• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechConnect and Protect

83% of Internet-connected medical imaging machines in the U.S. are ripe for hacking, report says

By
Alyssa Newcomb
Alyssa Newcomb
Down Arrow Button Icon
By
Alyssa Newcomb
Alyssa Newcomb
Down Arrow Button Icon
March 13, 2020, 7:00 AM ET

The vast majority of medical imaging equipment in the U.S. is leaving patient data vulnerable and hospitals open to attacks that could disrupt care, a new study says.

As many as 83% of Internet-connected medical imaging devices—from mammography machines to MRI machines—are vulnerable, according to the 2020 IoT Threat Report from Palo Alto Networks’ Unit 42 threat security team. That’s up from 56% in 2018.

May Wang, senior distinguished engineer at Palo Alto Networks, attributes the uptick from 2018 to 2020 to Microsoft dropping support for Windows 7. While medical devices have a long life cycle, if they aren’t diligently updated with the latest version of its operating system, or are running an unsupported operating system, then hackers can exploit vulnerabilities to steal data, infiltrate a hospital network, and disrupt care.

“It’s like having a permanently broken window on the side of your house—you never know when someone might slip in,” Wang tells Fortune.

Once an attacker successfully gets in through that window, it becomes very likely they can gain access to the hospital’s broader network to steal or erase critical data. And that’s when the chaos starts to happen.

How 12-year-old malware disrupted a hospital

Hospitals typically lag behind other industries when it comes to cyber security, Wang says, which makes them especially vulnerable to a variety of attacks. For instance, the report details how a 12-year-old piece of malware, called Conficker, is making a comeback.

An unnamed hospital mentioned in the report experienced unusual traffic over one of its mammography imaging machines. Over the course of a few days, the IT team determined that the Conficker worm had infected other medical devices on the hospital’s network, including another mammography machine, a radiology machine, a digital imaging device, and others.

Conficker was first detected in 2008 when it exploited vulnerablities in Windows XP and older Microsoft operating systems. The worm would infect devices and add them to a botnet that would continue looking for devices to infect. By 2009, the worm had infected an estimated 15 million PCs, hitting hospitals, governments, and corporations.

In 2015, it was estimated there were 400,000 machines infected by the Conficker worm. The 2020 report says that number is now likely half a million.

“Conficker was designed with multiple spreading mechanisms built into it and it didn’t rely on users to do anything to enable it to spread—it was completely self-sufficient,” says Wang. “For example, it has a peer-to-peer functionality that allows infected computers to continue communicating with each other without the need for a central server to give it orders, enabling it to keep spreading.”

In the case of the hospital, rebooting the devices didn’t work, since it didn’t address the unpatched holes that enabled the Conficker infection. The hospital was instead forced to take its devices offline, install vital security patches, and tediously bring them back online one at a time.

The total downtime was one week before all the devices were back online and running without interruptions, according to the report.

Why hackers target hospitals

The Palo Alto Networks report also cautions about newer attacks that are targeting lucrative personal data.

“Hospitals and healthcare providers house highly confidential and sensitive personal information that is specifically appealing to malicious actors,” Matthew Gardiner, director of enterprise security at Mimecast, a data security company, tells Fortune. “It’s essentially a treasure trove of information that can either be directly monetized or used in identity theft or other later stage attacks.”

Hackers are looking to get in any way they can, and in the medical community, there are plenty of open windows.

Ninety percent of health care organizations were hit with email-borne attacks last year, according to research released on Tuesday by Mimecast. Of those, one in four said the attacks were extremely disruptive.

In one case, a medical office was even forced to shut down after a cyber attack. Last September, Wood Ranch Medical in Simi Valley, California was hit with ransomware.

“Unfortunately, the damage to our computer system was such that we are unable to recover the data stored there and, with our backup system encrypted as well, we cannot rebuild our medical records,” reads a message to its patients. “We will be closing our practice and ceasing operations on December 17, 2019.”

For cash-strapped hospitals, it can be a choice between buying a new imaging machine, or investing to upgrade the hospital firewall to help mitigate these types of attacks.

Attackers know hospitals are slow to upgrade and exploit them, often for profit, Wang says. “Having a system go down in an enterprise means loss of money, but downtime for a hospital can mean loss of life,” she adds. “Healthcare resorts to paying a ransomware more often than not, so they can regain control over systems and data.”

Taking preventative measures

There are some steps hospitals can take now to help help mitigate the threat.

Wang recommends organizations regularly scan their networks to see which IoT devices are connected. Anything that doesn’t belong on the network or isn’t being used should be disconnected. Other devices should be regularly updated to ensure any holes are patched. Finally, IoT medical devices should be separated from the regular network.

“As our report showed, 72% of the time, IoT medical devices are not separated from the regular network,” Wang says. “This means Infiltrating an IoT medical device means in addition to patient data being potentially stolen from the medical device its self, an attack could also potentially infiltrate the hospital’s broader network and access far more patient data.”

In other words: Quarantining IoT devices from the main network is the best way to stay safe.

More must-read stories from Fortune:

—Why investors suddenly turned on pot stocks
—How the trouble-ridden debut of a breakthrough vaccine sparked a panic
—This yachting adventure might be the world’s most exclusive escape
—The man behind some of Napa Valley’s most acclaimed wineries
—WATCH: Best earbuds in 2020: Apple AirPods Pro Vs. Sony WF-1000XM3
Subscribe to Fortune’s Outbreak newsletter for a daily roundup of stories on the coronavirus outbreak and its impact on global business.

About the Author
By Alyssa Newcomb
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • World's Most Admired Companies
  • See All Rankings
  • Lists Calendar
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

UFO files show Buzz Aldrin saw a ‘sizeable’ object close to the moon and a ‘fairly bright light source’ that the Apollo 11 crew felt could be a laser
Innovationspace
UFO files show Buzz Aldrin saw a ‘sizeable’ object close to the moon and a ‘fairly bright light source’ that the Apollo 11 crew felt could be a laser
By Seung Min Kim, Collin Binkley and The Associated PressMay 9, 2026
5 hours ago
joaquin
Commentary250 Years of Innovation
Johnson & Johnson CEO: America’s innovation advantage starts with health 
By Joaquin DuatoMay 9, 2026
8 hours ago
Qualcomm’s CEO is working with ‘pretty much all’ major AI players on top-secret devices—and powering OpenAI’s first push into hardware
AIQualcomm
Qualcomm’s CEO is working with ‘pretty much all’ major AI players on top-secret devices—and powering OpenAI’s first push into hardware
By Eva RoytburgMay 9, 2026
9 hours ago
reed
CommentaryRetirement
Tim Cook and Reed Hastings just showed every CEO how to leave gracefully
By Paul HardartMay 9, 2026
10 hours ago
Companies are abandoning ‘peanut butter’ raises as pay-for-performance takes over the workplace in the AI era
Future of WorkTech
Companies are abandoning ‘peanut butter’ raises as pay-for-performance takes over the workplace in the AI era
By Marco Quiroz-GutierrezMay 9, 2026
12 hours ago
Goldman Sachs’ tech boss says tracking individual AI usage isn’t useful. He just watches how fast his 12,000 engineers move from idea to production
AIBanks
Goldman Sachs’ tech boss says tracking individual AI usage isn’t useful. He just watches how fast his 12,000 engineers move from idea to production
By Marco Quiroz-GutierrezMay 8, 2026
1 day ago

Most Popular

California farmers must destroy 420,000 peach trees after Del Monte closes its canneries and cancels more than $550 million in long-term contracts
North America
California farmers must destroy 420,000 peach trees after Del Monte closes its canneries and cancels more than $550 million in long-term contracts
By Sasha RogelbergMay 7, 2026
2 days ago
A Michigan farm town voted down plans for a giant OpenAI-Oracle data center. Weeks later, construction began
Magazine
A Michigan farm town voted down plans for a giant OpenAI-Oracle data center. Weeks later, construction began
By Sharon GoldmanMay 6, 2026
4 days ago
'Blue dot fever' plagues musicians like Post Malone, Meghan Trainor, and Zayn as a growing list of artists cancel tours due to lagging ticket sales
Arts & Entertainment
'Blue dot fever' plagues musicians like Post Malone, Meghan Trainor, and Zayn as a growing list of artists cancel tours due to lagging ticket sales
By Dave Lozo and Morning BrewMay 7, 2026
2 days ago
Current price of oil as of May 8, 2026
Personal Finance
Current price of oil as of May 8, 2026
By Joseph HostetlerMay 8, 2026
1 day ago
The CEO of Maersk, which ships 14% of everything you buy, said the Iran war is adding $500 million in monthly costs it's trying not to pass down
Energy
The CEO of Maersk, which ships 14% of everything you buy, said the Iran war is adding $500 million in monthly costs it's trying not to pass down
By Sasha RogelbergMay 8, 2026
1 day ago
You're probably safe from the Hantavirus outbreak, but here's what you absolutely must not do, experts say
Politics
You're probably safe from the Hantavirus outbreak, but here's what you absolutely must not do, experts say
By Catherina GioinoMay 8, 2026
22 hours ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.