Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
A Type 1 diabetic said Thursday that hackers can remotely change his insulin pump to levels that could kill him.
Jay Radcliffe, a security researcher, demonstrated to the crowd at the Black Hat conference in Las Vegas how he is able to send commands to and wirelessly disable (within about 150 feet) the insulin pump he has been wearing since he was 22, when he was diagnosed with the autoimmune disease after dealing with extreme weight loss and an unquenchable thirst.
Radcliffe, now 33, explained that all he requires to perpetrate the hack is the target pump's serial number. Then using hardware and a program he wrote to talk to the device, he can issue instructions. These commands can order the device to turn off, but more dangerously, they can significantly raise or lower the levels of insulin Radcliffe's body absorbs at any given moment.
"It's basically like having root on the device, which is like having root on the chemistry of your body," said Radcliffe, who wears his US$6000 pump around the clock to maintain normal blood sugar levels.
Radcliffe did not name the affected vendor because the threat requires a complete overhaul of the product and would result in panicked customers.
"I don't think it's relevant to the purpose of my talk," he said at a press conference afterward. "If I name the vendor, then any bad guy or evil hacker...can start exploit code on it right away."
Radcliffe said he isn't sure how many other vendors make insulin pumps that suffer from similar vulnerabilities. To remedy the problem, he suggested manufacturers implement a verification process, in which users have to approve changes to their devices.
In addition, the pumps should contain a password-protected serial number.
The vulnerability is more indicative, he said, of the chronic insecurity of embedded systems.
"Everything has an embedded processor and computer in it," he said. "Every time you hide behind [security by] obscurity, it is going to fail."
Brad Smith, a researcher and Black Hat conference staffer who also is a registered nurse, said the medical field largely looks the other way when it comes to securing patient devices.
"I lecture at all the medical conferences," he said during the press conference. "They just hide it. Pay attention to what [Radcliffe] is saying. His life is in this pump."
This article originally appeared at scmagazineus.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.