this post was submitted on 31 Jan 2025
44 points (94.0% liked)

Cybersecurity

6100 readers
192 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 2 years ago
MODERATORS
top 8 comments
sorted by: hot top controversial new old
[–] [email protected] 5 points 1 hour ago

But I'm sure TikTok is fine and 100% to be trusted.

[–] [email protected] 13 points 3 hours ago (2 children)

Those things shouldn't even be connected to the internet.

[–] [email protected] 3 points 2 hours ago (1 children)

They connect to allow the vitals to be pulled into the EMR to allow continuous documentation of vitals for the anesthesia record or central patient monitoring. More and more frequently, the database is not onsite and is shared amongst several sites within a hospital system.

[–] [email protected] 2 points 1 hour ago* (last edited 1 hour ago)

But the device itself shouldn't need internet connectivity for this. That networking should be handled by a local master device, the same way access control systems (e.g. Door badge readers, alarm monitoring, etc) work.

Then this device would only use a local, isolated network to access the master device.

[–] [email protected] 4 points 2 hours ago

Might not be. This could have simply been some IT guy noticing that something kept trying to ping the outside world.

[–] [email protected] 4 points 3 hours ago (1 children)
[–] [email protected] 1 points 2 hours ago (1 children)

Not sure. If true, prolly just generic data mining?

Would fake news ever report if it was pinging mountain view?

[–] [email protected] 2 points 1 hour ago

Might also not be this device that was specifically targeted. The backdoor could have been placed in component firmware for any generic components this device uses, or in some general software library that gets used all over the place.