5.1 Threat Taxonomy with Framework Mapping
The reviews analyzed in Section
3 broadly covers the security topic, identifying different threats for medical devices and healthcare infrastructure. Our article aims to offer a complete threat taxonomy (unifying healthcare ecosystem) with all threats (IMD/IWMD/IoMT-focused and infrastructure-focused) found in the literature, enumerated and classified.
For classifying threats, we take the decision of aligning them with a globally accessible knowledge base like MITRE ATT&CK, because tools of this type are acquiring more importance in recent years for the works performed about threat modeling [
56,
78]. This alignment may be useful in the compatibility of this work with other related projects, as well as the provision of a reference framework to compare this threat classification. Apart from MITRE ATT&CK, other alternatives can be deemed, such as Cyber Kill Chain [
89] and Diamond Model [
18]. However, MITRE ATT&CK is the most adopted by the industry and community because offers different advantages: it maps and covers everything regarding an intrusion from both the attack and defense sides, and provides examples and references including data on threat groups. This knowledge base is composed of 12 categories mapped to the steps executed in an attack: Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command and Control, Exfiltration, and Impact. MITRE ATT&CK also has three different matrices for modelling different scenarios: Enterprise, which contains threats associated with Windows, Linux, Cloud, and so on; Mobile, which covers both Android and iOS threats; and Industrial Control Systems (ICS), focusing on industry-specific devices and operations.
To perform this alignment, we select the Enterprise and ICS matrices due to the majority of threats found in healthcare infrastructure are more related with the Enterprise matrix, and some of medical devices suffer from attacks similar to those found in the industry. In Fig.
3, we show the complete threat taxonomy aligned with MITRE ATT&CK. To better understanding, the threat taxonomy is divided into twelve categories, being nine of them shared between Enterprise and ICS matrices, two of them Enterprise-specific (Resource Development and Credential Access) and the last one ICS-specific (Impair Process Control).
In terms of MITRE ATT&CK, more threats and techniques are included, but only the categories and threats related with the specific vulnerabilities and attacks presented in healthcare have been mapped. Starting with
Resource Development, as shown in Fig.
3, this category covers the techniques used by adversaries with the purpose of introducing the needed mechanisms to allow the execution of future operations. In this category, we select from ATT&CK
Develop, Obtain and Stage Capabilities, and
Compromise Accounts and Infrastructure as the most important threats for healthcare. Regarding to
Capabilities, firstly the adversary can develop or obtain the capabilities to later stage them in the target. On the other hand,
Compromise Accounts and Infrastructure are other gateways that attackers can use for entering in the victim environment.
The second category presented, Initial Access, involves all techniques that gain access to the network thanks to entry points or vectors available on it. In this sense, we enumerated Rogue Master, Hardware Trojans and Phishing to allocate the attacks appeared in healthcare. Rogue Master is ICS-specific and consists of impersonating a master allowing attacker to disrupt the network communications by capturing and receiving traffic, to affect processes in unintended ways, to hide his/her attack in the organisation, and so on. Other way to enter in the network is with Hardware Trojans, introducing hardware components inside of environment and distributing the attack. Finally, Phishing is the technique used to mislead users with the intention of obtaining their user credentials, sensitive information, and so on.
The third category is Execution, including the techniques where the attacker compromises the local or remote system running malicious code. The threat highlighted in this category is Modify Controller Tasking, ICS-specific technique that alter the tasking of the controller to modify the operations and the behaviour of the device. Next, we present Persistence, incorporating techniques to keep access to the system after restarts, shutdowns, software modifications, etc. Here, we enumerate System Firmware, Valid Accounts and Server Software Component. Belonging to ICS group, System Firmware exploits the firmware update feature available in devices to incorporate malicious firmware that allows attacker to take device control. Valid Accounts is a result of a successful intrusion performed with other techniques belonging to other categories like Initial Access or Resource Development. At this point, the adversary acts as a valid account inside of environment. Server Software Component is another technique that exploits server development features to gain persistent access to the system. Then, we show Privilege Escalation as the group of techniques in charge of trying to get elevated permissions in the system or device. In this case, the main threat selected is Exploitation for Privilege Escalation, where vulnerabilities are used for producing the attack and elevating privileges.
Defense Evasion encompasses techniques that pretend to avoid the defenses included in the system to perform an attack. Here, we include Modify Cloud Computing Infrastructure and Weaken Encryption techniques. The former tries to leverage the different options that Cloud Computing offers for instances (create, remove or modify instances to avoid the defenses deployed in the system). Weaken Encryption exploits a problem in the encryption to intercept and capture communications. This technique can also attack to devices in charge of encrypting the messages for obtaining the information. The Credential Access category includes techniques to obtain the necessary information (generally users and passwords) to enter in the system as an authenticated user. For this group, we indicate Brute Force, Unsecured Credentials, Steal Authentication Token, and Man-in-the-Middle. Firstly, Brute Force is the common technique to obtain user passwords by inserting text strings until a valid result is obtained. Unsecured Credentials leverages weaken credentials policies or the use of default credentials for gaining the system access. Steal Authentication Token gets the access to the system through the action of a legitimate user that grants the access to the adversary. Finally, Man-in-the-Middle consists of intercepting the communication between two entities sniffing or modifying the communication.
The Discovery category enumerates techniques used for knowing and detect the victim’s environment. Here, we present Wireless Sniffing and Network Sniffing, where both techniques try to collect information of the organisation through include mechanisms to obtain the communications produced in it. Wireless Sniffing allocates the mechanisms in the wireless environment while Network Sniffing utilises the interface of a computer to gain knowledge about internal network. To continue, the Lateral Movement category comprises the mechanisms used for pivoting by the environment changing the system of the internal network. As technique for this category, we only highlight Valid Accounts, which is able to traverse the network thanks to valid user’s credentials obtained. The next category is Collection, where are allocated the techniques that allow attackers to gather data and knowledge for their purpose. Here, different mechanisms are listed: Wireless Sniffing, Data from Information Repositories, Monitor Process State, and Man-in-the-Middle. On one hand, Wireless Sniffing and Man-in-the-Middle have already explained because they can be found in other categories. On the other hand, Data from Information Repositories collect information by repositories installed in the organization, while Monitor Process State searches relevant information in the physical state, such as CPUs number, RAM inserted, and so forth.
The Impair Process Control category is ICS-specific and incorporates techniques with the purpose of seeking malicious effects in the physical control processes. Here, two important mechanisms appear, Modify Parameter and Spoof Reporting Message. Both cover all techniques able to change the packets and messages sent between devices and systems inside of network, as well as process configurations producing different behaviours in the organisation operations. Finally, the Impact category encompasses the techniques that affect to the functioning of the system, such as manipulation, disruption, damaging, and so on. Here, two different Denial of Service attacks appear, Network and Endpoint, and Data Encryption for Impact, traditionally known.
5.2 Attack Classification
All categories and techniques presented above are used here to map and create the association between the attacks produced in healthcare and the categories enumerated. For evaluating the impact of vulnerabilities, different frameworks provide a scoring per vulnerability in function of different established metrics. In this sense, the most adopted framework is the Common Vulnerability Scoring System (CVSS) v3 [
61]. The CVSS is composed of three metrics groups: base, temporal, and experimental metrics. These metrics give a specific vulnerability scoring.
Although CVSS is broadly extended, it is neither healthcare-focused nor designed for covering the security issues presented in the medical domain. Delving into the literature and official standardization organizations, we find other alternatives such as Risk Scoring System for Medical Devices (RSS-MD) [
116] and the work performed by Carreon et al. [
20], which try to incorporate health and privacy concerns of medical devices to the CVSS. This latter work adds two new metrics to CVSS, i.e., Health Impact and Sensitivity, and then compares the accuracy of RSS-MD, CVSS and their approach. This comparison states that Carreon et al.’s work shows better results. On the other hand, the Federal Risk and Authorization Management Program (FedRAMP) contracted to MITRE in 2020 to adapt the current CVSSv3 to medical devices and created the “Rubric for applying CVSS to medical devices” [
23]. This rubric improves the initial CVSSv3 with the healthcare characteristics to be used in this environment. This framework is the final selected for our work due to the compatibility with CVSS and the adoption that CVSS has in the threat classification, as well as the entity behind of this work, creator also of MITRE ATT&CK.
The purpose with our work is to classify the threats collected on healthcare with a common adopted method, i.e., CVSS, incorporating this effort in the work already performed through this mechanism. In Tables
2 and
3, we present all attacks discovered on healthcare. By each attack, the tables present the target of the attack, being IWMD or Healthcare infrastructure the available options, the MITRE Category and its concrete technique as introduced in Fig.
3. In this sense, the attacks are sorted by the category they belong to. In the following column group, the CVSS is developed by each attack, presenting the metric vector and the resulting score. In this regard, the work at hand has been performed taking into account the review presented by Newaz et al. [
108], where some metric of CVSSv3 are used for some of the attacks presented here; the NVD Database [
62], searching vulnerabilities exploiting these attacks and checking the more repeated values; and the results achieved with the MITRE rubric to obtain the best score per attack. Finally, we show the works (their reference) where the attacks have been collected.
Delving into metric vector, we highlight that the main difference between Rubric proposed by MITRE and CVSSv3 is the reformulation of questions and options to evaluate such metrics and incorporating the processes and data managed in healthcare. Although the available options to select in the metrics maintain the same values, the description of the value and the reason for selecting it is changed according to the environment, processes, information, and assets belonging to medical domain. For example, to evaluate the Confidentiality impact of an attack, the impact in Protected Health Information (PHI) and Personal Identifiable Information (PII) data must be checked. The different metrics analyzed, represented at the Vector column in Tables
2 and
3, are as follows:
–
Attack Vector (AV) represents the way used by the attacker to carry out the attack. In this sense, the CVSS proposes four ways: Network (N), Adjacent Network (A), Local (L), and Physical (P).
–
Attack Complexity (AC) does reference to effort performed by the attacker to give the successful in the attack. The metrics available for this property is Low (L) and High (H).
–
Privileges Required (PR) contains the credentials needed by the attacker to address the attack. In this case, None (N), Low (L), and High (H) options are found.
–
User Interaction (UI) indicates whether the attack needs the user cooperation to produce the attack correctly. For modelling this property, None (N) and Required (R) values are used.
–
Scope (S) defines whether the attack addressed to a device/system has an effect outside of security range. For this metric, Unchanged (U) and Changed (C) values are possible.
–
Confidentiality (C), Integrity (I), and Availability (A) Impact refer to the consequences produced by an attack in CIA properties. The consequences can be None (N), Low (L), and High (H).
After presenting Tables
2 and
3, we start with the attack explanation. Firstly, we enumerate
Malware,
Outdated Operating Systems (OSs),
Dropbear SSH Server, and
Social Engineering as healthcare threats allocated in the
Resource Development (RD) category.
Malware encompasses all code that is installed in healthcare assets with malicious intentions. Different reviews present this attack [
7,
73,
108,
112,
118], and highlight the problem that this attack poses in healthcare. For example, Newaz et al. [
108] presented different Malware, such as “Conflicker”, a malware that allowed attacker to execute arbitrary code on the vulnerable systems (X-ray machine, mammography, and a gamma camera), and “Kwampirs” malware, which provides attacker to trigger equipment malfunction or delay in accessing information.
Outdated Operating Systems is is also a very common threat in healthcare devices allowing attackers to exploit bugs that have been fixed in newer versions of them. This attack is depicted in [
34,
108], where Newaz et al. [
108] affirmed that many devices are out of date in the medical environment.
Dropbear SSH Server, analyzed in [
119], is a small Linux distribution that allows some medical devices to have a SSH connection, and the incorrect protection of this server can suppose an entering point in the healthcare infrastructure.
Social Engineering is a traditional technique trying to leverage the public information available of medical workers as well as other sources in order to compromise the accounts of them [
3,
112].
Next, we found
Sybil,
Hardware Trojans, and
Phishing as threats belonging to the
Initial Access (IA) category.
Sybil, enumerated in [
27,
112,
113], is an IWMD specific threat and consists of creating non-real identities in internal environment (achieve the trust of the network) to perform other attacks, such as Denial of Service or Flooding attacks. Papaioannou et al. [
112] explained that a Sybil attack can influence in legitimate entities to draw incorrect conclusions.
Hardware Trojan is a technical threat presented in [
73,
108], which has the objective of inserting a trojan in integrated circuits and hardware device. Newaz et al. [
108] commented that FDA has released numerous reports with this type of threat.
Phishing is a widely method used for entering to private environments with the interaction of a valid user leveraging the inattention or lack of knowledge [
106].
The
Execution (Ex) category covers
Routing Attack,
Wormhole,
Blackhole, and
Grayhole as healthcare threats.
Routing Attack is the one performed for altering the route of packets to change the destination. This attack is presented in [
3,
113]. Algarni [
3] showed this attack into a medical device in Smart Healthcare Systems (Incorporate Smart technology to Healthcare) suffering a change in its routing table.
Wormhole proceeds with the alteration of routing tables forwarding traffic to one adversary node.
Blackhole and
Grayhole are variations of
Wormhole. The former consists of dropping the packet when is received by the adversary node, while the latter implements a dropping algorithm to complicate the detection attack. These attacks are presented in [
3,
27,
113] and have the IWMD as main targets in healthcare.
The following attacks are
Firmware Modification,
Compromised Node, and
SQL Injection which are encompassed in the
Persistence (Pe) category.
Firmware Modification is a very common attack completed in medical devices and means the modification of the firmware, transforming the device behaviour. Newaz et al. [
108] highlighted the importance of this attack and explained some cases where this attack served as input point to healthcare system. Besides, Yaqoob et al. [
157] enumerated different devices vulnerable to this attack with the followed attack methodology and the vulnerability exploited in each case.
Compromised Node is the infection of valid node of the network. Algarni [
3] showcased this attack by taking control of the node sensors providing false information. Finally,
SQL Injection is an attack produced in a healthcare website injecting malicious code to exploit the SQL database [
34].
The
Privilege Escalation (PE) category is presented with only the
Privilege Escalation attack. This attack is the common procedure used to obtain increased system permissions through exploits and vulnerabilities found. Next, the
Defense Evasion (DE) category includes two attacks,
IaaS Cloud Attack, and
Device Cloning. Both attacks are collected by [
34], and
IaaS Cloud Attack is the alteration of cloud infrastructure, technology implemented in healthcare in the recent years to improve the processes and operations.
Device Cloning is the impersonation of device to perform malicious activities in the environment.
The
Credential Access (CA) category comprises
Password Intrusion,
Weak Authentication Schemes Exploitation,
Unauthorised Access,
Forgery, and
Man-in-the-Middle attacks.
Password Intrusion is an attack used to obtain the access to the system with user’s credentials, being brute force one of the most repeated techniques.
Weak Authentication Schemes Exploitation is defined by Newaz et al. [
108] as the lack of strength of the authentication mechanisms, mainly in medical devices. This attack can appear during the instant of reading and writing data from these devices where Newaz et al. commented different studies which obtain data from devices with a CD or USB portable medium.
Unauthorized Access leverages the unsecured protection in order to enter in the system. Both [
3] and [
157] present this entry vector and Yaqoob et al. [
157] enumerates multiple medical devices where this attack has been produced, such as Cardioverter Defibrillator and Insulin pump.
Forgery is an attack only collected in [
112], defined as the counterfeit construction of identity being authenticated to transmit fake data to other entities. Papaioannou et al. highlights in [
112] the problem of this attack against the authentication requirement.
Man-in-the-Middle is widely used in communications to access sensitive information. This attack is addressed in [
108,
112,
157], highlighting different entry points presented by Newaz et al. [
108], such as Bluetooth and reverse engineering. Yaqoob et al. [
157] enumerated some vulnerable medical devices to this attack.
In
Discovery (Di) category, two extensively used attacks are classified:
Eavesdropping and
Traffic Analysis.
Eavesdropping is the most commented attack in the literature appearing in [
3,
7,
73,
108,
112,
118,
124,
157]. This attack pretends to obtain sensitive information thanks to unsecured communication channels. Newaz et al. [
108] commented that different medical and wearable devices such as Blood Pressure Monitors and smartwatches suffered vulnerabilities that allowed attackers to obtain sensitive information. On the other hand, Yaqoob et al. [
157] enumerated different medical devices suffering this attack, such as Accelerometer and Cardiac Monitor, which was produced by a lack of encryption and protection in communication protocols. Finally,
Traffic Analysis is listed in [
112] and consists of passively observing the traffic transmitted inferring knowledge through characteristics of the data flow.
Lateral Movement (LM) contains only
Impersonation attack. This threat has as purpose the hide yourself as a valid user in the network. Two works address it [
108,
112]. In [
108] researchers collected an example leveraging the lack of protection in the communication between glucose monitoring device and the insulin delivery system to obtain the PIN of authentication. With this PIN the attacker impersonated the patient.
Collection (Co) is the category with more attacks and has
Sniffing,
Data Breach,
Message Disclosure,
Side Channel,
Sinkhole, and
ARP Table Poisoning attacks.
Sniffing is similar to eavesdropping, where hardware and software sniffer are used to collect traffic. This attack is presented in [
27,
157] which comment the problem of medical devices to protect their communications and data.
Data Breach is a generic threat that poses the loss of sensitive data with important impact in healthcare. Almohri et al. [
7] joint this attack with confidentiality requirement due to this exposure of information.
Message Disclosure can be understood as an example of Data Breach because unauthorised entities exposure information leveraging weaknesses in device or communication medium. This attack is analysed in [
3,
157], especially for capturing patient logs files with sensitive information.
Side Channel is a widely discussed attack in literature [
27,
73,
108,
124,
157], and acts collecting physical parameters from medical devices, such as power consumption and Electromagnetic (EM) radiations resulting in sensitive information leakage. Newaz et al. [
108] presents three types of
Side Channel attacks taking into account the read parameters: electromagnetic interference, sensor spoofing and differential power analysis attacks on medical devices.
Sinkhole is an attack only found in [
27] and works obtaining all traffic due to malicious node is properly published in the network as the fastest path to the base station. Finally,
ARP Table Poisoning is an implementation of
Man-in-the-Middle attack presented before [
34]. The attacker sends false ARP messages to nodes in the network alerting of the best route for reaching the base station, which coincide with his/her node.
The
Impair Process Control (IPC) category contains
Tampering,
Sensor Spoofing,
Replying Attack, and
Message Modification. Firstly,
Tampering and
Message Modification are two variations of attacks with the purpose of altering messages between medical devices and healthcare provider. In this sense, different works [
3,
7,
112,
157] comment these attacks, being Yaqoob et al. [
157] who presented different targets where these attacks were produced, such as wearable devices (Fitbit) and medical devices (pacemaker or prosthetic limb).
Sensor Spoofing has been presented above as a type of
Side Channel attack. When the attack is successful, the attacker takes the control of sensor changing the medical device operation. Specifically, [
7,
108,
157] present different techniques such as static and dynamic analysis, reverse engineering and communication channel exploitation to perform this attack [
157]. Finally,
Replying Attack is defined as the achievement of valid packets transmitted in order to corrupt or impersonate it [
3,
157]. The attack vectors here are shared with the
Sensor Spoofing threat.
To conclude, we present the
Impact (Im) category with
Flooding,
Denial of Service,
Ransomware,
Battery Depletion,
Multiple-Input-Multiple-Output (MIMO), and
Bluetooth attacks.
Flooding can be seen as a concrete type of
Denial of Service attack, which impacts in the healthcare environment blocking and overloading the assets.
Denial of Service is a widely discussed threat in literature [
7,
27,
112,
113,
118,
119,
124,
157], providing different forms of performing it, such as battery drainage, botnets, and so on.
Ransomware is a type of Malware separated by it due to the importance and impact that it has in healthcare. In Section
1, we presented some attacks to hospitals based on
Ransomware. The works conducted in [
108,
157] addressed this threat and commented different data in economic terms, such as $17000 paid by a hospital to recover its systems.
Battery Depletion attack damages the charging of the device to render the device unavailable. Namely, this attack is covered in [
108,
124,
157], highlighting the content presented by Newaz et al. [
108] that commented the execution of this attack with a forced authentication attack, where the adversary performs multiple authentication processes to drainage the battery.
MIMO Attack is presented in [
108], which consists of collecting transmitted data in wireless environment to damage the confidentiality in healthcare. Finally,
Bluetooth attacks are explained. These can be included in several MITRE categories because Bluetooth implements its own layer architecture. In [
162], some attacks are commented, such as Blue smacking (DoS), Blue snarfing and Blue bugging (Data Breach), Bluejacking (Impersonation), Blue printing (Sniffing), and Mac spoofing.
Summarising the content presented in this section, we have performed a proper alignment of healthcare threats found in the literature with MITRE ATT&CK in order to achieve compatibility and provide a reference framework to compare different related works. Besides, we have classified all attacks with the “Rubric for applying CVSS to Medical Devices” [
23] by MITRE to properly understand each threat’s scope and impact in the healthcare environment. Thus, we present in Fig.
4 several charts to highlight the results obtained with the rubric application for the attacks classified. Fig.
4 shows six different charts, where the first three ones illustrate the CIA impact, showing by each requirement the percentage of
High,
Low, or
None impact. In the three cases, the
High impact is the most appeared. Following the charts, the fourth includes the number of attacks, with respect of the total amount (41 attacks), the classification for
Attack Complexity,
User Interaction and
Scope. In
Attack Complexity, the attacks have been divided between the two possible values,
Low and
High. For
User Interaction, the majority does not require
None user action. Finally,
Scope presents only three attacks that can act in a
Changed environment. In Fig.
4, the total of attacks impacted by each CIA requirement is shown in the fifth chart, with a similar percentage for the three properties. Finally, the
Privilege Required value is mostly covered by the
None option, showing that many attacks can be executed without specific user privileges.