Hospital robots exposed to hackers after critical security vulnerabilities discovered

Zero-day vulnerability meant Tug robots could be hijacked by hackers

Anthony Cuthbertson
Wednesday 13 April 2022 14:03
Comments
<p>A remote-controlled robot prototype extracts a throat swab sample, as part of a project to assist physicians in running tests on suspected Covid-19 patients n Egypt’s Nile delta city of Tanta, on 20 March, 2021</p>

A remote-controlled robot prototype extracts a throat swab sample, as part of a project to assist physicians in running tests on suspected Covid-19 patients n Egypt’s Nile delta city of Tanta, on 20 March, 2021

Fleets of robots deployed to hospitals throughout the US were exposed to hackers after researchers discovered five critical security vulnerabilities with their software.

Researchers from the cyber security firm Cynerio found the bugs, dubbed JekyllBot:5, within Tug robots built by US-based manufacturer Aethon. The zero-day vulnerabilities, so called because there was no fix available when they were first uncovered, were reported to Aethon, who engineered and rolled out a patch to protect the bots.

The vulnerabilities would have allowed hackers to send the robots control commands, take photos, and access the system’s user database.

“These zero-day vulnerabilities required a very low skill set for exploitation, no special privileges, and no user interaction to be successfully leveraged in an attack,” said Asher Brass, head of cyber network analysis at Cynerio.

“If attackers were able to exploit JekyllBot:5. they could have completely taken over system control, gained access to real-time camera feeds and device data, and wreaked havoc and destruction at hospitals using the robots.”

Tug robots are designed to transport medication, linens and waste around hospitals and has been installed in hundreds of hospitals around the US.

Capable of carrying up to 600kg and travelling around 3kph, Cynerio warned that any hacker exploiting the bug would be able to use them to “crash into staff, visitors and equipment”.

The Independent has contacted Aethon for a comment about the security vulnerabilities.

The Tug robots are part of an emerging trend of hospitals employing robots to carry out increasingly sophisticated tasks. The researchers warned that the healthcare industry should prioritise security over all else due to the sensitivity of both the data processed and the robots’ physical surroundings.

“Hospitals need solutions that go beyond mere healthcare IoT (internet-of-things) device inventory checks to proactively mitigate risks and apply immediate remediation for any detected attacks or malicious activity,” said Cynerio founder Leon Lerman.

“Any less is a disservice to patients and the devices they depend on for optimal healthcare outcomes.”

Register for free to continue reading

Registration is a free and easy way to support our truly independent journalism

By registering, you will also enjoy limited access to Premium articles, exclusive newsletters, commenting, and virtual events with our leading journalists

Please enter a valid email
Please enter a valid email
Must be at least 6 characters, include an upper and lower case character and a number
Must be at least 6 characters, include an upper and lower case character and a number
Must be at least 6 characters, include an upper and lower case character and a number
Please enter your first name
Special characters aren’t allowed
Please enter a name between 1 and 40 characters
Please enter your last name
Special characters aren’t allowed
Please enter a name between 1 and 40 characters
You must be over 18 years old to register
You must be over 18 years old to register
Opt-out-policy
You can opt-out at any time by signing in to your account to manage your preferences. Each email has a link to unsubscribe.

By clicking ‘Create my account’ you confirm that your data has been entered correctly and you have read and agree to our Terms of use, Cookie policy and Privacy notice.

This site is protected by reCAPTCHA and the Google Privacy policy and Terms of service apply.

Already have an account? sign in

By clicking ‘Register’ you confirm that your data has been entered correctly and you have read and agree to our Terms of use, Cookie policy and Privacy notice.

This site is protected by reCAPTCHA and the Google Privacy policy and Terms of service apply.

Register for free to continue reading

Registration is a free and easy way to support our truly independent journalism

By registering, you will also enjoy limited access to Premium articles, exclusive newsletters, commenting, and virtual events with our leading journalists

Already have an account? sign in

By clicking ‘Register’ you confirm that your data has been entered correctly and you have read and agree to our Terms of use, Cookie policy and Privacy notice.

This site is protected by reCAPTCHA and the Google Privacy policy and Terms of service apply.

Join our new commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in