Jump to content

Anyone Can Look at Millions of Americans' Medical Images and Data, Report Finds


steven36

Recommended Posts

It turns out that anyone with basic computing skills and an internet connection can access millions of private medical images and data—such as MRIs, X-rays, and CT scans—as well as a buffet of valuable private info, according to a disturbing report from ProPublica.

 

121422152_2217.jpg

 

The gist is that as the medical community moved from analog to digital methods of sharing test results, security practices lagged behind. Unlike data breaches in other industries, where hackers make use of flaws in a company’s security practices, many digital medical records systems don’t even require passwords. What that means is you don’t even need fancy hacker software to peep at millions of medical test results. All you need is to know where to look, and an internet browser.

 

In its investigation, ProPublica worked with German security firm Greenbone Networks, and journalists from German broadcaster Bayerischer Rundfunk. It ultimately identified 187 servers in the U.S. that lacked passwords or basic security precautions. In total, the data from more than 16 million medical scans worldwide are available online. What’s worse is that on top of private medical images, the scans include sensitive information such as names, birthdates, and in some cases, Social Security numbers.

 

One issue is it’s unclear who exactly is at fault, and many of the parties involved seem to think securing data is someone else’s responsibility. The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996 to “assure that individuals’ health information is properly protected while allowing the flow of health information needed to provide and promote high quality health care.” Among its provisions is a requirement that standards be publicized for the “electronic exchange, privacy and security of health information.”

 

That would appear to put the onus on health care providers and the services they use. However, the report found companies creating medical imaging software and medical device makers assumed their customers—health providers—would be in charge of securing data. At the same time, while large hospital chains and academic medical centers did, in fact, implement security standards, ProPublica discovered this was not the case for many independent radiologists, medical imaging centers, or archiving services. It contacted the Medical Imaging & Technology Alliance, a group which oversees the DICOM communication standard used by medical imaging devices, but the group pointed the finger at those in charge of maintaining servers where data is stored. Likewise, the report found the government doesn’t do a great job in punishing companies for patient privacy breaches, citing that in April, the U.S. Department of Health and Human Services lowered the maximum fine from $1.5 million to $250,000 for “corrected willful neglect.”

 

Some of the health care providers ProPublica reached out to have since beefed up their security. Thankfully, the report found no instances of malicious actors accessing these vulnerable medical images and publishing them elsewhere. That said, the potential for abuse is terrifying. Usually, data breaches deal with identifying information such as emails, passwords, and phone numbers. That’s terrible, but leaked medical data also has the potential of publicizing the private details of a person’s health. Such information could be easily used to embarrass, blackmail, or encourage discrimination. Unfortunately, this isn’t even the first reported instance of widespread carelessness with regard to medical records. In April, the medical files of 145,000 rehab patients were leaked online, unnecessarily putting people who sought help at risk of social stigma. Likewise, in 2017, tens of thousands of medical records belonging to patients at Bronx-Lebanon Hospital Center in New York were stored on insecure servers run by a third-party IT service.

 

At the moment there’s not much an individual can do, as fixing the problem requires a concerted effort from medical manufacturers, providers, the government, and standards makers. If you’re concerned, you can, as ProPublica recommends, ask your health care provider if accessing your results requires a login and password. You can also ask your doctor if their office or their medical imaging provider regularly conducts HIPAA security assessments—though the chances of a doctor or receptionist knowing that off the top of their head seems slim at best. In any case, it can’t hurt to ask about your provider’s privacy practices the next time you go in for a test.

 

Source

Link to comment
Share on other sites


  • Replies 3
  • Views 443
  • Created
  • Last Reply

What would I do with someone else's MRI result?

What should a Hacker suppose to do with an MRI image?

Link to comment
Share on other sites


Its not just MRIs but there could also be more info like name, phone numbers, emails etc.

But even MRIs ending up with wrong people could be devastating.

Link to comment
Share on other sites


  • 2 weeks later...

@mclaren85 You don't understand. The information in the hands of bitcoin-paid assasins, foreign agents could potentially create havoc not only threatening the critical infrastructure but research and security of the state.

For information is all that an adversary - a killer, foreign agent or profiteer - ever needs!

Link to comment
Share on other sites


Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...