Health systems exposed to risks

Vulnerable to Internet hacking

WASHINGTON — As the health care industry rushed onto the Internet in search of efficiencies and improved care in recent years, it has exposed a wide array of vulnerable hospital computers and medical devices to hacking, according to documents and interviews.

Security researchers warn that intruders could exploit known gaps to steal patients’ records for use in identity-theft schemes and even launch attacks that could shut down critical hospital systems.

A yearlong examination of cybersecurity by the Washington Post has found that health care is among the most vulnerable industries in the country, in part because it lags behind in addressing known problems.


‘‘I have never seen an industry with more gaping security holes,’’ said Avi Rubin, a computer scientist and technical director of the Information Security Institute at Johns Hopkins University. ‘‘If our financial industry regarded security the way the health care sector does, I would stuff my cash in a mattress under my bed.’’

Get Ground Game in your inbox:
Daily updates and analysis on national politics from James Pindell.
Thank you for signing up! Sign up for more newsletters here

Compared with financial, corporate, and military networks, relatively few hacks have been directed at hospitals and other medical facilities. But in recent months, officials with the Department of Homeland Security have expressed fear that health care presents an inviting target to activist hackers, cyberwarriors, criminals, and terrorists.

‘‘These vulnerabilities may result in possible risks to patient safety and theft or loss of medical information,’’ a DHS intelligence bulletin said in May.

Security researchers are starting to turn up the same kinds of trivial-seeming flaws that earlier opened the way for hackers to penetrate financial services networks, Pentagon systems, and computers at firms such as Google.

Rubin has documented the routine failure to fix known software flaws in aging technology and a culture in which physicians, nurses, and other health care workers sidestep basic security measures, such as passwords, in favor of convenience.


Another researcher found that a system used to operate an electronic medicine cabinet for hospital prescriptions in Oklahoma could be easily taken over by unauthorized users because of weaknesses in the software interface.

OpenEMR, an open-source electronic medical records management system that is about to be adopted worldwide by the Peace Corps, has scores of security flaws that make it easy prey for hackers.

The University of Chicago medical center operated an unsecure Dropbox site for new residents managing patient care through their iPads, using a single user name and password published in a manual online.

After a Post reporter called about the vulnerabilities, officials at the cabinet manufacturer and the medical center took steps to close the gaps. The Peace Corps said it was considering changes.

Government oversight and industry practices have not kept pace with the changing technology. The Food and Drug Administration, which is responsible for overseeing medical devices, most recently published guidance on cybersecurity in 2005.


The agency has urged hospitals to allow vendors to guide them on security of sophisticated devices.

But the vendors sometimes tell hospitals that they cannot update FDA-approved systems, leaving those systems open to potential attacks by computer hackers.