• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 22nd, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Security

465k Pacemakers vulnerable; users must visit doctors for fix

August 31st, 2017 Waqas Security 0 comments
465k Pacemakers vulnerable; users must visit doctors for fix
Share on FacebookShare on Twitter

Are you using Pacemaker device manufactured by Abbott Laboratories (previously St. Jude Medical)? If yes, this article is especially for you.

It is no surprise that Pacemaker, the small device that is implanted in the body of a patient to deal with life-threatening cardiac rhythmic issues are open to critical vulnerabilities. Now, Food and Drug Administration (FDA) has sent out a security notice that around 465,000 (half a million) Pacemaker devices are vulnerable to hack attacks and require a critical software update to protect them.

These existing vulnerabilities can allow hackers to modify the settings of a targeted device and turn it off which can be fatal for patients since Pacemakers (Pdf) use batteries to send electric signals to the heart to help it pump the right way. The pacemaker is connected to the heart by one or more wires.

More: Johnson & Johnson’s Insulin Pumps vulnerable to cyber attacks

“These vulnerabilities, if exploited, could allow an unauthorized user (i.e., someone other than the patient’s physician) to access a patient’s device using the commercially available equipment. This access could be used to modify programming commands to the implanted pacemaker, which could result in patient harm from rapid battery depletion or administration of inappropriate pacing,” the FDA wrote.

The Pacemakers under discussion were manufactured by Abbott Laboratories (previously St. Jude Medical). To receive a firmware update to fix vulnerabilities on their device, patients must visit their doctors and healthcare provider in the United States while 280,000 devices are entitled to receive update outside the United States.

The list of vulnerable devices include:

  • Accent
  • Anthem
  • Accent MRI
  • Accent ST
  • Assurity
  • Allure

Currently, there are no reports or indications of unauthorized access to any patient’s implanted device. Abbott, on the other hand, said it would also update the software embedded in pacemakers to reduce the risk of hacking.

In 2016, Muddy Waters released a report claiming that pacemakers and other implantable devices manufactured by St. Jude Medical are vulnerable to life-threatening cyber attacks. In return, St. Jude Medical not only rejected Muddy Waters’s report but also filed a lawsuit for defamation. However, FDA Homeland Security conducted an investigation and confirmed that Muddy Waters’s findings were legitimate.

More: Researcher Claims Hospital Drug Pumps Can Be Hacked

In May this year, WhiteScope security researchers found thousands of critical security flaws in Pacemakers leaving them vulnerable to cyber attacks that can potentially bring about some fatal consequences since the attackers can even adjust the pacemaker should they choose to; posing a grave risk to the lives of patients.

Featured image via Rick Thompson

  • Tags
  • Cyber Attack
  • hacking
  • internet
  • Medical
  • Privacy
  • security
  • Technology
  • Vulnerability
Facebook Twitter LinkedIn Pinterest
Previous article Electronics retail giant CeX hacked; data of 2 million customers stolen
Next article WikiLeaks official website hacked by OurMine hacking group
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
Gamarue malware found in UK Govt-funded laptops for homeschoolers

Gamarue malware found in UK Govt-funded laptops for homeschoolers

Shazam Vulnerability exposed location of Android, iOS users

Shazam Vulnerability exposed location of Android, iOS users

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Gamarue malware found in UK Govt-funded laptops for homeschoolers
Security

Gamarue malware found in UK Govt-funded laptops for homeschoolers

16
Shazam Vulnerability exposed location of Android, iOS users
Security

Shazam Vulnerability exposed location of Android, iOS users

156
Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet
Security

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

96

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us