Connect with us

Hi, what are you looking for?

HEADLINES

33 Vulnerabilities found in data transfer protocol for wearable 

Kaspersky researchers found vulnerabilities not only in the MQTT protocol but also in one of the most popular platforms for wearable devices: the Qualcomm Snapdragon Wearable platform. There have been more than 400 vulnerabilities found since the platform was launched; not all have been patched, including some from 2020. 

Kaspersky experts have discovered that the most commonly used protocol for transferring data from wearable devices used for remote patient monitoring contained 33 vulnerabilities, including 19 “critical vulnerabilities” in 2021 alone. This is 10 more critical vulnerabilities than in 2020, and many of them remain unpatched. Some of these vulnerabilities give attackers the potential to intercept data being sent online from the device.

The ongoing pandemic has led to a rapid digitalization of the healthcare sector. With hospitals and healthcare staff overwhelmed, and many people quarantined at home, organizations have been forced to rethink how patient care is delivered. In fact, recent Kaspersky research found that 91% of global healthcare providers have implemented telehealth capabilities. However, this rapid digitalization has created new security risks, especially when it comes to patient data.

Part of telehealth includes remote patient monitoring, which is done using so-called wearable devices and monitors. These include gadgets that can continuously or at intervals track a patient’s health indicators, such as cardiac activity.

The MQTT protocol is the most common protocol for transmitting data from wearable devices and sensors because it’s easy and convenient. That’s why it can be found not only in wearable devices, but also in almost any smart gadget. Unfortunately, when using MQTT, authentication is completely optional and rarely includes encryption. This makes MQTT highly susceptible to Man in the Middle Attacks (when attackers can place themselves between “two parties” while they communicate), meaning any data transferred over the internet could potentially be stolen. When it comes to wearable devices, that information could include highly sensitive medical data, personal information, and even a person’s movements. 

Advertisement. Scroll to continue reading.

Since 2014, 90 vulnerabilities in MQTT have been discovered, including critical, many of which remain unpatched to this day. In 2021, there were 33 newly discovered vulnerabilities, including 18 critical ones—10 more than in 2020. All of these vulnerabilities put patients at risk of having their data stolen.

Number of vulnerabilities found in the MQTT protocol, 2014-2021

Kaspersky researchers found vulnerabilities not only in the MQTT protocol but also in one of the most popular platforms for wearable devices: the Qualcomm Snapdragon Wearable platform. There have been more than 400 vulnerabilities found since the platform was launched; not all have been patched, including some from 2020. 

It’s worth noting that most wearable devices track both your health data and your location and movements. This opens up the possibility of not just stealing data but also potentially stalking. 

 “The pandemic has led to a sharp growth in the telehealth market, and this doesn’t just involve communicating with your doctor via video software. We’re talking about a whole range of complex, rapidly evolving technologies and products, including specialized applications, wearable devices, implantable sensors, and cloud-based databases. However, many hospitals are still using untested third-party services to store patient data, and vulnerabilities in healthcare wearable devices and sensors remain open. Before implementing such devices, learn as much as you can about their level of security to keep the data of your company and your patients safe,” comments Maria Namestnikova, Head of the Russian Global Research and Analysis Team (GReAT) at Kaspersky.

To keep patient data safe, Kaspersky recommends that healthcare providers:

Advertisement. Scroll to continue reading.
  • Check the security of the application or device suggested by the hospital or medical organization 
  • Minimize the data transferred by telehealth apps if possible (e.g. don’t let the device send the location data if it’s not needed)
  • Change passwords from default ones and use encryption if the device offers this 

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

The attackers used a series of campaigns with novel exploits and customized malware to embed tools to conduct surveillance, sabotage and cyberespionage as well...

HEADLINES

Financial phishing attacks are rapidly increasing in the country as cybercriminals continuously evolve and adapt their tactics, making them sophisticated. The number of attacks...

HEADLINES

A Scale of Harm study by the International Justice Mission revealed that almost half a million Filipino children were trafficked to produce new child...

HEADLINES

Yondu launched an extensive, month-long cybersecurity awareness campaign focused on modern threat detection, incident response, and social engineering defense.

ELECTRONICS

Philips EasyKey partnered with Megaworld and equipped their world-class properties with only the best-in-class smart locks we have on offer, the Philips EasyKey 9300.

HEADLINES

The PLDT wireless unit is also calling on customers to report these messages to Smart’s HULISCAM portal for further action.

HEADLINES

Here are some tips from Sophos for staying secure online during the cybersecurity awareness month.

HEADLINES

While only 21% of hackers believed that AI technologies enhance the value of hacking in 2023, 71% reported it to have value in 2024....

Advertisement