GDPR’s U.S. Impact, Bluetooth, Chinese hacking threats
TLP White: This week we start by examining the impact of the EU’s General Data Protection Regulation (GDPR) and U.S. companies’ initial responses to the law. We also discuss new vulnerabilities that have been discovered in Bluetooth-enabled devices. We end by shedding some light on ever-worsening threats of Chinese hacking and conclude that the problem has escalated in some new and alarming ways.
Welcome back to Hacking Healthcare.
As a reminder, this is the public version of the Hacking Healthcare blog. For additional in-depth analysis and opinion from the health sector perspective, become a member of H-ISAC and receive the TLP Amber version.
Hot Links –
1. U.S. Businesses are Slow to React to the GDPR.
Approximately 150 days ago, the EU passed sweeping privacy legislation called the General Data Protection Regulation (the “GDPR”).[1] Since the law went into effect this May, U.S. businesses have struggled to grapple with how to comply with its directives.[2] In fact, partially due to the GDPR’s nebulous wording and its far-reaching commands, the compliance efforts of many U.S.-based businesses have been sorely lacking. For example, the law requires companies to provide a “reasonable” level of protection for individuals’ personal data, but U.S. companies have not reached an agreement regarding what is and is not “reasonable” in this space. As a result, companies have suffered from a certain amount of inertia with respect to their GDPR compliance obligations, as the law’s unclear standards do not provide businesses with safe harbors or clear commands for meeting its requirements.
While U.S. industry has largely adopted a “wait-and-see” approach, European companies have made major efforts to comply with the GDPR even in the face of its unclear mandates. European data protection regulators have been inundated with consumer complaints, but they have so far doled out fines to only a few entities. For instance, Portugal-based Barreiro Hospital was charged just $400,000 euro for mishandling patient records, but Canada-based AggregateIQ was threatened with a 20 million euro fine for failing to bring itself into compliance with the GDPR. It seems probable that European regulators may soon begin to increase enforcement against U.S. companies who fail to comply with its rules. In any event, given the lack of consensus regarding what the law actually means, European privacy authorities will need to clarify their expectations through their future enforcement actions and adjudicatory decisions.
2. Another Day, Another Vulnerability: This Time It’s Bluetooth Chips.
Researchers at Armis recently discovered flaws in Texas Instruments Bluetooth chips that provide access points to WiFi services. These flaws, affectionately named BLEEDINGBIT, allow unauthorized actors to infiltrate internet-connected devices such as smart locks, insulin pumps, and pacemakers.[3] One of the BLEEDINGBIT flaws allows hackers to gain access to WiFi networks merely by being near a device that has enabled a certain type of Bluetooth technology to communicate. A second flaw sends fraudulent firmware updates to Bluetooth-enabled devices that use an “over-the-air download” feature. Some have stressed the pervasiveness of these flaws, but others have questioned how likely they are to be exploited on any substantial scale.
BLEEDINGBIT has affected WiFi network equipment tied to large companies such as Aruba Networks, Cisco, and Meraki.[4] In the wake of these corporate network vulnerabilities, Texas Instruments has recommended disabling the “over-the-air download” feature in software production environments. The company has also created a patch to fix the flaws that has been made available to affected entities.
3. Hackers from China Show No Signs of Letting Up.
Security software provider Carbon Black recently reported that China is now the world’s preeminent perpetrator of cyberattacks.[5] Much of the world (and particularly the U.S.) had been hoping that China was planning to crack down on its citizens’ cyber spying and intellectual property theft. However, it appears quite the opposite: Chinese hacks have only become more sophisticated, crafty, and frequent over time. Hacks from Chinese actors actually surpassed Russian hackers’ overall productivity in Q3 of 2018.[6]
The U.S. Department of Homeland Security (“DHS”) recently issued an alert about an alarming hacking campaign called “Cloud Hopper” that has surfaced out of China.[7] The Cloud Hopper campaign was tied to the Chinese Ministry of State Security and took the form of an “island hopping” scheme: a tactic where cyber hackers target large organizations in order to access an affiliate’s network. Carbon Black’s report highlighted the fact that IoT devices can provide a useful access point for hackers to engage in this “island hopping” technique. DHS’s alert listed loss of proprietary information, financial losses to restore systems and data, and reputational harm as some of the impacts of the campaign.
China’s hacking efforts are alarming on their own, but hackers from other corners of the globe are improving their tactics in a similar manner. Ill-intentioned actors from Brazil, North Korea, and Iran have also upgraded their efforts in order to thwart companies’ internal procedures to combat hacks. It appears that the problem is on course to get worse before it gets better.
Read full blog below: