny reports” to Forbes.
  Pages: 1 - 2 >>

Health IT Homepage


You Must Be Logged In To Post A Comment

Advertise
Increase Your
Brand Awareness
Auctions + Private Sales
Get The
Best Price
Buy Equipment/Parts
Find The
Lowest Price
Daily News
Read The
Latest News
Directory
Browse All
DOTmed Users
Ethics on DOTmed
View Our
Ethics Program
Gold Parts Vendor Program
Receive PH
Requests
Gold Service Dealer Program
Receive RFP/PS
Requests
Healthcare Providers
See all
HCP Tools
Jobs/Training
Find/Fill
A Job
Parts Hunter +EasyPay
Get Parts
Quotes
Recently Certified
View Recently
Certified Users
Recently Rated
View Recently
Certified Users
Rental Central
Rent Equipment
For Less
Sell Equipment/Parts
Get The
Most Money
Service Technicians Forum
Find Help
And Advice
Simple RFP
Get Equipment
Quotes
Virtual Trade Show
Find Service
For Equipment
Access and use of this site is subject to the terms and conditions of our LEGAL NOTICE & PRIVACY NOTICE
Property of and Proprietary to DOTmed.com, Inc. Copyright ©2001-2017 DOTmed.com, Inc.
ALL RIGHTS RESERVED