Security

Malware Creates Fake Cancer

Researchers in Israel created malware to draw attention to serious security weaknesses in medical imaging equipment and networks. The researchers say they have developed malware to draw attention to serious security weaknesses in critical medical imaging equipment used for diagnosing conditions and the networks that transmit those images – vulnerabilities that could have potentially life-altering consequences if unaddressed. The malware they created would let attackers automatically add realistic, malignant-seeming growths to CT or MRI scans before radiologists and doctors examine them. Or it could remove real cancerous nodules and lesions without detection, leading to misdiagnosis and possibly a failure to treat patients who need critical and timely care.

Yisroel Mirsky, Yuval Elovici and two others at the Ben-Gurion University Cyber Security Research Center in Israel who created the malware say that attackers could target a presidential candidate or other politicians to trick them into believing they have a serious illness and cause them to withdraw from a race to seek treatment. The research isn’t theoretical. In a blind study the researchers conducted involving real CT lung scans, 70 of which were altered by their malware, they were able to trick three skilled radiologists into misdiagnosing conditions nearly every time. In the case of scans with fabricated cancerous nodules, the radiologists diagnosed cancer 99 percent of the time. In cases where the malware removed real cancerous nodules from scans, the radiologists said those patients were healthy 94 percent of the time.

In an era where medical diagnosis is 97% machine driven and 3% professional medical knowledge, this is a scary thought.  challenge your doctor if the diagnosis doesn’t seem right and don’t let them shut you up using a “test result.”  Everything is hackable, even the machines used to diagnose cancer.

Previous post

YouTube Lets Toxic Videos Run Rampant

Next post

The Constitution Project Wants an End to NSA's Metadata Collection Program

The Author

Louisa

Louisa