Connect with us

Hi, what are you looking for?

HEADLINES

Kaspersky Lab helps to secure bionic technologies for people with disabilities

Kaspersky Lab experts investigating the experimental cloud infrastructure for advanced bionic prostheses have identified several previously unknown security issues that could enable a third party to access, manipulate, steal or even delete the private data and more of device users.

Kaspersky Lab experts investigating the experimental cloud infrastructure for advanced bionic prostheses have identified several previously unknown security issues that could enable a third party to access, manipulate, steal or even delete the private data and more of device users.

The findings were shared with the manufacturer Motorica, a Russian high-technology start-up that develops bionic upper limb prostheses to assist people with disabilities, enabling them to address the security issues.

The Internet of Things is no longer just about connected smart watches or smart homes, but about advanced, complex, increasingly automated ecosystems. These include connected healthcare cyber technologies. In the future, such technologies could shift away from being purely support devices to becoming mainstream and used by consumers keen to extend the capabilities of the ordinary human body through a process of cybernetization. It is therefore important that any security risks that could potentially be exploited by attackers are minimized by investigating and addressing security issues in current products and their supporting infrastructure.

Kaspersky Lab ICS CERT researchers, in partnership with Motorica, have undertaken a cybersecurity assessment of a test software solution for a digital prosthetic hand developed by the Russian start-up. The solution itself is a remote cloud system, an interface for monitoring the status of all registered biomechanical devices. It also gives other developers an existing toolset for analysis of the technical condition of devices like smart wheelchairs, artificial hands and feet.

Advertisement. Scroll to continue reading.

The initial research identified several security issues. These include insecure http connection, incorrect account operations and insufficient input validation. When in use, the prosthetic hand transmits data to the cloud system. Due to the security gaps, an attacker could:

  • Gain access to information held in the cloud about all the connected accounts (including logins and passwords in plaintext for all the prosthetic devices and their administrators)
  • Manipulate, add or delete such information
  • Add or delete their own regular and privileged users (with administrator rights)

“Motorica is a high-technology, trusted and socially responsible company, focused on addressing the challenges faced by people with physical impairment. As the company prepares for growth, we wanted to help it ensure the right security measures were in place. The results of our analysis are a good reminder that security needs to be built in to new technologies from the very start. We hope that other developers of advanced connected devices will want to collaborate with the security industry to understand and address device and system security issues and treat the security of devices as an integral and essential part of development,” said Vladimir Dashchenko, Security Researcher at Kaspersky Lab ICS CERT.

“New technologies are bringing us to a new world in terms of bionic assisting devices. It is now of crucial importance for the developers of such technologies to collaborate with cyber security solution vendors. That will allow us to make even theoretical cases of attacks on the human body impossible,” noted Ilya Chekh, CEO at Motorica.

To keep the devices safe, we advise that companies:

  • Check out threat models and vulnerability classifications for the relevant web-based and IoT technologies, provided by industry experts, such as OWASP IoT Project.
  • Introduce secure software development practices based on the proper lifecycle. To evaluate existing software security practices use a systematic approach — for example, OWASP OpenSAMM.
  • Establish a procedure for obtaining information on relevant threats and vulnerabilities to ensure proper and timely response to any incidents.
  • Regularly update operating systems, application and device software and security solutions.
  • Implement cybersecurity solutions designed to analyze network traffic, detect and prevent network attacks – at the boundary of the enterprise network and at the boundary of the OT network.
  • Use a protection solution with machine learning anomaly detection (MLAD) technology to reveal deviations in IoT devices’ behavior — for early detection of attack, failure or damage of the device.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

The exploit, discovered by Kaspersky’s Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical...

HEADLINES

At the end of 2023, Sophos X-Ops noted a significant increase in ‘remote encryption’ attacks – where ransomware attackers breach a compromised and often...

HEADLINES

With the launch of KATA 7.0, organizations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats...

HEADLINES

In 2024, Globe blocked 3,096 child pornography domains or those containing child sexual abuse and exploitation materials (CSAEM), a slight increase from 3,047 domains restricted...

HEADLINES

During a recent webinar on Building Resilience Against Online Scams, hosted by fiber broadband and technology provider Converge ICT Solutions Inc., its Chief Executive...

HEADLINES

In 2024, Kaspersky restructured its Partner Program into four key partner types, recognizing the diverse profiles within its network – from traditional resellers and...

White Papers

The study tested 2,000 UK and US consumers, exposing them to a series of real and deepfake content. The results are alarming: only 0.1%...

HEADLINES

Deepfakes pose significant threats and risks, with nearly half of companies worldwide reporting incidents in 2024, according to industry reports. HONOR’s innovative solution immediately...

Advertisement