Breaking News

HighPoint introduces Industry’s First Hardware Architecture for GPU-Direct NVMe Storage Panasonic Introduces the First Ultra-Telephoto Zoom Lens in the LUMIX S Series CORSAIR announces Vanguard Pro 96 and Vanguard 96 Gaming Keyboards Viltrox Spark Z3 TTL On-Camera Flash Transcend Launches Next-Gen microSD Express USD710S

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Malware Tricks Radiologists by Removing Cancer Tumors From CT Scans

Malware Tricks Radiologists by Removing Cancer Tumors From CT Scans

Enterprise & IT Apr 5,2019 0

Researchers in Israel created a malware to prove the security weaknesses in medical imaging equipment and networks.

The researchers, part of the Cyber Security Research Center at Ben-Gurion University in Israel, have developed malware that can automatically alter the imaging before it gets seen by a doctor or radiologist.

They released a demonstration video showing how an attacker can use deep learning to inject or remove lung cancer from CT scans. This attack also affects other 3D medical imagery and medical conditions.

Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici have published a paper that shows how they were able to use "deep-learning to add or remove evidence of medical conditions from volumetric (3D) medical scans."

In their paper, the researchers implement the attack using a 3D conditional GAN and show how the framework (CT-GAN) can be automated. Although the body is complex and 3D medical scans are very large, CT-GAN achieves realistic results which can be executed in milliseconds.

To evaluate the attack, the researchers focused on injecting and removing lung cancer from CT scans. They show how three expert radiologists and a state-of-the-art deep learning AI are highly susceptible to the attack. The researchers also explore the attack surface of a modern radiology network and demonstrate one attack vector: they intercepted and manipulated CT scans in an active hospital network with a covert penetration test.

The researchers used real lung scans and manipulated 70 of them remotely using the malware. The three radiologists misdiagnosed conditions most every time according to the Washington Post which reports cancer was diagnosed 99% of the time where fake cancerous nodules were added and where they were removed by the malware diagnosed patients as being healthy 94% of the time. Following this 'blind' testing, the radiologists were told about the manipulation and given 20 more scans to view, of which 10 had been faked: the added nodules were assumed real 60% of the time, the scans with removed nodules 87% of the time. Worse yet, AI-driven software used to automatically screen such scans was fooled 100% of the time.

This type of attack illustrates the need for data integrity and authenticity controls for healthcare data. Medical systems are designed for use within closed system where the security of data and data transfer is the responsibility of the network.

The security industry has solved this for software updates through code signing, and a similar concept could be applied to healthcare.

Tags: malware
Previous Post
Europe Accuses BMW, Daimler and VW for Restricting Competition on Emission Cleaning Technology
Next Post
Panasonic Unveils New Lumix DC-G95 20.3-Megapixel Mirrorless Camera

Related Posts

  • Intel and Microsoft Convert Malware to Images to Spot Threads Faster

  • Malwarebytes Outlines Coronavirus Scams

  • Google's AI Tool Scans Billions of Gmail Attachments to Secure Inboxes

  • Pentagon, DHS And FBI Issued New Malware Warning For Windows Users

  • Lazarus Group Targets Linux With New Malware

  • Hackers Targeted Government Officials Using WhatsApp Malware

  • Malware Masked as Textbooks and Essays

  • Samsung Laptop Full of Notorious Malware Is On Sale For $1.2M

Latest News

HighPoint introduces Industry’s First Hardware Architecture for GPU-Direct NVMe Storage
Enterprise & IT

HighPoint introduces Industry’s First Hardware Architecture for GPU-Direct NVMe Storage

Panasonic Introduces the First Ultra-Telephoto Zoom Lens in the LUMIX S Series
Cameras

Panasonic Introduces the First Ultra-Telephoto Zoom Lens in the LUMIX S Series

CORSAIR announces Vanguard Pro 96 and Vanguard 96 Gaming Keyboards
PC components

CORSAIR announces Vanguard Pro 96 and Vanguard 96 Gaming Keyboards

Viltrox Spark Z3 TTL On-Camera Flash
Cameras

Viltrox Spark Z3 TTL On-Camera Flash

Transcend Launches Next-Gen microSD Express USD710S
Cameras

Transcend Launches Next-Gen microSD Express USD710S

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

be quiet! Pure Base 501

be quiet! Pure Base 501

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed