January 16, 2025
Recent reports have revealed alarming cybersecurity vulnerabilities within U.S. telecommunications networks, with Chinese state-sponsored actors exploiting weaknesses to gain access to sensitive communications infrastructure. These revelations underscore an unsettling reality: while many medical devices operate within local hospital networks, a growing subset relies on direct or indirect connections to public LTE/5G networks for remote maintenance, to support specific clinical functions, or in evolving home care delivery models.
Although most devices are designed to operate independently or via local Wi-Fi and Bluetooth even when public network connections are disrupted, the increasing reliance on mobile connectivity introduces new risks. According to the FDA, the agency regulates more than 190,000 distinct medical devices across a wide range of categories. With advances in 5G, edge computing, and other innovations, the number of connected medical devices is projected to skyrocket to nearly 50 billion by 2030, exponentially increasing the healthcare sector’s attack surface.
A recent FBI and CISA investigation revealed that Salt Typhoon, a Chinese-linked cyber espionage group, continues to compromise U.S. telecom networks months after initial intrusions were discovered. These bad actors are exploiting known infrastructure vulnerabilities to access sensitive information, such as call records and text messages, with a particular focus on high-profile targets in the Washington, D.C. area.
The implications for the healthcare industry are significant. While the majority of many connected medical devices operate within local hospital networks and do not rely on telecommunication networks, a subset of devices uses these networks for specific functions such as remote monitoring or maintenance. For these devices, a successful compromise of telco networks could lead to breaches of confidentiality, potentially exposing sensitive patient data. However, most devices are designed to continue functioning safely via local connectivity or standalone modes, reducing likelihood of direct impacts to patient safety.
The Federal Communications Commission (FCC) recently proposed new measures in response to Salt Typhoon’s revelations. These measures include requirements for telecommunications carriers to submit annual cybersecurity certifications and implement robust risk management plans. The FCC’s focus on securing infrastructure, such as public 5G networks, submarine cables, and emergency alert systems, highlights the need for a similar coordinated effort in other critical infrastructure industries, such as the healthcare sector. However, healthcare’s unique infrastructure and industry composition require tailored actions to address its specific weaknesses and risks effectively.
FCC Chairwoman Jessica Rosenworcel emphasized the urgency of these efforts, stating, “As technology continues to advance, so do the capabilities of adversaries, which means the US must adapt and reinforce our defenses.” The healthcare industry can draw parallels from these actions, recognizing the shared responsibility to secure interconnected systems. Achieving this will require a coordinated approach, with all stakeholders contributing to a cybersecurity framework designed for healthcare’s distinct challenges.
Global agencies, including The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal Bureau of Investigation (FBI), Australian Signals Directorate’s (ASD’s) Australian Cyber Security Centre (ACSC), Canadian Cyber Security Centre (CCCS), and New Zealand’s National Cyber Security Centre (NCSC-NZ), have warned that People’s Republic of China (PRC)-affiliated threat actors have compromised major telecommunications providers’ networks as part of a broad cyber espionage campaign.
In response, these agencies have issued this “best practices” guide to help network engineers and communications infrastructure defenders harden their networks against exploitation by PRC-affiliated and other malicious actors.
In light of these threats, healthcare organizations must adopt a proactive cybersecurity strategy to protect their networks, infrastructure, devices, and sensitive patient data.
All of the above speaks primarily to the responsibilities of device operators, such as hospitals. However, these responsibilities are matched by a corresponding set of regulatory obligations for manufacturers as defined by the FDA, including ensuring compliance with cybersecurity regulations such as the PATCH Act and post-market guidance. For simplicity, these complementary responsibilities are acknowledged as part of the broader collaborative effort required between all stakeholders in the healthcare ecosystem.
The healthcare industry cannot afford to overlook the risks presented by vulnerable telecommunications networks. As highlighted by CISA, these attacks are not sophisticated but rather exploit longstanding weaknesses. Similarly, the cybersecurity measures necessary to protect our healthcare infrastructure, including its medical devices, are within reach but require proactive effort.
Medical device manufacturers, standards development organizations (SDOs), and regulatory bodies must work together to fortify the connected medical ecosystem. For example, standards such as IEEE 2621 demonstrate promising progress in protecting connected diabetes devices or the recently released IEEE/UL 2933 “Standard for Clinical Internet of Things (IoT) Data and Device Interoperability with TIPPSS — Trust, Identity, Privacy, Protection, Safety, and Security”, which addresses the CIoT space broadly and thoroughly . Expanding such collaborative efforts to other connected medical devices is essential. By aligning mobile and medical industries with cybersecurity expertise, we can strengthen defenses across all interconnected systems.
The recent network intrusions by state-sponsored actors underscore the critical need for heightened cybersecurity across our critical infrastructure industries, including healthcare, and also highlight the challenges that medical device manufacturers and operators face. The vulnerabilities exploited in telecommunications networks reveal systemic weaknesses that also endanger connected medical devices and the sensitive data they transmit. Promising steps, such as the development of standards like IEEE 2621 or IEEE/UL 2933, highlight how cross-industry collaboration can address these challenges. However, greater synergy is needed between the mobile communications and medical device industries to align their efforts in securing interconnected systems. By fostering more comprehensive partnerships and leveraging cybersecurity expertise, we can establish a robust foundation for the protection of connected medical devices.
Now is the time for the healthcare, mobile, and cybersecurity ecosystems to unite in fortifying our defenses against emerging threats. Proactive collaboration among medical device manufacturers, regulatory bodies, and cybersecurity experts can help develop innovative solutions, enhance compliance with evolving standards, and ultimately safeguard patient safety. Through coordinated action, we can create a secure environment for connected medical devices, ensuring the health and well-being of those who depend on them.
December 13, 2024
December 4, 2024
Get the latest healthcare cybersecurity news right in your inbox.
We'll never spam you or sell your information