Cybersecurity issues have been on the rise for years, increasingly affecting the healthcare sector. In 2019, several attacks have been published that specifically aim at medical network protocols and file formats, in particular digital imaging and communications in medicine. This article describes five attack scenarios on picture archiving and communications systems (PACS) and medical imaging networks: the import of patient data from storage media containing malware, a compromise of the hospital network, malware embedded in digital imaging and communications in medicine images or reports, a malicious manipulation of medical images and a network infiltration of malicious health level seven messages. Prevention and mitigation measures for each of these attacks exist, some of which can be implemented by the system user (e.g., hospital), while others require implementation in the PACS and medical imaging devices by the vendors. In practice, however, many of these are not in common use. What is missing today are PACS network security guidelines for practitioners that support users in keeping their network secure. Furthermore, integrating the healthcare enterprise integration profiles and test tools might be needed to address the deployment of public key infrastructure and digital signatures in the PACS environment.
[1]
Marco Eichelberg,et al.
Authentication, integrity, and confidentiality in DICOM-structured reporting: concept and implementation
,
2002,
SPIE Medical Imaging.
[2]
Lawrence Tarbox,et al.
DICOM Images Have Been Hacked! Now What?
,
2019,
AJR. American journal of roentgenology.
[3]
Hans-Gerd Lipinski,et al.
Embedded systems for signing medical images using the DICOM standard
,
2003,
CARS.
[4]
Yuval Elovici,et al.
CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning
,
2019,
USENIX Security Symposium.
[5]
David A. Clunie,et al.
Dual-Personality DICOM-TIFF for Whole Slide Images: A Migration Technique for Legacy Software
,
2019,
Journal of pathology informatics.
[6]
Jules White,et al.
Cyber-physical vulnerabilities in additive manufacturing systems: A case study attack on the .STL file with human subjects
,
2017
.