Malware in the Machines: Cybersecurity for Medical Devices and Hospital Networks

by Snell & Wilmer

Within the last week the Food and Drug Administration (FDA) issued a pair of Safety Communications directed towards the medical device and healthcare industries regarding cybersecurity. Computer virus and other malware attacks against medical devices and hospital networks create risks of equipment performance degradation and possible failure, which could compromise patient care. While the FDA has reported no deaths or injuries thus far due to such incidents, it considers cybersecurity breaches to be “increasingly likely” and warranting pro-active counter-measures. 

The FDA cautioned in its June 13 and 17 Safety Communications, “many medical devices contain configurable embedded computer systems that can be vulnerable to cybersecurity breaches. In addition, as medical devices are increasingly interconnected, via the Internet, hospital networks, other medical devices, and smartphones, there is an increased risk of cybersecurity breaches, which could affect how a medical device operates.” Cyberattacks causing data breach incidents involving confidential patient information have also been reported.

Concerns about medical device cybersecurity vulnerabilities are not just theoretical. In 2010, a Veterans Affairs (VA) official reported to Congress that over 122 medical devices at VA facilities had been found to be compromised by malware over the prior 14 months. Recent media accounts reports indicate that since 2009, malware had infected more than 325 devices at VA hospitals, including X-ray machines, computers used with cardiac catheterization devices, a mammography viewing machine and a gamma camera for nuclear medicine studies. In another instance, a virus reportedly caused a medical device to potentially expose sensitive patient information by sending it to outside servers, thus resulting in a data breach.

In its recent Safety Communications, the FDA now recommends that healthcare facilities and medical device manufacturers implement appropriate safeguards against malware intrusions and develop plans to mitigate the effects of such incidents.

Concerning healthcare facilities, the FDA listed several cybersecurity vulnerabilities that can impact medical devices or hospital network operations, including:

  • Network-connected/configured medical devices infected or disabled by malware;
  • The presence of malware on hospital computers, smartphone and tablets, targeting mobile devices using wireless technology to access patient data, monitoring systems and implanted patient devices;
  • Uncontrolled distribution of passwords, disabled passwords, hard-coded passwords for software intended for privileged device access (for administrative, technical or maintenance personnel);
  • Failure to provide timely security software updates and patches to medical devices and networks, particularly in in older medical device models (legacy devices); and
  • Security vulnerabilities in off-the-shelf software designed to prevent unauthorized device or network access.

In addressing these concerns, the FDA issued several recommendations for healthcare facilities:

  • Restrict unauthorized access to the network and networked medical devices;
  • Keep antivirus software and firewalls up-to-date;
  • Monitor network activity for unauthorized use;
  • Protect individual network components through routine and periodic evaluation, including updating security patches and disabling all unnecessary ports and services;
  • Contact the medical device manufacturer if the facility thinks it may have a cybersecurity problem related to a medical device; and
  • Develop and evaluate strategies to maintain critical functionality during adverse conditions.

Cybersecurity vulnerabilities may also extend to physicians, medical groups and even insurance carriers/claims administrators if they are connected to the facility’s computer networks, absent appropriate firewalls, antivirus protection and other security counter-measures.

With regard to medical device manufacturers, the FDA noted:

  • Manufacturers are responsible for putting appropriate mitigations in place to address patient safety and assure proper device performance;
  • Manufacturers are expected to take appropriate steps to limit opportunities for unauthorized access or modifications to medical devices (or compromise the security of the hospital network that may be connected to the device), specifically including a review of their cybersecurity practices and policies to assure appropriate safeguards are in place;
  • Manufacturers should use design approaches that maintain the device’s critical functionality, even when security has been compromised, known as “fail-safe modes”; and
  • The extent to which security controls are needed will depend on the medical device, its environment of use, the type and probability of the risks to which it is exposed and the probable risks to patients from a security breach.

“Appropriate mitigations” include user authentication methods (user ID and password, smartcard or biometric), strengthening password protection by avoiding hard-coded passwords and limiting public access to passwords for technical device access, physical locks, card readers and guards. 

The FDA specifically encouraged manufacturers to timely deploy routine, validated security patches for medical device software or firmware and to implement methods to restrict device software or firmware updates to genuinely authenticated code. In that regard, the FDA noted that it “typically does not need to review or approve medical device software changes made solely to strengthen cybersecurity.” This pronouncement is apparently in response to a concern voiced by some manufacturers, that FDA regulations limit the changes that can be made to a device’s software.

In addition, on June 14, 2013 the FDA issued draft guidance on how manufacturers should address cybersecurity in their pre-market submissions. Previously in 2005, the FDA had issued guidance on how manufacturers should address cybersecurity issues related to products that use off-the-shelf software. 

Given the continued push towards electronic medical records and an increasingly-connected web of high-tech medical devices linked to hospital networks and the Internet, issues regarding medical device and hospital network cybersecurity are here to stay. Further guidance and other potential action from the FDA can be expected.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Snell & Wilmer | Attorney Advertising

Written by:

Snell & Wilmer

Snell & Wilmer on:

Readers' Choice 2017
Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
Privacy Policy (Updated: October 8, 2015):

JD Supra provides users with access to its legal industry publishing services (the "Service") through its website (the "Website") as well as through other sources. Our policies with regard to data collection and use of personal information of users of the Service, regardless of the manner in which users access the Service, and visitors to the Website are set forth in this statement ("Policy"). By using the Service, you signify your acceptance of this Policy.

Information Collection and Use by JD Supra

JD Supra collects users' names, companies, titles, e-mail address and industry. JD Supra also tracks the pages that users visit, logs IP addresses and aggregates non-personally identifiable user data and browser type. This data is gathered using cookies and other technologies.

The information and data collected is used to authenticate users and to send notifications relating to the Service, including email alerts to which users have subscribed; to manage the Service and Website, to improve the Service and to customize the user's experience. This information is also provided to the authors of the content to give them insight into their readership and help them to improve their content, so that it is most useful for our users.

JD Supra does not sell, rent or otherwise provide your details to third parties, other than to the authors of the content on JD Supra.

If you prefer not to enable cookies, you may change your browser settings to disable cookies; however, please note that rejecting cookies while visiting the Website may result in certain parts of the Website not operating correctly or as efficiently as if cookies were allowed.

Email Choice/Opt-out

Users who opt in to receive emails may choose to no longer receive e-mail updates and newsletters by selecting the "opt-out of future email" option in the email they receive from JD Supra or in their JD Supra account management screen.


JD Supra takes reasonable precautions to insure that user information is kept private. We restrict access to user information to those individuals who reasonably need access to perform their job functions, such as our third party email service, customer service personnel and technical staff. However, please note that no method of transmitting or storing data is completely secure and we cannot guarantee the security of user information. Unauthorized entry or use, hardware or software failure, and other factors may compromise the security of user information at any time.

If you have reason to believe that your interaction with us is no longer secure, you must immediately notify us of the problem by contacting us at In the unlikely event that we believe that the security of your user information in our possession or control may have been compromised, we may seek to notify you of that development and, if so, will endeavor to do so as promptly as practicable under the circumstances.

Sharing and Disclosure of Information JD Supra Collects

Except as otherwise described in this privacy statement, JD Supra will not disclose personal information to any third party unless we believe that disclosure is necessary to: (1) comply with applicable laws; (2) respond to governmental inquiries or requests; (3) comply with valid legal process; (4) protect the rights, privacy, safety or property of JD Supra, users of the Service, Website visitors or the public; (5) permit us to pursue available remedies or limit the damages that we may sustain; and (6) enforce our Terms & Conditions of Use.

In the event there is a change in the corporate structure of JD Supra such as, but not limited to, merger, consolidation, sale, liquidation or transfer of substantial assets, JD Supra may, in its sole discretion, transfer, sell or assign information collected on and through the Service to one or more affiliated or unaffiliated third parties.

Links to Other Websites

This Website and the Service may contain links to other websites. The operator of such other websites may collect information about you, including through cookies or other technologies. If you are using the Service through the Website and link to another site, you will leave the Website and this Policy will not apply to your use of and activity on those other sites. We encourage you to read the legal notices posted on those sites, including their privacy policies. We shall have no responsibility or liability for your visitation to, and the data collection and use practices of, such other sites. This Policy applies solely to the information collected in connection with your use of this Website and does not apply to any practices conducted offline or in connection with any other websites.

Changes in Our Privacy Policy

We reserve the right to change this Policy at any time. Please refer to the date at the top of this page to determine when this Policy was last revised. Any changes to our privacy policy will become effective upon posting of the revised policy on the Website. By continuing to use the Service or Website following such changes, you will be deemed to have agreed to such changes. If you do not agree with the terms of this Policy, as it may be amended from time to time, in whole or part, please do not continue using the Service or the Website.

Contacting JD Supra

If you have any questions about this privacy statement, the practices of this site, your dealings with this Web site, or if you would like to change any of the information you have provided to us, please contact us at:

- hide
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.