Health data under scrutiny: when hackers enter the ward

What is behind cybercrime's interest in medical information, and what are the possible solutions.

Maria Vittoria Zucca | PhD student of the National Program in Cybersecurity, Scuola Superiore Sant'Anna and Scuola IMT Alti Studi Lucca
Image created by text-image generation with DALL-E model, integrated in ChatGPT - GPT4o OpenAI

The Healthcare Cyber ​​Heists report, compiled by US cybersecurity firm Carbon Black, recently compiled a stock market of the types of health data most sold on the dark web, from those regarding professionals in the sector to patients. The “full package” of all the documents needed to reconstruct the background of a medical professional, including identification data, degrees, medical licenses, as well as insurance documents is among the most expensive and costs around $500. Less expensive is the market for fake medical prescriptions, which can be purchased for figures between $10 and $120, or the login credentials to insurance portals, sold for a few dollars due to their rapid obsolescence once the breach is discovered.

It can be argued that each individual's health data, capable of giving a glimpse, when not completely revealing, the most intimate sphere of the person, are becoming a veritable gold mine for cyber criminals. But why do they seem to be so coveted? And what value do they possess? If health data is a target for cybercriminals, it means that there is a demand for it, and if there is a demand, there must be an economic return, within a specific 'underground health market'.

The value of health data

To understand the value of this data, one only has to consider the many illicit uses to which it can be put. They can be used to obtain prescription drugs (either for personal consumption or to resell them illegally), or to create false documents that allow unqualified individuals to pass themselves off as doctors and access healthcare services or deal with insurance companies fraudulently. In addition to practitioner data, health information also includes personal patient identification data, e-mail addresses, health card numbers, clinical reports such as diagnostic and laboratory tests, medicine prescriptions, and finally insurance data. The criminal purposes linked to the theft and sale of such data are of various kinds: they can be used to construct false identities, to demand sums of money as ransom in order to regain possession of the data themselves (e.g. sensitive information such as HIV seropositivity), to forge documents, e.g. birth certificates, driving licences, passports, to issue false medical prescriptions, or to obtain specific drugs.

As feared for instance by Matteo Bonfanti, Head of International Relations and Cooperation of the National Cybersecurity Agency (at this link his speech at the conference 'Cybesecurity and personal data protection in healthcare'), it cannot even be ruled out that among the buyers in this buying and selling system are also companies, interested in getting hold of 'big data" otherwise unattainable, e.g. pharmaceutical companies that could exploit the medical data packages on sale for research and development of new drugs, strategically orienting their business decisions and illicitly taking advantage of their competitors.

Careless behaviour

Having established that this kind of data, of which most of us may be unaware, is attractive to criminal interests, the other question that remains to be answered is how safe and 'protected' this same data is. A first element that helps to set the context is that, in all likelihood, healthcare personnel themselves are not fully aware of the risks involved in the possible misappropriation of this information. In fact, it may happen that doctors, in the performance of their usual duties, use means and tools not specifically designed for the health sector, thus bypassing a minimum level of security.

"Imagine such a scenario, quite common in the everyday life of a healthcare professional," observes a surgeon working in a public hospital in Veneto, who prefers to remain anonymous, and whose full interview can be read within this study. "Usually, it happens that we receive e-mails from other clinicians, who need to get a colleague's opinion, containing patient data. And these exchanges often take place on instant messaging systems like Whatsapp. A colleague of mine, for example, asks: is patient X bleeding, do we take him to the operating room or not? The message only states the surname, no first name and no date of birth, and the pathology of reference. It is obvious, however, that the patient is easily identifiable'. Situations like this are commonplace. A doctor who has acted in this way probably does not feel that he has made a mistake, yet he has provided ultra-sensitive clinical data through an instrument lacking the necessary security levels to transmit this type of information.

From official statistics on cyber-attacks addressed to the healthcare sector, it seems clear that most intrusions occur, or are at least facilitated, by the lack of adequate IT security practices on the part of medical personnel (think of the widespread phenomenon of phishing). It is possible that underlying this is a certain superficiality, a lack of perception of the real risk, or even a cultural problem. Indeed, often the implicit reasoning behind these attitudes is: I deal with patient health, I do not have the time or the expertise to deal with these aspects as well.

Moreover, the overall workload - both clinical and administrative - would seem to be perceived as an obstacle to taking adequate care of IT security aspects as well. "We healthcare professionals are overwhelmed by general, clinical and administrative issues, we have to study laws for drug administration, for care plans, spend ten to fifteen minutes of time just to enter the drug administration digitally, and then control and supervise it," continues the interviewed surgeon. 'The time to spend on the more proper aspects of data security, possible intrusions and cybersecurity in general is really residual'. There is also another point of view to consider, that of those who professionally deal with security within healthcare companies. Says, for instance, the software engineer interviewed anonymously as part of the above-mentioned research, and who works in the same healthcare company as the surgeon: 'There is a total recklessness in sending reports and analyses via WeTransfer or similar, and this is far from infrequent, indeed it is a common practice...The perception is that security is really a big pain in the ass, i.e. understood almost as a limitation of personal freedom, either because you cannot surf the Internet at your leisure, but on the sites indicated, or because you cannot transfer a clinical image to WeTransfer to get a second medical opinion'. 

Solutions? Up-to-date technology, training and 'cyberculture'.

The evolution of cyber threats requires advanced and constantly updated technological tools - intrusion detection systems, encryption, multi-factor authentication and real-time monitoring software - but there is also a need for constant training of healthcare personnel. One of the challenges is to foster a growing 'cyberculture' through refresher and training courses that appear stimulating to practitioners and are not perceived as burdensome. In particular, training should be specifically targeted and tailored to the critical issues that each professional figure (doctor, nurse, administrative staff, providers) faces. Another possible solution could be to support third party figures (such as risk managers, specialists in data protection and computer security experts) to clinical professionals: however, it must be taken into account that the professional class that could perform these highly multidisciplinary tasks is only recently being formed.       

Attempting to predict how healthcare will evolve, one can, on closer inspection, imagine an increasingly hybrid future scenario: some healthcare services will continue to be provided on site, others will remain hybrid, i.e. partly present and partly virtual (e.g. tele-monitoring and tele-referral), others will become exclusively virtual (such as a tele-visit). The perimeter, therefore, to be secured will tend to widen, moving from a 'hospital-centred' healthcare to a home-based involvement of the citizen, with a consequent greater number of data in circulation and more and more people involved in the, already complex, healthcare organisation chart.

You might also be interested in

SocietyTechnology and Innovation

If TV series are the ones to reflect on cybersecurity

Gli attacchi e il terrorismo informatico sono argomento di attualità, perfino al centro di serie tv, come Zero Day. Quanto la fiction è vicina alla...

SocietyTechnology and Innovation

Artificial intelligence, human errors

When AI gets it wrong: why it happens, and how to avoid it.

Alumni StoriesTechnology and Innovation

From research to citizens: artificial intelligence that improves public policy

Falco Bargagli Stoffi, professor at UCLA, tells how mathematics, statistics and machine learning can make public services fairer and more efficient.

CulturesAlumni Stories

How archaeology data speaks to us today

Nicolò Dell'Unto, director of the Lund University Digital Archaeology Lab, reflects on developments in contemporary archaeology.

SocietyTechnology and Innovation

Where artificial intelligence will take us

The AI Index Report 2023 captures the state of the most talked about technology of the moment.