back to article Medic! Orangeworm malware targets hospitals worldwide

If there's one thing security vendors love it's a catchilly-named piece of malware to whip up fervor over, and boy is it a good day to be Symantec. The company on Monday introduced the world to Orangeworm, a particularly nasty hacking operation that has been mainly attacking companies in the healthcare field. The operation is …

  1. IglooDude

    They should stick some credit card info on the ROM of every medical scanning machine, to bring everything into scope for PCI auditing, I daresay those old Winboxen would get upgraded or airgapped much more expeditiously.

    1. c1ue

      It isn't clear that "upgrades" are that easy. For example: if the XP machine is the interface to a 10 year old MID (medical imaging device, i.e. X ray, CAT Scan, MRI), the XP machine may be literally the only way to access data coming out of the MID.

      Upgrading it might even require a recertification of the MID under US Food and Drug Administration rules.

      1. Doctor Syntax Silver badge

        "Upgrading it might even require a recertification of the MID under US Food and Drug Administration rules."

        It's amazing how often this has to be pointed out.

        1. Korev Silver badge

          I have no idea why you're both getting downvotes for bringing up the regulatory requirements that make supporting these kinds of systems somewhat more difficult...

          1. Anonymous Coward
            Anonymous Coward

            They'll just reply to make the cost of noncompliance higher than the replacement cost of the machine. If that doesn't spur them, they don't deserve to stay in operation.

      2. herman

        "It isn't clear that "upgrades" are that easy. For example: if the XP machine is the interface to a 10 year old MID (medical imaging device, i.e. X ray, CAT Scan, MRI), the XP machine may be literally the only way to access data coming out of the MID." - That is one of the things that virtual machines are good for. You can run XP with the network interface disabled, configured to store all data on the host file system and be pretty safe against malware.

        1. Charles 9

          " That is one of the things that virtual machines are good for."

          OTOH, custom hardware tends to be a strike AGAINST virtualization. You can't virtualize what you don't know.

          1. DNTP

            If I had a nickel for every time someone said "why can't we replace this broken PC/run it off a virtual machine", I'd be able to replace every spectrometer in the lab.

            Worst case: The physical board inside the PC dates from 1992, uses a completely proprietary connector to the instrument itself, was only ever made by the OEM, was discontinued in 1993, has six soldered connections to the PC's motherboard, and there are no drivers available for anything later than Win XP (which are just buggy ports of the Win95 drivers anyway).

            Best case: Replacing a PC yourself would invalidate the support contract on the instrument that costs $17,000 per anum, and the software license isn't transferable between computers anyway.

            Please, please stop telling me "PCs are generic/Virtual machine everything." I know how to do those things; if it could be done, I would have done it already; the older and more expensive the instrument the more obstacles it has to simple PC swapping.

      3. CrazyOldCatMan Silver badge

        if the XP machine is the interface to a 10 year old MID (medical imaging device, i.e. X ray, CAT Scan, MRI), the XP machine may be literally the only way to access data coming out of the MID

        It also holds for bits of equipment like electron microscopes - we have some that, even though they are old, are perfectly suited for what we need. And replacing them would use up our capital budget for the next five years.

        So they stay, even though the software that drives them only works with Windows XP. Those machines are on a segregated VLAN with no access to the live network and only carefully-selected USB sticks are allowed to be plugged in.

  2. Prst. V.Jeltz Silver badge

    This, Symantec says, could simply be a reflection on the state of IT in healthcare.

    So it targets healthcare or not?

    I thought the story was that some ransomware scumbags had surpassed themselves and done something soo evil - to actually target machines that peoples lives depend on .

    Then Semantec says "it might not be deliberately targeted , its just that healthcare I.T is the dirtiest around and picks up all kinds of germs all the time" so to speak.

    1. Anonymous Coward
      Anonymous Coward

      Having seen the state of IT security in health care up close (and personal), it really is an easy target. This might also explain the prevalence of manufacturing firms in the infected list as that's the other low-hanging fruit, even if unintentional. Their systems are ancient, too.

    2. Destroy All Monsters Silver badge

      It's IT by headlines, we will never know.

  3. Anonymous Coward
    Anonymous Coward

    Ghost in Shell Man-Machine Interface

    Researchers believe the malware is looking to get into sensitive medical information in carefully selected-targets, though they aren't sure exactly what the ultimate aim of Orangeworm is.

    ... prime directive?

    > Find The Skripal

  4. Tim99 Silver badge
    Windows

    Windows

    I have seen several specialist manufacturers move their instrument control software away from Windows, these instruments now have their own custom software and act as web servers - Windows is now only used by the manufacturer to manipulate and display captured data.

    1. DNTP

      Re: Windows

      Or they include a *nix box that can be networked to many instruments, that locally serves browser pages to users. I like this approach better than the 'one instrument, one PC'. You don't need to screw around with trying to teach Linux to people who barely can handle Win7, and it's easier for the admin (or support engineer) to maintain remotely.

      1. Tim99 Silver badge

        Re: Windows

        Have an upvote. I'd agree that could be a good way to go, and that was the how some equipment I used in the late 1970s worked. When IBM PCs running DOS came out, almost all manufacturers switched to them within a few years. The relative cost was <$5K compared with $20K-$50K, which was a significant chunk of the systems' $100K-$1M+ cost. I linked a lot of them with MS/IBM PC-LAN networking or Netware, sometimes talking to central minicomputers.

        The new stuff that I have seen costs >$20K (sometimes >$400K) and they have their own built in high-res touch-tablet type screens with their own CPU ARM? and memory, upgrades are normally loaded from a USB stick. The user follows friendly on-screen prompts to set up and operate the instrument. The instrument has its own IP address, and a number of instruments can send data to one or more Windows PCs for processing.

  5. Anonymous Coward
    Trollface

    Orangeworm malware ?

    Why am I immediately thinking about the white house ?

    1. Chris G

      Re: Orangeworm malware ?

      The President's got worms?

      I wouldn't be surprised if the malware was found to originate from health insurance companies, especially considering it is going after form filling software.

      They are figuring out the best way to complicate forms so that they can refuse payout because ' You didn't answer this question correctly.'

      1. Doctor Syntax Silver badge

        Re: Orangeworm malware ?

        "The President's got worms?"

        Or the other way around?

      2. Anonymous Coward
        Anonymous Coward

        Re: Orangeworm malware ?

        I spent a year working a temporary job at the Veterans Administration hospital, responsible for all the medical coding which went on to the medical billing section there and guess what? I can't fill them out correctly either. Oh, and they are always looking for me to add another billing provider. Bad enough the ping-pong I'm going through with the hospital and the ambulance companies, toss in another provider into the mix? Yikes!

  6. Patched Out

    Say what?

    "The attack is believed to have been operational since at least January, 2015"

    "If there is one bit of good news, it's that Orangeworm and its Kwampirs trojan are not particularly discreet. The malware tends to perform easy-to-detect activities, such as pinging a long list of command and control systems and trying to copy itself over network shares, once infected."

    So, if it is so easy to detect, why are we just now hearing about it over 3 years since it has been operational?

  7. Anonymous Coward
    Anonymous Coward

    17 per cent is not "most"

    The article states:

    "The attack [...] claims most of its victims (17 per cent) in the US [...]"

    "Most" would generally be considered "more than half". I think what's meant here is "the largest fraction by country".

    1. Charles 9

      Re: 17 per cent is not "most"

      No, "most" is defines by the dictionary as "more than anything else." Pluralities fulfill this definition as well as majorities (which is why you need to be specific if you seek a majority).

  8. Anonymous Coward
    Anonymous Coward

    Security

    When I started my current job with a Healthcare Company (hospital and clinic owner), I found my system's servers hadn't been patched for three years. When a major clinical system went down, we found out that they hadn't been performing backups either.

    I'd like to think that isn't typical.

    PS: Those things are happening as they should now, and being verified.

    1. Anonymous Coward
      Anonymous Coward

      Re: Security

      I remember checking the backups of a server when I started a new job and although the backup had been running perfectly for over a year it was suspiciously quick.

      Turned out they'd scheduled the job, named it, added tapes to rotation etc which they were changing daily but hadn't actually selected any data to backup.

      1. herman

        Re: Security

        "hadn't actually selected any data to backup" - I am unable to select any decent response to that one.

  9. sanmigueelbeer

    Researchers believe the malware is looking to get into sensitive medical information in carefully selected-targets, though they aren't sure exactly what the ultimate aim of Orangeworm is.

    A "box" is easy to copy/reverse engineer, however, one needs the code to get things running. Maybe this is to "siphon" OS codes and send it to some country who specializes in copying someone's product and marketing it at a fraction of the cost?

  10. Anonymous Coward
    Anonymous Coward

    Laws making the death penalty mandatory for anyone deliberately or accidentally infecting equipment in the health industry with malware, and for those who wrote the malware, might save us a lot of grief in the future. Same for infecting anything in the military.

    Yeah, that might be harsh, but they are playing with nukes, not matches.

    1. Charles 9

      Law of Unintended Consequences. If they feel they're going for broke, they may just decide to USE them if they're cornered. You want a Three-Striker with access to a nuke?

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like